Leader in Direct-to-Cloud Backup and Disaster Recovery Adds Financial Growth Expert to Executive Management Team
SUNNYVALE, Calif. — Zetta today announced that Peter Chantel has been named as the company’s Chief Financial Officer. As CFO, Chantel will play an integral role in building and shaping the company’s long-term financial model, accounting systems and internal controls. In addition, Chantel will apply his expertise in both start-up and high-growth environments to build revenue strength and raise capital.
“Peter is an outstanding financial executive and an experienced CFO,” said Mike Grossman, CEO, Zetta. “As we continue to map out our strategies for long-term growth, his experience in driving financial discipline, strategic deal making and business development will be valuable assets to the team and contribute positively to our fiscal management, profitability and success.”
Chantel enters Zetta as the company refines its strategy to capitalize on the significant market opportunity for cloud-based backup and recovery solutions which, according to a 2015 IDC report, are expected to account for more than $1 billion by 2018.
“I am pleased to join the Zetta management team and look forward to having an active role in the success of a company so ripe with opportunity and growth potential,” said Chantel. “In my many years working with start-up and high-growth technology businesses, I can’t think of a technology opportunity more properly aligned with a market need as what we have in front of us at Zetta. Zetta’s 100% cloud-based model for backup and disaster recovery is a game changer for today’s mid-size businesses that need to quickly enable true business continuity in a competitive market landscape.”
Chantel brings more than 24 years of senior financial leadership to Zetta. Most recently he served as CFO for SugarSync where he helped to drive the financial strategy which led to its acquisition by J2 Global. Chantel has also held CFO positions with Akimbo Systems and Signatures Network and was a co-founder of OnVideon, Inc. He has additionally served in financial executive and analyst positions with AT&T and Colony Capital. Chantel is CPA certified, a member of AICPA and holds a Bachelor’s Degree in Accounting from DePaul University.
Zetta is an award-winning provider of high-performance cloud backup and recovery solutions that are a worry-free choice for businesses and managed service providers. The Company’s direct-to-cloud approach provides businesses a fast and reliable way to protect, access and quickly recover their business-critical data and systems—both physical and virtual – without the need for costly extra hardware.
For more information, visit www.zetta.net.
Mergers generally fail and large mergers generally fail spectacularly, so I get why many of my peers think the Dell/EMC merger will be a train wreck. They also thought Dell couldn’t be taken private because, generally, for a company like Dell, the path would be virtually impossible particularly if you had a corporate raider like Carl Icahn working against you.
But here’s the thing: I’ve spent a lot of time looking at merger processes. I ran a merger clean-up team when I was at IBM (and I was really busy), and I’ve looked at Dell’s process in depth, one that was initially developed at IBM but refined at Dell. I learned there is nothing like it. Granted, a large merger will stress any process but, given EMC’s structure and Dell’s approach, there should be little customer impact for 12 to 18 months, and much of that initial impact should be positive.
In most every other large merger, there would be a reason to run for the hills, largely because most large companies don’t want to learn from their mistakes and would rather focus on shooting the people that made them. But Dell is very different. It actually has an incredibly successful merger process that, for some screwy reason, no one else seems to want to emulate.
I’ll compare the HP/Compaq merger that I thought was idiotic to the Dell/EMC merger, so you get a sense of what makes this different.
US government agencies are no longer allowed to build or expand data centers unless they prove to the Office of the Federal CIO that it’s absolutely necessary, according to a new memo released by the White House’s Office of Management and Budget.
The new Data Center Optimization Initiative replaces the now six-year-old Federal Data Center Consolidation Initiative and has much stricter goals and additional rules meant to reduce the government’s sprawling data center inventory and the amount of money it takes to maintain it.
The government spent about $5.4 billion on physical data centers in fiscal year 2014. The new initiative’s goals are to reduce data center spending by $270 million in 2016, by $460 million in 2017, and by $630 million in 2018, for a total of $1.36 billion in savings over the next three years.
The current approach to business continuity, which generally focusses on ‘what could happen’, has significant limitations says Graham Goodenough. In this article he explains why this is the case; and suggests a better, more positive, method.
The use of the term ‘resilient enterprise’ as expressed in this article, applies to a business that has been purposely designed to have the ability to adapt to significant increases, or decreases, in production/service demands from the market it serves, and which can adjust demands within an acceptable time frame that is not financially detrimental to the business. Establishing such an ability for critical activities to respond within the business for normal operations and any unplanned disruptions will provide flexibility within the organization that will enable capacities to be delivered as needed, and maintain business income, whatever may be the cause of disruption.
In the second article in a three-part series exploring ‘people and resilience’, Paul Kudray looks at a common misconception: that when disaster strikes employees will automatically rally round and play their part in helping the organization recover.
I’m sure you’re familiar with the phrase: “I hate my job!” You may even have used it: possibly on more than one occasion.
You and I know there are people who have dream jobs; they work in their favourite place, doing the things they love to do, and they even have great bosses! Yes, it happens!
The employers they work for may even have a great resilience plan. Everyone in the organization may be aware of it and each person may know what to do when the proverbial hits the fan. In short it’s a fantastic resilient organization, based around the people who make it work.
Businesses often overlook the usefulness of service management tools that they already have at their fingertips as a way to streamline and effectively manage internal risk processes. Dean Coleman looks at some practical steps that businesses can take to utilise these for effective IT risk management.
IT is playing an increasingly prominent role within every organization and IT service managers need to be keenly aware of the importance of risk management to ensure they have control and influence over any issues likely to get in the way of the smooth running of the business. Technology is now so pivotal to the healthy running of the majority of companies that IT risk management has become a key discussion point on the corporate agenda of many boardrooms, as downtime of critical systems – whether due to accidental or malicious intention – threatens to undermine the productivity of the entire organization. Yet, despite its importance, many organizations still use manual spreadsheets to manage risk which are not dynamically linked to IT real estate, so lack any ability to equate theoretical IT risk with the actual situation on the ground.
Businesses often overlook the usefulness of service management tools that they already have at their fingertips as a way to streamline and effectively manage internal risk processes. Many service management tools are likely to already have a database of IT assets and users, so it makes sense to link IT risk management to your overall service management capabilities. That being so, what are the practical steps that businesses can take to rest back control of their IT assets and ensure that problems in one area of the business don’t have a knock-on effect on other functions?
The Business Continuity Institute’s annual North America business continuity and resilience awards will be presented at a ceremony on March 15 at DRJ Spring World 2016 in Orlando. The shortlist of finalists is as follows:
Continuity and Resilience Consultant
Suzanne Bernier MBCI, President of SB Crisis Consulting
Christopher Duffy, Strategic BCP
Christopher Rivera MBCI, Lootok, Ltd
Continuity and Resilience Professional (Private Sector)
Pauline Williams-Banta, Business Continuity Manager, The Energy Authority
Aaron Miller MBCI, VP/Director of Business Continuity, Fulton Financial Corporation
Linda Laun, Chief Continuity Architect, IBM
Continuity and Resilience Newcomer
Bradley Hove AMBCI, Consultant, Emergency Response Management Consulting Ltd
Greg Greenwald, BCM Consultant, Lootok, Ltd
Bryan Weisbard, Head of Threat Intelligence, Investigations & Business Continuity, Twitter
Continuity and Resilience Professional (Public Sector)
Nina White, Business Continuity Manager, Talmer Bank and Trust
Ira Tannenbaum, Assistant Commissioner for Public/Private Initiatives, New York City Office of Emergency Management
Continuity and Resilience Team
Aon Business Continuity Team, Global/Americas Team
The Devry Online Service (DOS) Core Business Continuity Team
Aon’s Global Business Continuity Management Team
Health Partners Plan (HPP) Business Continuity Team
CBRE Business Continuity Management Team – Americas
Continuity and Resilience Provider (Service/Product)
Premier Continuum Inc ParaSolution BCM Software
Fusion Risk Management Inc, and the Fusion Framework BCM Software
AtHoc, a division of Blackberry
Strategic BCP® ResilienceONE® BCM Software
Continuity and Resilience Innovation
The Everbridge platform
Mars, Resiliency Summits, #WeGotThis, BCM Portal
Fairchild Consulting, FairchildApp
Most Effective Recovery
Aon Global Business Continuity Management Team – Americas
Frank Leonetti FBCI
Howard Mannella MBCI
Brian Zawada FBCI
This year’s international Business Continuity Awareness Week is taking place from 16th-20th May 2016 and a set of four posters for promoting it is now available.
The theme for BCAW 2016 is ‘return on investment’, so all four posters display the message ‘Discover the value of business continuity’.
The posters are free to download either as a PDF in various shapes and sizes, or as a JPG. They are also available with or without bleeds depending on whether you would like to print from your own computer, or you would like to get them professionally printed. The BCI also encourages sharing of the image versions through social media channels to spread the message.
Thales has announced the publication of its 2016 Global Encryption Trends Study. The report, based on independent research by the Ponemon Institute and sponsored by Thales and Vormetric Data Security, reveals that the use of encryption continues to grow in response to cyber-attacks, privacy compliance regulations and consumer concerns and highlights that the majority of organizations plan to transfer sensitive data to the cloud within the next two years.
The global encryption study is in its 11th year and shows how organizations around the world are dealing with increased vulnerabilities and implementation of encryption to protect their most sensitive data. The Ponemon Institute surveyed more than 5000 business and IT managers in the US, UK, Germany, France, Australia, Japan, Brazil, the Russian Federation, Mexico, India, and for the first time this year Saudi Arabia and United Arab Emirates, examining global encryption trends and regional differences in encryption usage.
Key findings include:
- More than half of respondents (56 percent) are transferring sensitive or confidential data to the cloud: and this will rise to a total of 84 percent in the next two years.
- Support for both cloud and on-premise deployment was rated the most important consideration when deploying encryption solutions.
- Employee and HR data is the most commonly encrypted data – higher even than payment data, intellectual property or financial records – indicating a higher sensitivity to protecting personal information.
- The number one perceived threat to data exposure is employee mistakes, followed by system or application malfunction rather than external attack or malicious insiders.
NORTH LITTLE ROCK – Arkansas residents who have registered with FEMA for disaster aid are urged by recovery officials to “stay in touch.” It’s the best way to get answers and resolve potential issues that might result in assistance being denied.
“Putting your life back together after a disaster is difficult,” said John Long, federal coordinating officer for FEMA. “While the process of getting help from FEMA is intended to be simple, it’s easy to understand how sometimes providing important information is overlooked or missed.”
Residents of Benton, Carroll, Crawford, Faulkner, Jackson, Jefferson, Lee, Little River, Perry, Sebastian and Servier counties affected by the severe storms Dec. 26 – Jan. 22, 2016 may be eligible for disaster assistance and encouraged to register for assistance with FEMA.
After registering, it’s important to keep open the lines of communication. “It’s a two-way street,” said Long. “FEMA can’t offer assistance to survivors who – for whatever reason – have not provided all the necessary information.”
After registering with FEMA, applicants will receive notice by mail within 10 days on whether or not they qualify for federal disaster assistance.
- If eligible, the letter explains how much the grant will be, and how it is intended to be used.
- If ineligible – or if the grant amount reads “0” – you may still qualify. The denial may just mean the application is missing information or that you missed an appointment with an inspector.
Applicants who are denied assistance may call the Helpline to understand why, or go online to www.disasterassistance.gov or m.fema.gov. Becoming eligible for assistance may be as simple as supplying missing paperwork or providing additional information.
FEMA looks at a number of things to determine if a survivor will receive disaster assistance. The agency must be able to:
- Verify an applicant’s identity.
- Verify damages. If you believe the inspector didn’t see all of your damages, call the FEMA Helpline at 1-800-621-3362.
- Verify home occupancy. Applicants need to provide proof of occupancy such as a utility bill.
- Collect insurance information.
“FEMA personnel are here to help,” said Scott Bass, state coordinating officer with the Arkansas Department of Emergency Management. “Keep in touch. Use the Helpline. You’ll get answers to your questions and help with understanding the assistance process, and ways to move your personal recovery forward.
To register for assistance:
- call 800-621-3362 (FEMA). If you are deaf, hard-of-hearing or have a speech disability and use a TTY, call 800-462-7585. If you use 711-Relay or Voice Relay Services, call 800-621-3362; or
- go to www.DisasterAssistance.gov
The toll-free telephone numbers will operate from 7 a.m. to 10 p.m. seven days a week. Multilingual operators are available.
# # #
FEMA's mission is to support our citizens and first responders to ensure that as a nation we work together to build, sustain, and improve our capability to prepare for, protect against, respond to, recover from, and mitigate all hazards.