The Continuity Logic customized demo provides an opportunity for qualifying organizations to evaluate Frontline Live 5™, with their plans, desired controls, policies, and procedures. This first-of-its-kind system for both business continuity and many other areas of Governance, Operational Risk and Compliance (GRC) is powerful, but often best viewed with some of your familiar plans, data and templates.


Spring World 2016

Conference & Exhibit

Attend The #1 BC/DR Event!

Summer Journal

Volume 28, Issue 3

Full Contents Now Available!

Jon Seals

NEW YORK, NY NYI, a New York company specializing in customized technology infrastructure solutions, announces today that TV Guide Magazine, LLC , one of the most popular magazines in the country with over 12 million weekly readers, has chosen NYI’s New Jersey data center to support its production IT environment. NYI’s secure and highly reliable colocation facility houses TV Guide Magazine’s business critical assets including website, applications, database servers and storage.


As the ultimate authority on all things TV for more than 60 years, TV Guide Magazine allows users instant access to TV programming through any device.  Taking readers behind the scenes of their favorite shows, TV Guide Magazine is the premier source for entertainment news, guidance, and information about the country’s most popular leisure-time activity.


Located at 999 Frontier Road in Bridgewater, NYI’s New Jersey facility is reinforced with N+1 configurations for power, cooling, Uninterruptible Power Supplies (UPS) systems, along with redundancies across its network infrastructure. With SSAE16, HIPAA, PCI compliant data centers located in New York and New Jersey, NYI helps clients across all markets adhere to today’s compliance and regulations.


“TV Guide Magazine requires a hardened, resilient IT infrastructure to ensure our programming, applications and website are always available,” states Al Robertson, Director Information Technology Operations for TV Guide Magazine.  “NYI has proven to be an agile and consultative partner, closely working with us to ensure we had the best solution for our business.”


“NYI works closely with clients and truly develops a sense of partnership – rather than a customer, vendor type relationship that lacks value,“ states Mark Ward, Director of Business Development at NYI. “It’s a pleasure to work with renowned, forward-thinking companies such as TV Guide Magazine.”


NYI has data center facilities located New York and New Jersey, along with Seattle and Los Angeles.  Offering a full suite of managed services, disaster recovery solutions, cloud computing and hybrid configurations, NYI serves clients across healthcare, financial, media and technology sectors.


For more information about NYI, visit www.nyi.net.

Integration isn’t exactly a fast-moving part of IT, so it isn’t usually listed on New Year technology prediction lists. This year, I spied two integration trends among these lists that could potentially shake up IT and the business.

First, CIO.com lists deeper ERP integration as a top trend for enterprise software in 2015. This could be huge for business users, who could then leverage that rich ERP data for other applications — especially CRM. Jeremy Roche, CEO of cloud ERP provider FinancialForce, explained it thusly:



Pricing data backup and disaster recovery (BDR) and business continuity services can be challenging, especially for managed service providers (MSPs) that offer cloud-based storage of customer data.

A time-based cloud retention (TBCR) fixed-pricing model, however, ensures the monthly cost for cloud-based storage of customer data does not vary based on volume.

Also, service providers can use TBCR to offer customers secure, rapidly recoverable off-site backup for a fixed monthly price that is based on how long they need to retain their data.



Never before have there been so many options for alerting the public. In the last few months alone potential for new alerting channels has been unleashed for complementing an already growing array of channels. Names like Google, Twitter, Facebook and the Weather Channel have entered the alerting field. Legacy vendors have enhanced their offerings. The federal government now has impressive alerting success stories to tout. An industry and practice area that once seemed sleepy is wide awake. At the same time, new complexities and challenges have shown themselves.

As part of the move toward ubiquitous alerting, an organization is working to turn online advertisements into emergency alerts. Members of the Federation for Internet Alerts (FIA) are substituting “interest-based advertising” with targeted alerts. Interest-based ads are the ones you see online that know what you’ve been looking for by using Web cookies or mobile service identifiers left behind when you conduct a search or visit a site. Through the FIA plan, interest-based ads would be replaced with emergency alerts for a specific geographic area. The FIA’s Jason Bier, chief privacy officer at the company Conversant, said through a pilot, Amber Alert messages have been exposed via 500 million “impressions” to more than 100 million devices.



Dimension Data’s 700-strong team of security experts’ daily interactions with clients reveal the top five IT security trends for 2015


IT security ‘fire drills’, supported by executive management and the risk committee should be conducted regularly in organisations, in order to understand the appropriate course of action in advance of a security breach. So says Neil Campbell, group general manager for Dimension Data’s Security Business Unit who points out that technologies and services focused on incident response – rather than just incident prevention – should be one of the trends high on the agendas of security professionals in 2015.


This is the top trend on the list of Dimension Data’s team of security experts, following daily interactions with clients. Data breaches such as the March 2014 Target hack[1], the biggest retail hack in US history, as well as allegations of state-sponsored hacking, are a strong warning that organisations need to move beyond focusing purely on the prevention of security incidents, and start to concentrate on what they will do when an incident occurs.


“It’s inevitable that security incidents will occur. It’s therefore critical that organisations begin to focus on identifying what we call ‘indicators of compromise‘, putting a comprehensive incident response plan in place, and performing regular IT security ‘fire drills’”, explains Campbell. He points out the regular fire drills – or rehearsals – will ensure that, in the event of an incident, IT and management teams are clear about what needs to be done, and the business is less at risk. This includes recovering evidence, identifying and resolving the root cause of the incident (not just the symptoms), and undertaking a forensic investigation.

So, what other issues are on the watch-list in 2015 for IT security professionals?


Matt Gyde, Dimension Data group executive – Security Business Unit says: “We’ve identified what we believe to be five of the most significant trends in our industry for 2015. These are not the only areas where change is occurring. However, they certainly warrant discussion.”


He points out that a trend that did not make the top five list, but which is closely linked to each, is the use of data and machine learning, which, when coupled with human interaction can create actionable and contextualised intelligence. “This enables organisations to make rapid decisions on how to protect themselves against a pending attack, how to respond during the attack, and what action to take post-attack.”


Trend # 2 - Managed security services move front and centre

For most businesses, identifying IT security incidents swiftly requires 24/7 coverage of the network environment. This can be costly; IT security professionals are scarce, and require regular training to keep abreast of ever-evolving technologies. However, there’s a drawback to the insourcing model, explains Campbell. To become truly proactive about incident response, organisations need visibility of other networks and to be kept abreast of attacks occurring elsewhere.


Gyde agrees and says in recent years, security management and monitoring have become more complex and time-consuming. Today, you need to prevent what you can, and manage the inevitable compromises. This means optimising your detection, and response capabilities. Many businesses lack the skills required to detect and effectively respond to threats in this manner.


“Managed security services providers have teams of security professionals focused exclusively on identifying potential malware and monitoring thousands of clients’ networks for precursors to denial-of-service attacks. Incidents don’t happen out of the blue: usually there's ‘chatter’ on the popular ‘dark Web’ channels beforehand. Dimension Data, for example, monitors these channels very closely which significantly increases the likelihood that we can forewarn our clients ahead of impending attacks.”


Trend # 3 - IT security gets cloudy

Both Campbell and Gyde predict a continued increase in the adoption of cloud services for security in 2015. “This holds true for software-as-a-service solutions, such as secure Web proxy, and secure email in the cloud. These solutions are particularly attractive as the implementation effort is negligible – you’re simply redirecting traffic to take advantage of the service through a consumption-based model. And the services are highly scalable. If you need to support 20,000 users today and you acquire a company and your headcount suddenly increases to 30,000 in six months, you simply amend your licence agreement, and your new employees will be up and running immediately.”


Application security in the cloud and cloud-based, distributed denial-of-service controls such as those offered by Akamai are other areas of growing interest.


According to Campbell, security of the cloud will become increasingly important as more organisations move their workloads to the cloud. “It’s no good adopting this model only to be told by your auditors a year later that your cloud provider’s security protocols are not up to scratch. I believe we’ll see cloud providers investing heavily in building rich network architectures that support the gamut of security controls, so that they can assure their clients that enterprise-grade security technologies are being applied to their workloads.”


Gyde agrees and says that there’s still some work to be done within the cloud industry and security. “The most secure platforms in the world can still be compromised by human error or poor management,” he adds and points out that another area that needs attention is integration with existing organisational policies and processes. ”It’s very easy for start-up companies to transition to the cloud as they have no legacy physical infrastructure, and can implement “greenfield” security controls. Larger, more established businesses find the prospect of cloud more daunting, as they’re unsure of how to adapt their security controls, policies, and processes to this model.”


Trend # 4 - From security technologies to secure platforms

2015 will also see the notion of security being a secure platform - rather than a series of point products or devices on the network – gaining traction. The expectation on security professionals will be to deliver a secure platform that allows the business to confidently run multiple applications, in a secure environment.

Gyde says for many years, organisations typically bought multiple security products from different vendors. While this helped create ‘defence in depth’, it also introduced complexity and potential risk. After all, 95 percent of successful attacks may be attributed to human error, rather than technology.


“Increasingly, organisations are weighing up their risks and making buying decisions that aren’t necessarily based on best-of-breed technology and are instead adopting a pragmatic, risk-based approach where they work with their existing infrastructure and partners to manage their risks to an acceptable level, rather than aiming for, but never achieving, ‘perfect’ security.”


The concept of cloud and its pay-per-use model is also relevant to this discussion. Organisations want to replicate the consumption-based approach of cloud in an on-premise model, either independently owned, or owned by a trusted service provider or vendor. Increasingly, organisations prefer security partners that are prepared to take on some of the financial risk, while also offering a flexible service construct, for example, one that allows them to turn on a firewall at short notice to deal with a specific event, and the spin it down when the requirement has passed.


The notion of a secure platform directly relates to organisations’ desire for a ‘single pane of glass’ through which to manage their security assets, delivered on-premise, hosted, or as cloud infrastructure. Essentially, this enables robust security to ‘follow’ an organisation’s applications, data, and workloads without any compromises or changes in technology or management being required. This approach also supports and aligns with enterprise mobility requirements for corporate data to be accessible to users anytime, anywhere, and from anyplace.


Trend # 5 - Endpoint security back in vogue

Campbell predicts a resurgence in interest in endpoint security in the industry. “This is closely tied to the first trend we discussed - incident response - and the fact that some traditional network-based security controls aren’t as effective as they used to be. Security professionals will be looking at devices – whether they’re PCs, Macs, or smartphones – for indicators of compromise, and then enabling some form of incident response process. They’ll deploy technologies to endpoints to make incident response easier,” he says.


Application control is also expected to re-emerge as a key focus area for 2015. However, emphasis will be on identifying malicious activity on the endpoint, rather than malicious code. “While user awareness of information security best practices is a key priority, at some point someone is going to click on something they shouldn't, so organisations must be proactive about managing the impact of such events,” Campbell concludes.


[1]In the Target hacking incident, signs of the hack showed up in their event monitoring systems but since the company had too many alerts overall, the importance of these signs were missed. Important to note that the CIO and then CEO were dismissed over this incident.

New functionality includes Android remote control, iOS device enrollment program participation, and one-click app wrapping



LONDON – Wavelink today announced new functionality to its enterprise mobility management product, Wavelink Avalanche, which simplifies the deployment and management of mobile devices.

Wavelink solutions focus on the mission-critical operations of business, where the benefits of improved mobile productivity can yield the most value to the organization. Features of Wavelink Avalanche include the following:


  • Android remote control. Provides the capability to remotely control Android devices so IT can better troubleshoot problems and help users get the most out of their devices.
  • Windows Embedded Handheld. As more device manufacturers look to adopt Windows Embedded Handheld 8.1 on their rugged devices, Wavelink Avalanche is ready to support them and keep workers productive. Wavelink Avalanche is the only solution to provide user targeting to bulk-enrolled devices.
  • One-click app wrapping. With wrapping success rates above 90 percent, Wavelink Avalanche can not only wrap apps quickly and easily, but it can wrap more apps than any other solution.
  • iOS Device Enrollment Program support. Wavelink Avalanche is designed to work with Apple's Device Enrollment Program, enabling Wavelink enterprises to register iOS devices with their preferred profile installed. This creates a ready, secure device with every necessary app installed so the end-user can unbox, power on and use immediately.
  • Certificate management with auto-renew. Not only can Wavelink Avalanche install certificates on mobile devices to provide access to critical systems but, with this update, Avalanche will auto-renew those certificates, allowing users to set it and forget it.
  • Integration with LANDESK Management Suite. Now users can combine Wavelink Avalanche's mobile productivity with best-of-breed PC management to deliver unified support to all the devices they manage - whether PC, Mac, Android or Windows CE.

"As new devices create new opportunities, Wavelink has continually evolved its solutions to ensure customers remain competitive and efficient, even in the most challenging environments," said Stephen Brown, director of product management for Wavelink. "Throughout this transformation, Wavelink Avalanche empowers today's legacy and modern devices' mobile productivity."

To see Wavelink Avalanche's capabilities demonstrated, please visit the Wavelink team at the National Retail Federation's Annual Convention and EXPO, booth #1408, Jan. 11-13 in New York City.


About Wavelink
Wavelink accelerates mobile productivity with solutions that enable supply chain operations. Global organizations across industries such as manufacturing, retail, warehousing and field force automation rely on Wavelink enterprise mobility management, host-connectivity applications, and voice-enablement solutions to connect mobile devices to supply chain management systems, Wavelink products help ensure worker productivity in mission-critical mobile deployments, resulting in reduced costs that can contribute directly to operating margin. Visit www.wavelink.com.

NAKIVO maintains an explosive growth rate in the VMware backup, replication, and recovery market and reveals annual revenue, partners, and customer details for 2014


CAMPBELL, Calif. — NAKIVO Inc., the fastest-growing virtualization and cloud backup software company for VMware environments, today announced 2014 annual results. Named one of the top 10 coolest storage startups of 2014 by CRN, NAKIVO is delivering a new way for cloud providers, enterprises, and SMBs to backup and replicate their VMware infrastructure more reliably, efficiently, and cost effectively. In 2014, NAKIVO has achieved the following:

Revenue: NAKIVO has gained 3X (202%) year-over-year revenue growth in 2014 vs. 2013, demonstrating rapid customer adoption worldwide and fast pace growth in the VMware data protection market. Most of the revenue (64%) came from the EMEA region, while 26% came from North America, and 10% came from South America and Asia.

Solution Partners: NAKIVO has doubled the number of its Solution Partners in 2014 vs. 2013. Over 700 VMware resellers from 72 countries across the Americas, Europe, Africa, Middle-East, and Asia have joined NAKIVO Partner Program and offer NAKIVO products to their SMB and Enterprise customers. In 2014, NAKIVO has further strengthened its global presence by signing distribution agreements with the leading software distributors across the globe, including Arrow (Europe), TriTech (China), Solutions Middle East (Middle East), and REAL Security (Adriatic Region).

Customers: NAKIVO has grown its customer base to over 5,000 customers in 2014 (gaining 2.5X more customers in 2014 compared to 2013). Most of the customers came from the EMEA region (58%), while 27% came from North America, and 15% came from South America and Asia. Some of customer examples are Afrihost (one of the largest ISPs in Africa; saves 600% on VMware backup and replication costs with NAKIVO), ClearCube (a USA-based computer systems manufacturer; reduces VMware VM backup time by 20% with NAKIVO), and Soilmoisture (one of the world's leading manufacturers of agronomy laboratory equipment; uses NAKIVO Backup & Replication to protect their VMware VMs).

Cloud Providers: NAKIVO continues to grow its cloud provider ecosystem: over 60 VMware service providers have joined NAKIVO Cloud Provider program and deliver VM Backup-as-a-Service, VM Replication-as-a-Service, and VM Disaster-Recovery-as-a-Service to their customers using NAKIVO Backup & Replication. Some of the Cloud Providers include American Datacenters (reduces VM data protection costs for clients by 50% with NAKIVO) and eLogic (a leading Internet and cloud services provider in Italy that delivers VM Backup-as-a-Service to clients and improves VM recovery time by 10X with NAKIVO).

Product: During 2014, NAKIVO has released the following four main product versions:

  • v5 featuring Flash VM Boot, which provides the ability to boot VMware VMs directly from compressed and deduplicated VM backups without recovering the entire VMs first

"2014 has been a very successful year for NAKIVO," said Bruce Talley, CEO and co-founder of NAKIVO. "We are excited with the demand for NAKIVO by enterprise SMB customers worldwide, and we’re looking forward to achieving more in 2015."


  • Overview:
  • Datasheet:
  • Backup to Cloud:
  • Success Stories:
  • Trial Download:


Headquartered in Silicon Valley, NAKIVO is a privately-held software company that has been profitable since founding in 2012. With more than 5,000 customers - including many Fortune 1,000 companies - and over 700 channel partners across 72 countries worldwide, NAKIVO develops and markets a line of next generation data protection products for clouds and VMware virtualized environments. NAKIVO provides a fast, reliable, and affordable VM backup and replication solution for enabling SMBs and enterprises to protect and recover VM data onsite, offsite, and to the cloud. NAKIVO has also enabled over 50 hosting, managed, and cloud services providers to create and offer VM Backup-as-a-Service, Replication-as-a-Service, and DR-as-a-Service to their customers. NAKIVO was the first virtualization backup specialist to offer SMBs cloud backup to public clouds such as Amazon and multi-tenancy to cloud service providers and enterprise customers. For more information, please visit www.nakivo.com.

Follow us on Twitter: @NAKIVO

Connect on Facebook: www.facebook.com/NakivoInc

Join us on LinkedIn: www.linkedin.com/company/nakivo

Contact us: Yana Petrenko, MarCom Manager / yana.petrenko@nakivo.com / +1 408 916 5955

(TNS) — There are chilling similarities between the deadly Charlie Hebdo attack in Paris and the Boston Marathon bombings, with lessons to be drawn for law enforcement, terrorism experts say.

Both attacks have been blamed on homegrown terrorist brothers — in each case with a brother who had drawn law enforcement attention for Islamic radical ties before. In both cases, both police and citizens were targeted with equal cold-blooded vigor.

“I think what you’re going to see is governments going through their watch lists to see how many names appear identical. They should have added worry when you have two or three members of the same family giving prior warning, governments should be taking a second and third look at them,” said Victor David Hanson of the Hoover Institution. “When you are dealing with familial relations, it means there are fewer people who have privileged information about the ongoing plotting and the secret is reinforced by family ties ... it’s going to be much harder for Western intelligence to break into them.”



“Pandemic” and “panic” sound a lot alike. Certainly, the first can trigger the second in next to no time, as the recent outbreak of Ebola has demonstrated. But as a leader in your company, you can avoid both by encouraging your cross-functional teams to take the following six steps.



Friday, 09 January 2015 00:00

Why CIOs Will Want Data Lakes

Edd Dumbill may have just won the argument over whether data lakes are a practical, achievable idea.

Data lakes are a simple enough idea: You dump a wide range of data into a Hadoop cluster and then leverage that across the enterprise.

The problem is what Gartner calls the “Data Lake Fallacy,” which is the challenge of managing data lakes in a governable and secure way.

Dumbill acknowledges the barriers to data lake adoption in a recent O’Reilly Radar Podcast. Ultimately, though, the VP of strategy at Silicon Valley Data Science says data lakes will happen for one reason: Data lakes free data from enterprise silos.

“One of the hardest things for organizations to get their head around is getting data in the first place,” Dumbill told O’Reilly’s Mac Slocum. “A lot of CIOs will be, ‘Great, I want to do data science but I’ve got this database over here and this one over here and these all need to speak to each other and they’re in different formats and so on.’ In many ways, having data in a data lake provides you with a foundation (with) which you can start to integrate data with and then make it accessible as a building block in an organization.”