V-locity Reduces I/O from Virtual Server to Storage to Help Metals Company to Achieve More than 50% Performance Gains on their Existing Hardware Infrastructure
I started to write this post as my train left London following two packed days at this year’s BCI World event. I figured that this was as good a time as any to capture my experience and thoughts whilst it’s fresh in my mind! However, I decided that I could do with a couple of weeks reflection because these conferences tend to get you quite pumped and excited and then you go back to normal. I did have a go last year at trying to describe what goes on at the event but in fairness I did only attend the exhibition and the gala dinner and this year I attended the full programme so hopefully I can more observations this time.
The first thing I should say is that the opening and closing speakers, while not topic-related, were superb and everybody appreciated them. The conference set up and organisation was well received by everyone I that spoke to and so a big thank you to the BCI for organising such a worthwhile event.
Starwood Hotels & Resorts Worldwide (HOT) last week said some of its North American locations were infected with malware that enabled unauthorized users to access customer payment card information.
What can managed service providers (MSPs) and their customers learn from these IT security newsmakers? Check out this week's edition of IT security stories to watch to find out:
Are you responsible for securing your company’s datacenters, networks, and data?
There is no doubt that cyber attacks and cyber espionage incidents are on the rise. PewResearch reports that most security professionals believe the following:
“By 2025, a major cyber attack will have caused widespread harm to a nation’s security and capacity to defend itself and its people (By “widespread harm,” we mean significant loss of life or property losses/damage/theft at the levels of tens of billions of dollars.)”
Here are a couple of additional security facts:
When you think about an HR Department, you think about potential applicants, the interview process, an information repository for all employees or your own engagement with the company. Of course during the first week of November you consider HR to be the keeper of all things benefits — open enrollment and all of the paperwork that entails. The HR Department must keep all of this information confidential while also handling the external client roster, circulation of company policies and a wide array of interoffice communications. This poses a unique security challenge for any organization, regardless of size, which needs to prevent unauthorized internal users from accessing employee information, including PII (personally identifiable information), but needs to share employee information with external benefits providers and accounting. The environment calls for a solution with the flexibility to protect against insider threats and destroy files automatically, while enabling secure sharing.
Where to start?
Most if not all of the information going in and out of the HR department needs some level of security, and so the first task is to inventory and classify the types of data the department handles. Two tiers work best, with tier 1 being the highest and warranting automatic security policy and encryption on creation. Tier 1 data includes intellectual property, executive compensation, Board of Director files, customer lists, financial data and employee personnel files. Tier 2 includes policy manuals, interoffice correspondence and pre-release public files.
Often it is said that ‘partnering’ is part of the Cisco DNA and its true: Cisco’s Partner ecosystem for years has brought together an ecosystem of trusted partners which deliver solutions, software and services that provide needed business solutions and outcomes.
Cisco has a strong ‘bench’ of technology partners, too. These partners allow us to combine Cisco solutions with their technology platforms resulting in integrated architectures focused on specific industries or use cases. Frequently these are delivered in the form of a Cisco Validated Design (CVD) and are available freely on the Cisco Design Zone.
For Cisco Big Data and Analytics solutions, where our Cisco UCS Integrated Infrastructure for Big Data is the foundation, partners are key. We partner with industry leading Big Data firms to deliver flexible architectures and solutions which help to make your data the foundation of your digital business. Below, in alphabetical order, are new videos from some of our Big Data partners. Each is a Big Data leader in their own right and each has worked closely with Cisco to bring solution(s) to market. These are short and sweet videos – so carve out a few moments in your day and view a few: