Fall World 2016

Conference & Exhibit

Attend The #1 BC/DR Event!

Summer Journal

Volume 29, Issue 3

Full Contents Now Available!

Jon Seals

Leading Channel-Only Storage Provider Delivers New Resources and Benefits to Empower Solution Partners to More Easily Store, Protect and Connect Valuable Business Assets
CAMPBELL, Calif. NexsanTM, a global leader in secure storage, backup and data management solutions, today announced its enhanced Nexsan Channel Partner Program which now includes an expanded line of Nexsan-branded unified hybrid storage, high-density storage and secure archive storage systems as well as the Transporter-branded private cloud file sync and share appliances.  The newly tiered partner program also features compelling benefits and broad enablement resources including a LeadGuard program, a campaign creator and automated quote creation - all designed to enhance joint field engagement and make the sales and marketing process more efficient.
Empowering Partners to Capitalize on a New Era of Storage
By adding the Transporter private cloud storage appliance family to the Nexsan partner program, Nexsan is quickly enabling its partners to capitalize on the "white-hot" file sync and share market with an innovative private cloud storage solution that delivers mobile access and file sharing capability to content stored securely in the data center, behind an organization's firewall. Transporter keeps data safe and secure while allowing users to access, share and synchronize data anytime, anywhere for business advantage. The result is a more flexible and higher performing private cloud solution with enterprise-class redundancy and seamless failover for reliability that facilitates a more connected and productive workforce. 
The Transporter family is completely complementary to Nexsan's broad storage solution portfolio, providing an easily integrated, secure private cloud that delivers public-cloud features for sharing and accessing files stored on primary storage infrastructure. Nexsan's NSTTM unified hybrid storage system offers high performance, flexible primary storage that scales to 5PBs and is an ideal mid-enterprise solution at a price point that bigger vendors struggle to meet. E-SeriesTM has long been a channel favorite for high-density storage systems for up to 360TBs in a 4U rack and now the BEAST is back which is an ideal solution for high volume applications including digital video surveillance, big data repositories, data archives and disk-to-disk backup. In addition, AssureonTM secure archive, compliant storage systems, designed for highly regulated applications as well as being a cost effective solution for primary storage offload completes an extensive range of solutions specifically built for the mid-enterprise. Together, this comprehensive line of storage solutions deliver the capacity, performance and flexibility partners need to empower customers to achieve more with their valuable data assets.
Partner Enablement to Expand Opportunities and Drive Revenue
As a 100 percent channel-based company, Nexsan has a rich history of working closely with its partners delivering the product training, marketing, sales and technical support that expands opportunities and drives revenue growth. According to a TechValidate survey, Nexsan increased annual revenue between 5 and 30 percent for 60 percent of its partners. In addition, Optera Research Group validated that partners gave Nexsan an 80 percent overall satisfaction rating with as many as 89 percent of partners saying they are willing to recommend Nexsan, ranking higher than any other brand carried by the participating partners.
"Nexsan delivers one of the most robust storage portfolios to achieve the innovative storage, protection and management of valuable business data," said Jennifer Manzano, CEO Westlake Technologies Inc. "WTI has increased its total annual revenue by more than 50 percent by offering Nexsan products. Now, with the addition of its Transporter private cloud file sync and share applications, it has further extended its offerings to provide the powerful collaboration and file sharing security our customers demand. We are pleased to expand our Nexsan partnership."
"The expanded Nexsan portfolio means we can extend the highly consultative approach we take towards delivering innovative and relevant solutions to our customers, " said Mick Cooper, Director, iSYS Data Solutions. "We have customers with 500 employees and others with 50,000. But whatever the company size, whether they need high-density storage, secure archive storage, or a way to securely sync and share files, with Nexsan we now have the right solution to fit."
With its newly expanded partner program, Nexsan offers performance-based incentives based on three program tiers: Gold, Silver and Bronze. Each tier will receive program benefits in alignment with their sales attainment goals and marketing performance, including new support and services designed to share the cost of tactical program execution.
Among the new benefits for qualified partners include:
  • Market Development Funds for shared marketing programs
  • LeadGuard Opportunity Registration for deal and project opportunities
  • Aggressive Commercial Models for fast profitable sales
  • Demo Equipment Access for testing and proof of concept demonstrations
  • Sophisticated Campaign Creator for easily creating and executing partner-branded campaigns
  • Extensive Training and Certification Paths for exceptional professional services delivery
  • A World-Class Partner Portal with access to a wealth of resources, marketing content, sales tools, incentives, promotions and more, 24 x 7
"Nexsan is one of the most trusted brands in the storage channel ecosystem, delivering more than 37,000 storage systems across 60 countries and counting," said Russ Johnson, CRO, Nexsan. "Today we are looking to further accelerate this channel success with a strong partner program that features new incentives and enablement tools designed to grow revenue opportunity for incremental growth. We have also added the complete line of Transporter private cloud file sync and share appliances to the program, so that our partners can go beyond traditional storage and data protection and truly differentiate their business with a new proposition for storage collaboration and connectivity."
To learn how to join the Nexsan Partner Program, please visit: http://nexsan.com/nexsan-partners.
To learn more about Nexsan's award-winning unified storage solutions family, please visit: www.nexsan.com
Tweet this: .@Nexsan Expands Global #Channel Partner Program for complete portfolio of unified #storage solutions including #Transporter & #BEAST
About Nexsan
Nexsan is a global leader in secure storage, backup and data management solutions that are focused on seamlessly and securely enabling a connected workforce. Its broad solution portfolio empowers enterprises to securely manage, protect and utilize valuable business data - while allowing users to sync, share and access files from any device, anywhere, anytime. For further information, please visit: www.nexsan.com.
Imation, the Imation logo, Nexsan, the Nexsan by Imation logo, Connected Data, the Connected Data logo, Transporter, E-Series, NST, AutoMAID, and Assureon are trademarks or registered trademarks of Imation Corp. All other trademarks are property of their respective owners.
Zetta 2016 SMB Recovery Readiness Study Reveals How Vulnerable Small Businesses are to Downtime Due to Disaster or System Failure

SUNNYVALE, Calif. Small and mid-sized businesses report that they are increasingly focused on disaster recovery (DR) readiness, with as many as 84% of SMBs noting that several days of IT downtime would result in moderate to catastrophic costs and loss. To make sure that they are covered in the event of a disaster, more than half (53%) rely on more than one DR method to “hedge their bets” to ensure recoverability. These results are according to a new study by Zetta, a leading provider of high-performance cloud backup and disaster recovery solutions.

Cloud DR Adoption is Rapidly Growing

The findings demonstrate trends in the growing use of cloud-based recovery and business continuity solutions. In fact, more than one in three (37%) are using the cloud as part of their DR solution today, up from 26% last year. In addition, as many as 10% use only cloud-based solutions for DR, up from just 4% last year. And of those planning to add a new DR method in the next 12 months, more than half (57%) plan to add a cloud-based solution.

“The cloud is transforming disaster recovery and business continuity strategies like never before,” said Mike Grossman, CEO, Zetta. “New technology that dramatically increases the speed of recovery, while keeping costs low and reliability high, is making the cloud a very attractive option for SMBs that need to assure disaster recoverability in the same ways as their large competitors.”

Still DR Preparedness Lags

Even while SMBs recognize the vital nature of their DR and business continuity strategy, they fail to monitor and ensure security of their DR solutions. One-third (33%) of the IT professionals surveyed reported that they rarely test their DR plan, while an astounding 62% only test their DR plan once a year or less. Even more surprising, as many as 13% of IT professionals admit that their organization doesn’t have a technical disaster recovery strategy and another 14% report that they don’t have offsite DR protection making them vulnerable to an onsite disaster.

Cost and Speed of Recovery are Most Important

When asked about the top three most important factors of a DR solution, cost was named 65% of the time. Cost was followed closely by speed of recovery (61%), reliability (60%) and simplicity (60%). Usability (54%) was identified more as a “nice to have,” but not a top priority.

Other highlights the study found include:

  • Organizations use a varying mix of DR strategies. This includes:
    • On-premise and physical offsite (26%)
    • Physical offsite only (23%)
    • On-premise only (14%)
    • On premise, physical backup and cloud (14%)
    • Cloud only (10%)
    • On-premise and cloud (9%)
    • Physical offsite and cloud (4%)
  • Virtual infrastructure dominates today’s environments. When asked the amount of servers organizations have that are virtualized:
    • 46% have a mostly virtualized environment with a few remaining physical servers
    • 20% have an evenly split physical and virtual environment
    • 16% have a few virtual servers, but the majority of their environment is physical
    • 12% reported that all servers are physical
    • 6% are all virtual

“SMBs have made increasing investments into their virtual infrastructure to save on costs and resources, yet DR strategies to protect those virtualized workloads are still falling behind in comparison,” added Grossman. “The cloud is delivering impressive new options for these organizations with a strong combination of reliability, recovery speed and attractive pricing. As a result, organizations are able to efficiently assure disaster preparedness to avoid the increasing fear of a catastrophic loss.”

About the Zetta 2016 SMB Recovery Readiness Study

For the Zetta 2016 SMB Recovery Readiness Study, Zetta surveyed more than 300 IT professionals about their disaster recovery solution and IT environment. The survey was conducted online and included organizations in over 15 industries, ranging in size from less than 50 to more than 1,000 employees.


About Zetta
Zetta is an award-winning provider of high-performance cloud backup and disaster recovery solutions that are a worry-free choice for businesses and managed service providers. The Company’s direct-to-cloud approach provides businesses a fast and reliable way to protect, access and quickly recover their business-critical data and systems—both physical and virtual – without the need for costly extra hardware. For more information, visit www.zetta.com.


CHICAGO – CNA is kicking off spring with its PrepWise Hail & Flood campaign to help its customers prepare their businesses for potential property exposures that arise during months when flooding is more common.

"According to the National Weather Service, each year, more deaths occur due to flooding than from any other severe weather-related hazard," said Bill Boyd, Senior Vice President, Risk Control, CNA. "That's why preparing for such incidents can help safeguard physical assets, as well as reduce the probability of a serious interruption to business operations."

With proper preparation, businesses can mitigate their flood risks from spring showers, swelling rivers and any melting snow. Flooding is commonly defined as the rise and overflow of a body of water that covers the land not usually under water. 

To help its customers, CNA Risk Control has identified these five simple tips for flood prevention:  

  • Tip 1: Create a flood preparation plan.
  • Tip 2: Keep water out with barriers, sandbags and other devices.
  • Tip 3: Relocate materials from lower levels. In some cases, this may simply mean placing stored items on one or two pallets, or moving items from lower shelves or racks to upper levels.
  • Tip 4: Review shut-down procedures for affected processes, especially hazardous processes.
  • Tip 5: Check to make sure drainage, including roof drains, are open and flowing freely.

For more information about PrepWise, please contact Brandon Davis at 312-822-5167. CNA will also provide a series of actionable tips on its social media channels. Additional information and emergency preparedness resources can be found at www.cna.com/prepwise.

PrepWise is the company's preparedness campaign designed to help customers think ahead and prepare their business for critical exposures all year round. PrepWise is divided into six themes: Winter Prep, Hail & Flood, Hurricane, Heat & Wildfire, Cyber Security and National Preparedness.

About CNA
Serving businesses and professionals since 1897, CNA is the country's eighth largest commercial insurance writer and the 14th largest property and casualty company. CNA's insurance products include standard commercial lines, specialty lines, surety, marine, and other property and casualty coverages. CNA's services include risk management, information services, underwriting, risk control and claims administration. For more information, please visit CNA at www.cna.com. "CNA" is a service mark registered by CNA Financial Corporation with the United States Patent and Trademark Office. Certain CNA Financial Corporation subsidiaries use the "CNA" service mark in connection with insurance underwriting and claims activities.

Follow CNA (NYSE: CNA) on: Facebook | Twitter | LinkedIn | YouTube

Last month I presented at “Cyber Security Exchange Day,” hosted by the folks at Bryant University and OSHEAN. It was a great event, filled with lots of discussion about what’s happening in the world of cyber security and how the threat landscape is evolving and impacting all forms of IT.

Although the cloud is being more widely adopted, cloud security remains a top concern among enterprise IT professionals. In recent years, news headlines have been filled with enough stories about compromised data security to drive executives away from networked and cloud solutions and back to the proverbial days of stuffing cash in a mattress.

However, while these high-profile news stories drive much of the narrative around data security, the reality is that the vast majority of network security attacks are far more basic in nature. It’s important for organizations to recognize that threats to a computing environment are always present, and that they need to take a more practical approach to manage against real--not simply perceived--threats.



Businesses competing on data must be masters of change. To keep pace with constantly shifting business models, markets, and customer expectations, companies must become more agile, which includes empowering employees with insights that are available at their fingertips.

Self-service analytics is one of the tactics separating industry leaders from laggards.

In today's world, "self-service" is no longer synonymous with passively consuming static reports pre-packaged by IT. It's more about building one's own reports, exploring data, and interacting with it.



Last week, I wrote about Jessica Kriegel, senior organization development consultant at Oracle, who argues that generational stereotypes, like the widespread notions we’ve all read about millennials as entitled, tech-savvy, structure-averse job-hoppers, are harmful to workplace fairness and productivity. In my interview with Kriegel, I also drilled down on the issue of stereotyping as it pertains to IT professionals, which warrants further discussion here.

I found Kriegel, a millennial herself, to be persuasive in her argument, which she makes in her new book, “Unfairly Labeled: How Your Workplace Can Benefit from Ditching Generational Stereotypes.” I also found her to be refreshingly candid. She didn’t miss a beat, for example, in responding to my question about what sorts of generational stereotyping she has found to be most common within Oracle:

I can only speak to the groups that I have worked with. I was brought in to work with the product development team. The managers were basically saying that millennials could not easily transition from college to corporate. They felt like millennials were bringing the college campus style to the corporate atmosphere. So I was brought in to resolve that issue—to teach the millennials how to be more professional, more corporate, and less casual and college-like. That manifested itself in many ways. Some of it had to do with dress code; some of it had to do with productivity; some of it had to do with expectations with regard to work/life balance.



Almost nine in 10 (87 percent) organizations have faced a disruptive incident involving third parties in the last three years, according to a survey from Deloitte. Such incidents can include loss of data by a third party, or failure to deliver a service or product on time. The Deloitte survey also highlights the increasing frequency and impact of these disruptions, illustrating the significant need for organizations to invest in better governance and risk management related to third parties.

Of the organizations surveyed, nearly all (94.3 percent) felt low to moderate levels of confidence in the tools and technology currently used to manage their third party risk, with similar sentiment expressed in supporting risk management processes (88.6 percent). At the same time, 73.9 percent of respondents believe that third parties will play a highly important, or even critical, role in the year ahead. This is up from 60.3 percent a year or more earlier.

Kristian Park, partner and global head of third party governance and risk management at Deloitte, states: “With reliance on third parties set to grow, now is the time to address the ‘execution gap’ between risk and readiness. The impact of third party incidents ranges from reputational damage, regulatory and data breaches, through to actual lost revenue and future business. Increasing frequency of third party incidents, some high profile, has driven a shift in motivation of organizations to improve their risk management. Third parties are increasingly seen as a route to gaining competitive advantage. They are often viewed as trusted advisors who bring in specialised skills or knowledge. It is therefore also important to recognise the opportunity that third parties create for organizations.”

The 2016 global survey on third party governance and risk management is based on the responses of over 170 senior members of management from a variety of organizations, the majority of which had annual revenues in excess of US$1 billion.


A new survey conducted by Continuity Software shows that private cloud environments are not as resilient as traditional data centers / centres. Close to half of the companies (45 percent) that have migrated portions of their mission critical systems to the private cloud environment fail to meet their availability goals , compared to 30 percent of the companies that have not migrated to the cloud.

The survey also shows that the primary challenge in ensuring IT resiliency is keeping up with new technologies and vendor best practices, creating a knowledge gap that IT teams are struggling to close. The gap is particularly evident for companies that are in the process of transitioning to the cloud, with two-thirds of these companies reporting the knowledge gap and proactive identification of risks as their primary challenges.

"While the transition of mission critical systems to the cloud has been underway for several years, IT organizations have a steep learning curve to go through," said Doron Pinhas, CTO, Continuity Software. "The level of organizational competency and the maturity of the tools for managing private cloud environments are still far from where they need to be to ensure enterprise-grade resiliency.”


The Information Commissioner’s Office really had no choice but to come down hard on the National Offender Management Service recently, after a portable hard drive used to back up the prisoner intelligence database went missing from a prison security department.
Although nobody knew when it had actually gone missing, it could have been gone for almost a week since it had last been used on 18 May 2013 for the weekly back up - but was missing when staff went to back up six days later. It had not been locked in the fireproof safe afterwards, contrary to policy. Not only was it missing, it was also unencrypted and had not been password protected. It contained sensitive information about almost 3000 prisoners, including names and dates of birth, length of sentence, offence(s), physical descriptions and distinguishing marks, plus intelligence information about drug use and links to other prisoners or organised crime - certainly not the sort of details you’d want to lose.
Although only nine staff members had access to the area where the hard drive was used and the area was controlled by a keypad system, the door to the Security Department could be opened by anyone on the prison staff.

High school students thinking about a college education and career in the cybersecurity field may want to begin preparing now.

There are numerous programs to help high schoolers learn about cybersecurity, gain experience for potential summer internships, and enhance college applications.

Hacker High School

Hacker Highschool provides a set of free hands-on, e-book lessons designed specifically for teens to learn cybersecurity and critical Internet skills. These are lessons that challenge teens to be as resourceful and creative as hackers with topics like safe Internet use, web privacy, online research techniques, network security, and even dealing with cyber-bullies. The full program contains teaching materials in multiple languages, physical books with additional lessons, and back-end support for high school teachers and home schooling parents.

The non-profit ISECOM researches and produces the Hacker Highschool Project as a series of lesson workbooks written and translated by the combined efforts of volunteers world wide. The result of this research are books based on how teens learn best and what they need to know to be better hackers, better students, and better people.