Spring World 2017

Conference & Exhibit

Attend The #1 BC/DR Event!

Bonus Journal

Volume 29, Issue 5

Full Contents Now Available!

Jon Seals

Jon Seals

Appvance, The Enterprise Software Testing Experts, Report That WANdisco Fusion Outperformed Cloudera BDR for Hadoop Data Replication, Backup and Recovery

SAN RAMON, Calif. – WANdisco (LSE: WAND) the leading provider of software enabling global enterprises to meet today's data challenges of secure storage, scalability and availability, today announced the results of a recent competitive evaluation of WANdisco Fusion against Cloudera BDR (Backup and Disaster Recovery), covering both functionality and performance, undertaken by third party enterprise software testing firm Appvance.

In summary, Appvance recommended WANdisco Fusion, with its patented active-transactional replication technology over Cloudera BDR, for Hadoop data replication, backup and recovery.

"In our comparison tests of Cloudera BDR and WANdisco Fusion, we found WANdisco provides functionality, performance and availability not possible with Cloudera BDR," said Frank Cohen, Founder, Appvance. "WANdisco Fusion's replication technology avoids BDR's risk of data loss with automated disaster recovery after outages, and ensures availability even when entire data centers go offline. This is especially critical in regulated industries where production data and current backups must be available at all times."

Key findings:

  • WANdisco Fusion's active-transactional replication with automated forward recovery avoids Cloudera BDR's risk of data loss and extended downtime after outages. Cloudera BDR runs in batch and requires the replication job to be restarted from the beginning after an outage
  • WANdisco Fusion replicated the same data volumes up to 90% faster than BDR without impacting the performance of other applications running on the clusters
  • WANdisco Fusion performed full cluster backups up to 37% faster than BDR, used 40% less memory and allowed clusters to be available for other applications while the backup was running. BDR resource contention does not allow other applications to run during a backup
  • WANdisco Fusion ingests and replicates data at the same time, making it ideal for streaming fast data applications that require replication, unlike Cloudera BDR, which requires files to be written and closed
  • WANdisco Fusion replicates data between Hadoop clusters running on any distribution, version and storage, including cloud storage. Cloudera BDR only replicates data between clusters running specific versions of Cloudera's CDH distribution of Hadoop, creating vendor lock-in.

Download the full report

Learn more and download a free copy of Appvance's complete findings in their report entitled, "Comparing WANdisco Fusion to Cloudera BDR, A Methodology and Results," at: www.wandisco.com/fusion-vs-bdr.

About WANdisco

WANdisco (LSE: WAND) is a provider of enterprise-ready, non-stop software solutions that enable globally distributed organizations to meet today's data challenges of secure storage, scalability and availability. WANdisco's products are differentiated by the company's patented, active-transactional data replication technology, serving crucial high availability (HA) requirements, including Hadoop Big Data and Application Lifecycle Management (ALM), including Apache Subversion and Git. Fortune Global 1000 companies, including Juniper Networks, Motorola, and Halliburton, rely on WANdisco for performance, reliability, security and availability. For additional information, please visit http://www.wandisco.com.

About Appvance Inc.

Appvance provides Appvance UTP, the first unified automated testing platform makes Continuous Delivery faster, cheaper and better.

Built from the ground up with agile and cloud services in mind, Appvance UTP meets the needs of both DevOps and Quality Assurance teams for speed, rigor and security. For the past 15 years Appvance Founder Frank Cohen has led performance and developer productivity evaluations of Integration, Web Service, Mobile, Storage, and Web app platforms. Appvance is a venture-backed technology company headquartered in San Jose, CA, with offices in Costa Rica and India and funded by Javelin Ventures, Staenberg Ventures, Social Internet Fund, FundersClub, Three Bridges Ventures and HB Asset Management. Learn more at www.appvance.com.

Apache Hadoop and Subversion are trademarks of the Apache Software Foundation (ASF). Appvance is a trademark of Appvance Inc. All other product and company names herein may be trademarks of their registered owners.


CloudLock Cloud Access Security Broker to Provide Cloud and On-Premises CASB Cyber Threat Detection Solution for IBM Security QRadar SIEM

WALTHAM, Mass. – CloudLock®, a leading provider of Cloud Access Security Broker (CASB) and Cybersecurity-as-a-Service solutions, today announced it has received IBM PartnerWorld's Ready for IBM Security Intelligence designation for its CloudLock Cloud Security Fabric. As a result, CloudLock has been validated to integrate with IBM Security products to help better protect customers around the world.

"Amidst an ever-growing cyber-threat landscape, modern security teams face an incredibly daunting challenge," said Manolo Gonzalez, VP, Platform and Technology Alliances at CloudLock. "We are thrilled to work with a security leader such as IBM to deliver impactful integrated security incident and event management (SIEM) and CASB solutions that not only streamline operations but enable deeper levels of actionable insight and control for both on-prem and cloud applications, for our customers worldwide."

The proliferation of enterprise cloud application adoption presents new challenges -- and opportunities -- for security teams to protect sensitive assets across cloud and on-premise environments. As demonstrated by CloudLock in the Q3 2015 Cloud Cybersecurity Report, organizations have an average of 540 unique, user-enabled cloud applications that go unvetted by IT and security staff. These threats of data breaches and the rise of cloud malware compound the challenge to remain secure and compliant with access to corporate systems.

The CloudLock® Cloud Security Fabric™ is the cloud-native CASB and Cloud Cybersecurity Platform that helps organizations securely leverage the cloud for apps they buy and build. CloudLock delivers security for any cloud application and platform, including IaaS, PaaS, and IDaaS and orchestrates security across an organization's existing investments.

The CloudLock integration with IBM Security QRadar simultaneously addresses cloud and on-premises cyber threats with advanced incident detection intelligence, providing effective threat management across the hybrid IT infrastructure. With cross-platform visibility, customers can develop in-depth analytics dashboards and cross reference security incidents across environments.

The Ready for IBM Security Intelligence alliance is designed to promote technology collaboration and integration to expand and enhance security coverage, collapse silos of information, and increase situational awareness and insights. With the PartnerWorld program and Ready for Security Intelligence validation, IBM supports collaboration with its Business Partners to enable the integration of product capabilities and improved security capabilities for mutual customers.

For more details on CloudLock's solution visit https://www.cloudlock.com/partners/IBM-Security and CloudLock for IBM Security QRadar SIEM on IBM PartnerWorld Global Solutions Directory.

About CloudLock
CloudLock, the leading CASB and Cybersecurity-as-a-Service provider, offers the Cloud Security Fabric™ enabling enterprises to protect their data in the cloud, reduce risk, achieve compliance, manage threats and increase productivity by continuously monitoring and protecting more than one billion files for more than 10 million end users daily. CloudLock delivers the only complete, risk-appropriate and people-centric approach to cloud cybersecurity. Learn more at www.cloudlock.com.

The Business Continuity Institute - May 13, 2016 08:41 BST

Britain’s businesses are being urged to better protect themselves from cyber criminals after research by the UK government into cyber security found two thirds of large businesses experienced a cyber breach or attack in the past year.

The Cyber Security Breaches Survey found that while one in four large firms experiencing a breach did so at least once a month, only half of all firms have taken any recommended actions to identify and address vulnerabilities. Even fewer, about a third of all firms, had formal written cyber security policies and only 10% had an incident management plan in place.

From this, it is clear to see why cyber attacks and data breaches rank as the top two threats to organizations, as highlighted in the Business Continuity Institute's latest Horizon Scan Report. The vast majority of respondents to a global survey (85% and 80% respectively) expressed concern about the prospect of these threats materialising.

Ed Vaizey, UK Minister for the Digital Economy, said: "Too many firms are losing money, data and consumer confidence with the vast number of cyber attacks. It’s absolutely crucial businesses are secure and can protect data."

Despite the flexibility that the cloud offers customers, a new survey by Microsoft and 451 Research suggests that customers are fiercely loyal to their primary service provider.

According to the survey, The Digital Revolution, Powered by Cloud, which was released Wednesday at the Microsoft Cloud & Hosting Summit in Washington, more than one-third of customers (38 percent) surveyed said they plan to increase spending with their primary cloud and hosting service provider upon contract renewal.

In an interview with The WHIR, Microsoft’s vice president, Hosting and Cloud Service Provider Business, Aziz Benmalek said that this indicates the critical role service providers play in continuing to “drive organic growth in existing customers and help them in their cloud journey.”



Virtualized infrastructure (VMs, virtual networking, software-defined storage, etc.) provides a flexible, well-understood and secure platform on top of which a diverse set of workloads can be efficiently deployed and managed. Containers, such as Docker, provide a convenient method to package, distribute and deploy applications.

Both technologies provide useful abstractions, but at different layers in the stack. By making these layers work well with each other, the overall stack can more effectively meet the needs of both application developers and infrastructure administrators.