Spring World 2015

Conference & Exhibit

Attend The #1 BC/DR Event!

Winter Journal

Volume 28, Issue 1

Full Contents Now Available!

Jon Seals

IDG NEWS SERVICE (Boston Bureau) — Companies that move the bulk of their IT operations to cloud services can end up realizing significant overall cost savings, according to a study by analyst firm Computer Economics.

The study looked specifically at companies that had moved mostly to the cloud and compared their spending habits to those of "more typical organizations," report author and Computer Economics President Frank Scavo wrote.

Computer Economics surveyed seven organizations with revenue ranging from US$50 million to $550 million. While acknowledging the sample size is small, the respondents' relative size is crucial, Scavo said in an interview.

...

http://www.cio.com/article/748531/Study_Companies_that_go_all_in_with_SaaS_can_save_big

Friday, 21 February 2014 16:37

Cloud Storage for Business: Pros and Cons

There are critical differences in cloud storage according to backup size and priority. SMB – including education and small government agencies – primarily require acceptable backup and restore performance plus security and compliance reporting. The enterprise needs these things plus additional solutions for backing up larger data sets across multiple remote sites and/or storage systems and applications.

Note that no one is talking about backing up the corporate data center’s petabyte-sized storage to the cloud, not yet anyway. At its present level of development, online backup is best done for smaller scale systems. But even with this limited approach, it can have real advantages for business backup.

Cloud storage is not a do-all and be-all of data protection but it does have real benefits for some environments. One of its biggest advantages is replacing extensive off-site tape vaults. Tape libraries for active archives and massive on-site backup can be quite valuable in big data environments. But traditional off-site vaults require users to change tapes, label them, track usage, and order the truck to take them to the off-site vault; then go through another multi-step process to recover the tapes. In this respect online backup is far easier and less prone to manual error.

...

http://www.itbusinessedge.com/articles/cloud-storage-for-business-pros-and-cons.html

Thursday, 20 February 2014 16:49

C’Mon Man Or the End of the World?

It’s the end of the world as we know it,

It’s the end of the world as we know it

It’s the end of the world as we know it, and I feel fine

 The above lyrics came from REM and they reflect how I generally feel about law firm and lawyer pronouncements about the Foreign Corrupt Practices Act (FCPA) enforcement because [SPOILER ALERT] I am a lawyer, I do practice law and I do work for a law firm, the venerable TomFoxLaw. The FCPA Professor regularly chides FCPA Inc. for their scaremongering tactics, usually monikered as ‘Client Alerts’. Mike Volkov is even more derisive when he calls them the FCPA Paparazzi and cites examples from his days in Big Law, where law firm marketing campaigns are centered around doomsday scenarios about soon-to-occur FCPA; UK Bribery Act; or [fill in the anti-corruption law here] prosecutions and enforcement actions. I usually take such law firm scaremonger and blathering’s to be about worth as much as the paper they are printed on. Indeed I chide the FCPA Professor and Monsieur Volkov for their protestations. In other words, I feel fine.

...

https://tfoxlaw.wordpress.com/2014/02/20/cmon-man-or-the-end-of-the-world/

How many passwords do you have? How many can you remember – and what do you do about the others? Business and consumer life is controlled to a significant degree by passwords. It’s a balancing act between making them memorable (for their rightful owners) without opening the door to password abuse or theft. The business continuity challenges that organisations face include weeding out passwords like ‘secret’, ‘1234’ or even just ‘password’, restricting password knowledge to only those who should know, and dealing with passwords that have been forgotten.

...

http://www.opscentre.com.au/blog/the-perils-of-the-password-how-to-protect-your-business-continuity/

Organizations are dealing with more data coming in and out from all sorts of directions these days, without a doubt. Dealing strategically with that data, from integration to analysis, is a huge part of this blog’s goal.

Sometimes, however, you have to stop and smell the tactical. And a recent study conducted by the government IT site MeriTalk raises some BIG red flags about whether federal, state and local governments can manage the influx of data we’re about to see.

The report identifies five factors, which it calls the Big Five of IT, that will significantly affect the flow of data into and out of organizations: Big Data, data center consolidation, mobility, security and cloud computing.

...

http://www.itbusinessedge.com/blogs/integration/survey-shows-government-pipelines-not-ready-for-data-heavy-projects.html

Thursday, 20 February 2014 16:46

The x86 and the Enterprise

Most IT professionals these days are well aware of the coming changes in data center infrastructure – perhaps not on an intimate level just yet, but many of the basic concepts behind cloud computing and software-defined infrastructure seem clear enough.

Last week, I highlighted some of the thinking around the advent of enterprise-class ARM infrastructure in the data center, with the note that ARMs are primarily suited toward large-volume, small-packet workloads characteristic of mobile and web-facing applications. But while much of the trade press has focused on the ARM ultimately “taking over” the data center, knocking the x86 off its 30-year perch, the reality is a bit more nuanced.

The thing is, web/mobile applications are not the only thing coming the enterprise’s way. There are also things like Big Data, enterprise application processing, and even desktop video conferencing and surveillance data to take into consideration. These functions typically involved lower-volume, large-packet workloads, which are more suited to the x86.

...

http://www.itbusinessedge.com/blogs/infrastructure/the-x86-and-the-enterprise.html

Thursday, 20 February 2014 16:45

How to Rethink Security for the New World of IT

InfoWorld — "We shall fight on the beaches. We shall fight on the landing grounds. We shall fight in the fields and in the streets. We shall fight in the hills. We shall never surrender," said Winston Churchill in his famous June 1940 speech in the face of Nazi attacks on England. His earlier committment to the goal of victory, "however long and hard the road may be," is an apt analogy to the security battles that enterprises face.

The bad guys are persistent and sophisticated, and they're making inroads. It is hard to be optimistic when customers, investors, and regulators expect us to totally protect precious assets and preserve privacy, while some governments and vendors on whom we depend are themselves compromising our data, software, and networks.

The fight for security is harder than ever. Most organizations are fighting today's war with yesterday's tools and approaches -- such as protecting perimeters with passwords and firewalls -- and losing. There is too much emphasis on walling off our data and systems, and a misplaced belief that the secured-perimeter approach is adequate.

...

http://www.cio.com/article/748436/How_to_Rethink_Security_for_the_New_World_of_IT

Thursday, 20 February 2014 16:35

Pulling the Reins on Data Breach Costs

CSO — For years enterprises have battled to prevent and manage data breaches, yet the costs associated with data breaches keep climbing higher -- especially for organizations in highly regulated industries. The average cost of a breach today is $188 per record in the U.S, According to the Ponemon Institute, with the total costs of data breach hitting upwards of $5.4 million. Also according to Ponemon average losses are up 18% from the same survey in the prior year.

Our own Global Information Security Survey finds that breach costs are rising, as well, especially for those organizations with less mature security programs.

Is there anything organizations can do to curb rising breach costs? Turns out plenty. And most of it are things enterprises should already be doing.

...

http://www.cio.com/article/748503/Pulling_the_Reins_on_Data_Breach_Costs

EXETER, Rhode IslandCarousel Industries, a leading integrator in business practices and technologies, announced today that it has been recognized as the 2013 Polycom Systems Integrator of North America. The award was presented at Team Polycom in Vancouver, Canada. Polycom, a leader in HD video conferencing, voice conferencing, and telepresence enabling, open standards-based video collaboration, recognized honorees based on execution and performance, customer success, business results, and overall commitment to co-developing innovative solutions.
 
“Partners are a critical component of Polycom’s success,” said Mike Conlon, Vice President of Worldwide Channels, Polycom. “Together, we serve a diverse customer base with unique challenges to solve. Our combined efforts help them succeed and together we will continue to drive growth and broader adoption of Polycom’s video, voice and content solutions."

Carousel Industries won the award due to our performance as an integrator with our partners while still focusing on customer needs and solutions.

"We are honored to be recognized as Polycom Systems Integrator of the Year,” said James Marsh, Senior Vice President of Sales, Carousel Industries. “Carousel remains committed to integration so we can provide an unparalleled customer experience in each of our focused business practices including data, unified communications, voice, video, cloud and services."


About Carousel
Carousel Industries consults, integrates and manages technology solutions that solve business problems and contribute to your organizations’ growth. This includes managed services, voice, video and data solutions, unified communications and cloud solutions.

Today Carousel has over 6,000 customers, including 35 of the Fortune 100. Carousel has been recognized by both VAR and CRN Magazines as one of the top technology integrators in the US and we’ve been listed in the Inc. 500/5000 seven times.
  Carousel is headquartered in Exeter, RI with over 1,000 employees working from offices in 30 locations across the US, including over 250 service technicians deployed across the country. For more information visit http://www.carouselindustries.com.

FAIRFIELD, NJ. – Continuity Logic, a leading provider of Enterprise Governance solutions, announced that it has been positioned by Gartner in the “Leaders” quadrant, in their recently released “Magic Quadrant for Business Continuity Management Planning Software(1)”. Out of 18 products evaluated, Continuity Logic’s FrontLine Live was evaluated as one of the five “Leaders” for completeness of vision and ability to execute.

We believe that Gartner’s recognition of Continuity Logic as an industry leader validates our next generation approach to governance, with a powerfully integrated business continuity, disaster recovery, risk, and compliance management solution”, said Tejas Katwala, CEO of Continuity Logic. “By modeling the dependencies of people, process, technology and vendors, FrontLine Live is able to dynamically create and prioritize recovery plans with its RTO engine that is just not possible with static, scenario-based solutions.”

Through its highly automated design, FrontLine Live is able to deliver on its value proposition of ease of use, rapid time to deployment, and enormously increased operating efficiency”, states Mr. Katwala.

By combining high-value business impact analytics with business rules, regulatory requirements, and its real-time RTO (Recovery Time Objectives) Engine, Continuity Logic’s customers realize tremendous ROI when using FrontLine Live’s Incident Manager (its virtual command center). The software automates incident response, business resumption, technology recovery, and supply chain management with real-time task management and notifications, interactive dashboards, powerful real-time reporting, and self-service features.

As one of the industry’s most complete and integrated enterprise-class governance solutions, FrontLine Live empowers organizations to gain more insight, across more domains, and drive better outcomes throughout every aspect of their enterprise governance program.

[1] Gartner, “Magic Quadrant for Business Continuity Management Planning Software” (Roberta J. Witty, John P. Morency, August 26, 2013).

About Magic Quadrant

Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.

About Continuity Logic

Continuity Logic’s market leading FrontLine Live Platform seamlessly integrates the governance of business continuity, risk, and compliance management with workflow and advanced analytical capabilities. All data, business continuity and technology recovery plans, policies, procedures, regulatory requirements, supply chain information, and all collaborations are actively managed in one environment, via any device, through a simple, easy-to-use interface. FrontLine Live is offered as a cloud service, with complete portability to Fortune 2000 companies, in Healthcare, Financial Services, Insurance, Manufacturing as well as other industries. For more information, visit www.continuitylogic.com.