We all know that we need to exercise our business continuity plans, it’s the only way to find out whether they will work. Of course that’s with the exception of a live incident, but during a disaster is never a good time to find out your plan doesn’t work. But what type of exercises should you run, how often should you run them, how to you plan them and how do you assess them?
These are all important questions and are all vital to ensuring that you have an effective business continuity programme in place, one that will provide reassurance to top management that, in the event of a crisis, the organization will be able to deal with it.
This is why the Business Continuity Institute has published a new guide that will assist those who have responsibility for business continuity to manage their exercise programme. ‘The BCI guide to… exercising your business continuity plan’ explains what the main types of exercises are and in what situation it would be appropriate to use them. It explains how to plan an exercise and what needs to be considered when doing so, from the setting of objectives to conducting a debrief and establishing whether those objectives have been met.
Following feedback from those working in the industry, testing and exercising was chosen as the theme for Business Continuity Awareness Week and the BCI is keen to highlight just how important it is to effective business continuity. A recent study showed that nearly half of respondents to a survey had not tested their plans over the previous year and half of those had no plans to do so over the next twelve months. This guide is intended to make it easier for people to develop an exercise programme and demonstrate that it does not have to be an onerous task to do so.
SEATTLE — The Ebola epidemic in West Africa has killed more than 10,000 people. If anything good can come from this continuing tragedy, it is that Ebola can awaken the world to a sobering fact: We are simply not prepared to deal with a global epidemic.
Of all the things that could kill more than 10 million people around the world in the coming years, by far the most likely is an epidemic. But it almost certainly won’t be Ebola. As awful as it is, Ebola spreads only through physical contact, and by the time patients can infect other people, they are already showing symptoms of the disease, which makes them relatively easy to identify.
LONDON, UK – March Networks®, a leader in intelligent IP video surveillance for financial institutions worldwide, is pleased to introduce March Networks Searchlight™4 for Banking. The new, video-based business intelligence solution provides banks and credit unions with exceptional insights into customer service, operations and marketing, helping them improve performance and win new business. It also delivers powerful search and investigation capabilities that enable financial institutions to reduce costs associated with ATM skimming, cash harvesting and other fraudulent activity.
Most banking organisations have invested significantly in video surveillance systems to ensure the security of their customers, employees and assets. Many have taken that investment further by adopting software applications that combine recorded video with ATM and teller transaction data, making it easier to investigate suspicious transactions.
New Searchlight for Banking extends the benefits of integrated data by incorporating intelligent analytics – including people counting, queue length and dwell time – from March Networks’ MegaPX Indoor Analytics Dome camera. Conveniently accessible via the software’s browser-based dashboard, Searchlight provides financial institutions with a complete view of their retail banking business using customisable reporting tools that enable them to:
- Improve customers’ experience and optimise staffing;
Searchlight delivers metrics on customer experiences, including wait times and the number of people in line at teller stations or ATMs. Managers can easily run reports to analyse and compare data from one or multiple locations and use that information to optimise staffing or identify where more training is needed. This knowledge is key to branch performance, as customer experience is the most common reason consumers give for opening and closing accounts, ahead of fees, rates, locations and convenience (Ernst & Young 2014 global consumer banking survey).
- Improve fraud defenses and cut investigation costs;
Searchlight enables banks to identify potential fraud and reduce investigation times considerably with integrated video, audio and transaction data, and the ability to search across multiple sites simultaneously. Managers can easily view statistics on which branch, teller or ATM has the most withdrawals or deposits over a certain amount, for example, and pull up the recorded video for further review. The software can also proactively alert managers or investigators to suspicious activity at an ATM, which could indicate ATM skimming or cash harvesting.
- Assess financial services and promotional success;
Measuring how well a promotion is working in a branch, or seeing if it’s been executed correctly across the organisation, can be invaluable to marketing teams. Searchlight delivers visual auditing capabilities and sophisticated metrics on customer dwell times. Staff can use the software to assess how long a potential customer waited to speak with a financial service advisor or if promotional signage is having an impact. If one branch is outperforming, they can use Searchlight to uncover the reasons why and make adjustments at other locations.
- Enhance security and operations.
With Searchlight, authorised managers and security/operations staff can remotely spot-check branches from any networked location to assess customer activity, maintenance, policy compliance and overall operational efficiency. The software provides detailed reports on a variety of events, such as when a safe is opened, and makes it easy to review suspicious activities using synchronised video and audio.
“Searchlight extracts relevant information from vast hours of recorded video and data and turns it into effective business intelligence,” said Net Payne, Chief Marketing Officer, March Networks. “It gives financial institutions the insights they need to improve customer service and overall performance, and allows them to leverage investments they’ve already made in video surveillance by extending the value it delivers to additional groups within the organisation.”
About March Networks
March Networks®, an independent subsidiary of Infinova®, is a leading provider of intelligent IP video solutions. For more than a decade, the company has helped some of the world’s largest commercial and government organizations transition from traditional CCTV to advanced surveillance technologies used for security, loss prevention, risk mitigation and operational efficiency. Its highly scalable and easy to use Command video management platform incorporates a web-based client interface to enable rapid system deployment and complete system control. It is complemented by the company’s portfolio of high-definition IP cameras, encoders, video analytics and hybrid recorders, as well as outstanding professional and managed services. March Networks systems are delivered through an extensive distribution and partner network in more than 50 countries. For more information, please visit www.marchnetworks.com.
March Networks, March Networks Searchlight and the March Networks logo are trademarks of March Networks Corporation. Infinova is a trademark of Infinova Corporation. All other trademarks are the property of their respective owners.
New Product Automates Production of Sophisticated Data Integration, Cleansing, and Mastering Processes
NEW YORK, NY – Information Builders, a leader in business intelligence (BI) and analytics, information integrity, and integration solutions, today announced the launch of Omni-Gen™, an enterprise software product that accelerates the deployment of complete master data management (MDM) and data integration applications.
Omni-Gen codifies and automates the best practices associated with multi-domain MDM application implementations. These processes involve data integration, cleansing, and mastering, and are usually implemented manually, with months spent on specification, design, coding, and testing. Omni-Gen, by contrast, enables organisations to develop the models and “golden records” they desire for a result and then automatically generates the processes needed to complete the job.
As a result, months of development work and rework can be reduced to weeks of model-driven, agile-enabled design. Issues that might otherwise be forgotten or get lower priority, such as change history maintenance and automatic management of cross-domain references, are built into the Omni-Gen generated processes. This ensures a better and more comprehensive result on the very first cut of a project.
Omni-Gen also dramatically reduces the time to value for analytics. Because Omni-Gen begins with end results in mind, users can create data marts, visualisations, and reports from the MDM model even before the repository is fully populated with production-ready data. This parallel effort ensures that analytics won’t lag data availability.
Omni-Gen includes previously available technology components for data access, transformation, validation, enrichment, cleansing, and mastering, as well as new modeling, process generation, and process management capabilities needed to automate best-practice MDM application development. Organisations will also benefit from an app store-like facility that enables the sharing of templates and artifacts across teams.
“Many organisations think that MDM is a big project, maybe even out of their reach,” said Gerald Cohen, president and CEO of Information Builders. “Omni-Gen is going to make MDM far faster to implement and more cost-effective for companies that are already doing it, and enable a lot of others to reap benefits they never thought they’d see. It’s a game changer.”
About Information Builders
Information Builders helps organisations transform data into business value. Our software solutions for business intelligence and analytics, integration, and data integrity empower people to make smarter decisions, strengthen customer relationships, and drive growth. Our dedication to customer success is unmatched in the industry. That’s why tens of thousands of leading organisations rely on Information Builders to be their trusted partner. Founded in 1975, Information Builders is headquartered in New York, NY, with offices around the world, and remains one of the largest independent, privately held companies in the industry. Visit us at informationbuilders.com, follow us on Twitter at @infobldrs, like us on Facebook, and visit our LinkedInpage.
Unique bring your own key capability enables you to have total control over your keys and sensitive data in the Azure Cloud
PLANTATION, Fla. – Thales, leader in information systems and communications security and pioneer with Microsoft in bring your own key (BYOK) technology, announces the launch of its BYOK Deployment Service Package. The new service offering makes the process of creating and securely transferring keys to Microsoft Azure cloud easy and allows organizations to take advantage of cloud services with greater confidence.
Cloud services like Microsoft Azure Rights Management Services (RMS) offer organizations flexibility, convenience and cost-effectiveness. BYOK provides the added confidence that the keys used to protect your sensitive data in the cloud are under your exclusive control.
The Thales BYOK Deployment Service Package provides everything you need to safely generate and transfer your own keys to the Microsoft Azure cloud. The service package includes an nShield hardware security module (HSM) and the professional services to quickly get you cloud-ready and in control of your sensitive data and keys in the cloud.
- Take advantage of cloud services with confidence
- Secure your sensitive data with keys that you fully control and are never visible to Microsoft
- Ease of deployment - receive expert guidance on how to securely generate and securely transfer your keys to the cloud
- Protect and manage your keys on your premises with robust FIPS 140-2 certified hardware
Dan Plastina, Group Manager, Microsoft says:
"The Azure Rights Management service helps customer safeguard their data, both inside and outside of the organization. Our collaboration with Thales on BYOK puts the customer in control of their keys. Organizations can generate their RMS master keys on-premises, using their own Thales HSMs, and then securely transfer those keys to our Azure-hosted Thales HSMs. The new Thales BYOK Deployment Service Package now makes the process of getting started even easier, providing everything that's required to successfully deploy, generate, and transfer your own keys to the Azure cloud."
Richard Moulds, vice president strategy at Thales e-Security says:
"The goal for any security-oriented cloud service is to convey confidence that sensitive data in the cloud is protected, confidence that different tenants are strongly segregated and that control over critical security assets such as cryptographic keys remains with the customer. BYOK and the use of HSMs can protect both the consumer and the cloud provider and build the confidence to trust the service with an organization's most valuable assets. Customers new to hardware security module technology often find that expert assistance can make for a smooth and secure deployment and our BYOK Deployment Service can be tailored to meet a customer's specific need."
Thales Advanced Solutions Group (ASG) is ready to help you deploy BYOK for your Azure cloud. A dedicated consultant will spend time at your location to explain the technology behind BYOK and take you step-by-step through the process of generating your own keys on your own premises. The consultant will instruct you on how to securely transfer these keys to the Azure cloud, and help you plan the key generation ceremony as well as assist you in conducting it. In addition, you will be left with a step-by-step document detailing the ceremony for future reference.
Whitepaper: Hardware Key Management in the RMS Cloud www.thales-esecurity.com/msrms
Microsoft RMS BYOK Guidance: technet.microsoft.com/en-us/library/dn440580.aspx
Updates on Microsoft RMS: www.twitter.com/TheRMSGuy
For industry insight and views on the latest key management trends check out our blog www.thales-esecurity.com/blogs
About Thales e-Security
Thales e-Security is a leading global provider of trusted cryptographic solutions with a 40-year track record of protecting the world's most sensitive applications and information. Thales solutions enhance privacy, trusted identities, and secure payments with certified, high performance encryption and digital signature technology for customers in a wide range markets including financial services, high technology, manufacturing, and government. Thales e-Security has a worldwide support capability, with regional headquarters in the United States, United Kingdom, and Hong Kong. www.thales-esecurity.com
Thales is a global technology leader for the Aerospace, Transport, Defence and Security markets. With 61,000 employees in 56 countries, Thales reported sales of €13 billion in 2014. With over 20,000 engineers and researchers, Thales has a unique capability to design and deploy equipment, systems and services to meet the most complex security requirements. Its unique international footprint allows it to work closely with its customers all over the world.
Positioned as a value-added systems integrator, equipment supplier and service provider, Thales is one of Europe's leading players in the security market. The Group's security teams work with government agencies, local authorities and enterprise customers to develop and deploy integrated, resilient solutions to protect citizens, sensitive data and critical infrastructure.
Drawing on its strong cryptographic capabilities, Thales is one of the world leaders in cybersecurity products and solutions for critical state and military infrastructures, satellite networks and industrial and financial companies. With a presence throughout the entire security chain, Thales offers a comprehensive range of services and solutions ranging from security consulting, intrusion detection and architecture design to system certification, development and through-life management of products and services, and security supervision with Security Operation Centres in France and the United Kingdom.
World Backup Day on Tuesday 31st March underscores the importance of properly and diligently deploying, testing and validating backup solutions to prevent data loss
EPSOM – Employing a backup solution does not entirely eliminate data loss. That’s the main takeaway from updated data released today from Kroll Ontrack, the leading provider of data recovery and ediscovery. The 2015 survey  of customers who lost valuable computer data confirms that the majority of consumers and businesses are implementing backup solutions, but unintentional gaps in back up protocols are nevertheless proving costly. For the third-year running, well over half (61 percent) of respondents had a backup solution in place at the time of data loss, down slightly from 65 percent in 2014 and 63 percent in 2013.
With 71 percent of respondents backing up their data on a daily (42 percent) or weekly (29 percent) basis, why is data loss still so prominent? Unfortunately, minor oversights or an unknowingly non-functioning backup can render backup procedures ineffective. In fact, this year’s survey data shows that of those who had a backup in place at time of data loss:
- 21 percent report that their backup was not operating correctly
- 21 percent simply did not have their device included in their backup procedure
- 19 percent report their backup was not current, reducing the likelihood of retrieving needed data
“What stands out once again this year is that it is not enough to simply deploy a backup solution and hope for the best,” said Paul Le Messurier, programme and operations manager at Kroll Ontrack. “When nearly three-fourths of respondents confirm they are regularly backing up data yet are still experiencing data loss, the criticality of a complete backup strategy becomes crystal clear. This includes regularly validating that your solution is functioning as expected, and frequent testing and monitoring to ensure the backup is current and complete. In cases where oversight or backup failure leads to data loss, consider enlisting the assistance of a reputable and experienced data recovery provider.”
Backup Methods and Barriers to Use
Once again in 2015, of those respondents utilising a backup solution, external hard drives prevailed as the most used approach (68 percent) for both business and personal data (compared to 63 percent in 2014 and 59 percent in 2013). Only 16 percent report leveraging cloud backup and five per cent tape backup.
Of those respondents not utilising a backup solution, 87 percent (compared to 89 percent in 2014 and 96 percent in 2013) said they are extremely likely or somewhat likely to seek a backup solution, with external hard drives as the preferred method (77 percent). When asked about the primary barriers preventing adoption of a backup solution, time to research and administer a backup solution remained the most common reason, cited by 50 percent in 2015, compared to 49 percent in 2014 and 56 percent in 2013. Expense of backup solution, cited by 31 percent of respondents, was the next most common barrier to leveraging a backup solution.
World Backup Day (31st March, 2015) marks an excellent opportunity for individuals and businesses alike to evaluate their backup technology and protocols. Kroll Ontrack recommends taking the following proactive measures when implementing a backup solution to optimise results:
- Set up a backup schedule that includes coverage for all identified devices and media
- Ensure that backups are running regularly and in accordance with the determined schedule
- Regularly check backup reports for error indications of failure
- Test backups on a regular basis to validate that data has been accurately captured and files are intact
 Kroll Ontrack surveyed 841 Ontrack Data Recovery customers across North America, Europe and Asia Pacific.
About Kroll Ontrack Ltd.
Kroll Ontrack provides technology-driven services and software to help legal, corporate and government entities as well as consumers manage, recover, search, analyse, and produce data efficiently and cost-effectively. In addition to its award-winning suite of software, Kroll Ontrack provides data recovery, data destruction, electronic discovery and document review. For more information about Kroll Ontrack and its offerings please visit: krollontrack.co.uk, follow @KrollOntrackUK on Twitter or subscribe to the Kroll Ontrack Data Blog.
Simplifies roadmaps and strategies for data center transformation
NEW YORK – Dimension Data, the $6.7 billionglobal ICT solutions and services provider, today launched a new maturity tool that helps organizations assess their capabilities and prioritize initiatives for building a next-generation data center. The Data Center Development Model – the first assessment that covers such a broad spectrum of the data center – was created off the back of strong demand from clients seeking guidance and actionable plans to make their data centers more responsive and agile.
According to Steve Joubert, group executive for data centers at Dimension Data, global competitive pressures brought on by social, mobile, analytics and cloud have had a tremendous impact on data centers to transform to remain relevant. “Every client we speak to is looking for ways to transform their data center to become more responsive to business needs. This is not an easy undertaking.”
With the expansion of the data center beyond traditional boundaries to include cloud, networking and security, it is important to look at these areas holistically and not in isolation. A change in one area can have a costly impact in another. Most IT departments still have siloed functions and do not understand the impact of their projects on other parts of the infrastructure, including the data center. And deciding where to start for the maximum benefit, is not easy either.
For example, Dimension Data has seen that virtualization and converged infrastructure projects that do not include a review and strategy for the underlying network, can increase the ultimate cost of the project three-fold.
“It’s with this in mind that we developed the Data Center Development Model. It’s all about helping our clients make the shift to new operating models across the entire next-generation data center, while focusing on business outcomes with technology being the enabler and differentiator, instead of a hindrance,” said Joubert.
Dimension Data’s Data Center Development Model is ideal for organizations that need to understand the requirements of building a future-state data center. The Model scrutinizes the 11 critical domains in the data center (“as-is” state) and what their future needs are (“to-be” state). The output of the workshop-style engagement is a roadmap, which provides practical implementation recommendations for the most valuable initiatives around their data center. Recommendations include:
• identifying infrastructure gaps in an organization;
• determining the most efficient operating model for the data center, inclusive of management and operations;
• understanding the best ways to exploit public cloud, hosting and co-location where it
creates value for the business;
• ensuring the network is geared to support the journey of transformation; and
• embedding security at every step of the journey.
Joubert said that Dimension Data has already helped a number of organizations using its Data Center Development Model with excellent results. “We helped one organization build a virtual data center, which delivered a 30 percent reduction in real estate through consolidation and data center design. Another client saw new resources deliver services 75 percent faster to its end-users leveraging network extensions to cloud resources.”
About Dimension Data
Founded in 1983, Dimension Data plc is an ICT services and solutions provider that uses its technology expertise, global service delivery capability, and entrepreneurial spirit to accelerate the business ambitions of its clients. Dimension Data is a member of the NTT Group. Visit us at http://www.dimensiondata.com/en-US and www.facebook.com/DimensionDataAmericasor follow us on Twitter: @DimensionDataAM.
Automating software licensing, entitlement management and delivery viewed as strategic to increase operational efficiency and maximise customer service and support
MAIDENHEAD, UK – Flexera Software, provider of next-generation software licensing, compliance and installation solutions for application producers and enterprises, announced today that Wessling, Germany-based Mensch und Maschine Software SE, one of Europe’s leading Computer Aided Design and Manufacturing (CAD/CAM) and Product Data Management (PDM) solutions providers, has selected FlexNet Producer Suite as the company’s strategic Software Monetisation solution. Mensch und Maschine will use FlexNet Producer suite to standardise its licensing across all solutions in order to streamline operations and optimise the customer experience.
“We want to ensure we’re able to meet and exceed customer requirements today and in the future – which means offering licensing capabilities across myriad environments, such as on-premises or in virtualised and cloud environments. It also means we must offer flexibility so that our customers can purchase our products using licensing models that align to their business need, such as perpetual, subscription or pay-per-use models,” says Oliver Rady, Director Business Development, Mensch und Maschine.
“We are not licensing and entitlement management experts and could not build the system we needed in-house that would take us into the future, so we chose Flexera Software for their deep knowledge and success in this area. Implementing a Software Monetisation solution is essential, tied to our top priorities of knowing our customers better and providing outstanding customer service. FlexNet Producer Suite will enable us to standardise and automate these essential processes, allow us to optimise customer support, and in turn enable us to focus on our core competencies.”
Mensch und Maschine had been challenged using an assortment of different third-party, homegrown and dongle-based licensing and entitlement management technologies that had accumulated as a result of strong growth and acquisitions. Recognising the importance of consolidating and standardising its Software Monetisation technologies and optimising support processes, the company selected FlexNet Producer Suite as its strategic solution.
The company chose FlexNet Producer Suite in part because of its leadership in the software licensing, entitlement management and delivery space. Mensch und Maschine was also persuaded by its ability to deliver a complete solution including flexible software licensing, protection, monetisation, packaging, software updates and distribution management capabilities. The solution also will give the company flexibility to utilise myriad licensing models across all traditional and emerging environments in which its customers operate – all while reducing licensing complexity for itself and customers.
FlexNet Producer Suite’s entitlement management capabilities were also critical in Mensch und Maschine’s decision making process. With the solution’s back-office capabilities the company can easily manage and track its customers, the software products they have licensed, as well as product versions. It also provides extensive self-service capabilities through a customer-facing portal, which will allow Mensch und Maschine’s customers to access and manage their entitlements themselves whenever they wish – creating greater flexibility and customer satisfaction.
“Mensch und Maschine recognise the critical and strategic role Software Monetisation plays in helping the company achieve its bottom line and ensure maximum customer satisfaction,” said Alois Schwars, Vice President of Software Monetisation Solutions, EMEA at Flexera Software. “We’re delighted to welcome them as a new Flexera Software customer and looking forward to partnering with them to support their revenue and customer satisfaction objectives.”
Survey shows more than half of companies attacked have critical data stolen as a result of DDoS
LONDON, UK – Neustar, Inc. (NYSE: NSR), a trusted, neutral provider of real-time information services and analytics, has today announced findings from its third annual DDoS Attacks & Impact Report.
2015: The Rise of Hybrid Prevention Strategies to Outperform Attackers, is a survey of IT professionals from across the United Kingdom, Europe and the Middle East and Africa (EMEA) to understand the impact of Distributed Denial of Service (DDoS) attacks on business, ways in which companies are managing the crisis, and how attitudes towards DDoS attacks have changed over the past year.
Among the key findings from the survey, a staggering 40 percent of companies estimate hourly losses of over £100,000 at peak times during a DDoS outage, a 470 percent rise since the last Neustar survey almost a year ago. Multiple attacks are also becoming more prevalent and are lasting even longer than those recorded in the last survey, with more than a third of attacks affecting businesses for more than 24 hours. Additionally, 52 percent of companies attacked find themselves the victims of theft, with 24 percent more businesses reporting loss of customer data, intellectual property or money during a DDoS attack compared to last year.
"Businesses need to become more strategic in their approach to fighting these attacks," said Rodney Joffe, Senior Vice President and Technology Fellow at Neustar. "The use of website stressor services such as Lizard Squad, which lets anyone take down a website for as little as six dollars (four pounds) a month, has become a major source of irritant attacks, with the sizes jumping during 2014," added Joffe.
Companies, however, are fighting back and a third of all EMEA businesses are now using Hybrid DDoS protection, combining the best of on-premise hardware and cloud-based solutions to tackle these attacks. In the financial sector in particular, the figure of those using a Hybrid Solution jumps to around 40 percent; a reaction to high profile and repeated targeting of financial institutions. According to the survey, 69 percent of financial institutions reported more than six DDoS attacks per year by hacktivists making a political statement, and thieves targeting money rich resources. Where big money is involved, for example where a DDoS attack could cost over £100,000 per hour, the survey indicates a massive 80 percent of financial institutions deploying a hybrid DDoS solution.
"These improvements won't happen overnight or solve everything, but they could make a significant and positive difference," explained Joffe.
"The online community needs to develop industry-based mitigation technologies that incorporate mechanisms to distribute attack source information into ISPs, so they can squelch the attacks closer to the source. It needs to improve visibility and understanding of activities in the criminal underground, so their command and control structures can be disabled rapidly. Finally, it's important to improve attribution and law enforcement actions to identify perpetrators and bring them to justice," he added.
To establish a thorough insight into the impact of these attacks, Neustar surveyed 250 companies in the United Kingdom and throughout the EMEA region, across a diverse range of industries including financial services, technology, retail, government & public sector, health care, energy & utility, telecommunications, e-commerce, Internet services and media. The report revealed that 84 percent of businesses across these sectors use up to 10 staffers to mitigate when attacked, which opens the door to further attacks because when more people focus on a DDoS attack, fewer eyes are watching for other threats like malware or virus installation.
To mitigate DDoS attacks, Neustar blends expertise, proven responses and diverse technologies. Neustar SiteProtect, our DDoS mitigation service, offers: options to meet level of risk, budget and technical environment; cloud-based protection; on-premise, always-on hardware; or a hybrid of both, all of which is fully managed by Neustar. SiteProtect is backed by the Neustar Security Operations Center experts who bring years of experience to blocking DDoS attacks.
Download a copy of the full survey here - www.neustar.biz/resources/whitepapers/ddos-attacks-protection-report-emea-2015
Neustar, Inc. (NYSE:NSR) is the first real-time provider of cloud-based information services and data analytics, enabling marketing and IT security professionals to promote and protect their businesses. With a commitment to privacy and neutrality, Neustar operates complex data registries and uses its expertise to deliver actionable, data-driven insights that help clients make high-value business decisions in real time, one customer interaction at a time. More information is available at www.neustar.biz.
Simplifies roadmaps and strategies for data centre transformation
FLEETS, Hants, UK – Dimension Data, the USD 6.7 billion global ICT solutions and services provider, today launched a new maturity tool that helps organisations assess their capabilities and prioritise initiatives for building a next-generation data centre. The Data Centre Development Model – the first assessment that covers such a broad spectrum of the data centre – was created off the back of strong demand from clients seeking guidance and actionable plans to make their data centres more responsive and agile.
According to Steve Joubert, Group Executive for Data Centres at Dimension Data, global competitive pressures brought on by social, mobile, analytics and cloud have had a tremendous impact on data centres to transform to remain relevant. “Every client we speak to, is looking for ways to transform their data centres to become more responsive to business needs. This is not an easy undertaking.”
With the expansion of the data centre beyond traditional boundaries to include cloud, networking and security, it’s important to look at these areas holistically and not in isolation. A change in one area can have a costly impact in another. Most IT departments still have siloed functions and don’t understand the impact of their projects on other parts of the infrastructure, including the data centre. And deciding where to start for the maximum benefit, isn’t easy either.
For example, Dimension Data has seen that virtualisation and converged infrastructure projects that don’t include a review and strategy for the underlying network, can increase the ultimate cost of the project three-fold.
“It’s with this in mind that we developed the Data Centre Development Model. It’s all about helping our clients make the shift to new operating models across the entire next-generation data centre, while focusing on business outcomes with technology being the enabler and differentiator, instead of a hindrance,” said Joubert.
Dimension Data’s Data Centre Development Model is ideal for organisations that need to understand the requirements of building a future-state data centre. The Model scrutinises the 11 critical domains in the data centre (“as-is” state) and what their future needs are (“to-be” state). The output of the workshop-style engagement is a roadmap which provides practical implementation recommendations for the most valuable initiatives around their data centre. Recommendations include:
- identifying infrastructure gaps in an organisation;
- determining the most efficient operating model for the data centre, inclusive of management and operations;
- understanding the best ways to exploit public cloud, hosting, and co-location where it creates value for the business;
- ensuring the network is geared to support the journey of transformation; and
- embedding security at every step of the journey.
Joubert said that Dimension Data has already helped a number of organisations using its Data Centre Development Model with excellent results. “We helped one organisation build a virtual data centre, which delivered a 30% reduction in real estate through consolidation and data centre design. Another client saw new resources deliver services 75% faster to its end-users leveraging network extensions to cloud resources.”
About Dimension Data
Founded in 1983, Dimension Data plc is an ICT services and solutions provider that uses its technology expertise, global service delivery capability, and entrepreneurial spirit to accelerate the business ambitions of its clients. Dimension Data is a member of the NTT Group. www.dimensiondata.com. Visit us at Facebook and LinkedIn, or follow us on Twitter