Fall World 2016

Conference & Exhibit

Attend The #1 BC/DR Event!

Summer Journal

Volume 29, Issue 3

Full Contents Now Available!

Jon Seals

Remote Alarm System Monitoring Device by Nu Tech Software Solutions, Inc Is Named the Newest Winner of the Z-Wave Labs IoT Competition

FREMONT, Calif. – The Z-Wave Alliance, an open consortium of leading global companies deploying Z-Wave, is pleased to announce the winter winner of its global IoT developer competition. Nu Tech Software Solutions, Inc, an automation and process control firm based in Oregon, has taken the prize with AlarmDecoder and will receive Z-Wave Alliance membership and access to the new Z-Wave IoT ready 500 series development kits. 

AlarmDecoder from Nu Tech Software Solutions connects to an existing alarm panel and allows users to remotely alarm/disarm their alarm systems and detect openings or closings of set zones directly from their home automation system. The self-monitoring device allows users to control their alarm system with a virtual keypad from a desktop, phone, or tablet and read the alarm status and receive notifications from motion sensors. 

"Security is one of the most valuable factors to consumers and is often the first step to adopting smart home tech," said Mitchell Klein, Executive Director of the Z-Wave Alliance. "AlarmDecoder's remote monitoring feature gives users a taste of smart home by adding to an existing home security panel, and the integration of Z-Wave will make this feature more accessible to homeowners by enabling the product to work with a large ecosystem of devices." 

AlarmDecoder's open alarm interface supports 80% of alarm systems currently available in the U.S. With the Z-Wave Labs contest win, Nu Tech Software Solutions plans to integrate the product with Z-Wave to extend its connectivity to other controllers. 

"Because it supports many smart home platforms, Z-Wave is the most desirable option to integrate into our product," said Sean Mathews, Director of Research and Development at Nu Tech Software Solutions. "Adding Z-Wave technology to AlarmDecoder will allow more users to monitor their security systems with home control." 

Started in May 2015, Z-Wave Labs is a global competition designed to encourage IoT innovation on the Z-Wave platform. New winners in an IoT related industry are selected each month by the Z-Wave Labs program, including but not limited to: residential, commercial, automotive, healthcare, energy, security and aging-in-place. Winners are able to access the Z-Wave IoT ready 500 series development kits, including the Keil PK51 Professional Developer's Kit for the 8051 microcontroller family. They are also featured on the Z-Wave Labs website and on social media. Keil supports the Z-Wave Labs competition by sponsoring a one-year PK51 Professional Developer's Kit license for every winning company.

To learn more about Z-Wave Labs, apply for the competition and read frequently asked questions, please visit http://www.z-wavelabs.org

For more information on the Z-Wave Alliance, please visit http://z-wavealliance.org. Follow the Z-Wave Alliance on FacebookTwitter and on LinkedIn for the latest updates using the #ZWaveLabs hashtag.

About Z-Wave
Z-Wave® technology is an open internationally recognized ITU standard (G.9959). It is the leading wireless home control technology in the market today, with over 1500 certified interoperable products worldwide. Represented by the Z-Wave Alliance, and supported by more than 375 companies around the world, the standard is a key enabler of smart living solutions for home safety and security, energy, hospitality, office and light commercial applications. 

Z-Wave® is a registered trademark of Sigma Designs (NASDAQ: SIGM) and its subsidiaries in the United States and other countries.

About the Z-Wave Alliance
Formed in January 2005, the Z-Wave Alliance is a consortium of leading companies in the home technology space dedicated to solidifying Z-Wave as the standard for wireless home control products. The principal members include: ADT, FAKRO, Ingersoll Rand Nexia Intelligence, Jasco Products, LG Uplus, Nortek Security & Control, SmartThings and Sigma Designs. Alliance members lead the home controls market, providing leading edge products and systems that deliver increased comfort, convenience, energy conservation, safety and security.

Safe Harbor Statement
This press release contains forward-looking statements within the meaning of Section 27A of the Securities Act of 1933 and Section 21E of the Securities Exchange Act of 1934, including statements about the anticipated market acceptance of the Z-Wave product line. Actual results may vary materially due to a number of factors including, but not limited to, market, consumer and customer acceptance of the Z-Wave product line in the aforementioned regions and the ability of Z-Wave to compete with other technologies or products in certain markets, if any, as well as other risks that are detailed from time to time in SEC reports, including reports made on Form 10-Q. Readers are cautioned not to place undue reliance on these forward-looking statements, which speak only as of the date hereof. The Z-Wave Alliance undertakes no obligation to publically release or otherwise disclose the result of any revision to these forward-looking statements that may be made as a result of events or circumstances after the date hereof or to reflect the occurrence of unanticipated events.

Netwrix Auditor Will Empower CenturyLink Cloud Users With Complete Visibility Into Cloud IT Infrastructure

IRVINE, Calif. – Netwrix Corporation, a provider of IT auditingsoftware that delivers complete visibility into IT infrastructure changes and data access, today announced its participation in the CenturyLink Cloud Marketplace Provider Program. Inclusion in the program allows Netwrix to offer Netwrix Auditor to businesses through the CenturyLink Cloud platform.

Netwrix Auditor is an IT auditing platform that provides actionable IT audit intelligence about who did what, when and where and who has access to what throughout the IT infrastructure, including cloud-based environments. Netwrix Auditor helps to strengthen security and enforce internal IT controls by monitoring privileged user activities. Audits help businesses detect and investigate security incidents originating from insiders or from third-party agents. The software provides a detailed audit trail across data stored in the cloud for compliance audits while interactive search capabilities help companies quickly address auditors' questions and customize reports to meet specific compliance standards. 

The CenturyLink Cloud Marketplace Provider Program allows participating technology companies, like Netwrix, to integrate their solutions with the CenturyLink Cloud platform. These add-on and business-ready solutions are available to CenturyLink's cloud, hosting and network customers.

"Visibility is a vital factor in building trust with your chosen cloud platform. We're excited about the value Netwrix can bring to our customers and pleased to include Netwrix Auditor in the CenturyLink Cloud Marketplace, which makes it easy for our customers to try new technologies that can improve the overall security of their application environment," said David Shacochis, vice president of cloud platform at CenturyLink.

"Netwrix is committed to provide businesses with a comprehensive IT auditing solution that enables complete visibility into what is going on across the entire IT infrastructure," said John Ross, vice president of strategic alliances, Netwrix. "Netwrix Auditor integration with the CenturyLink Cloud platform reaffirms our plans to further enhance and broaden the scope of our offering by making it available to cloud and hosting providers. Netwrix Auditor will help CenturyLink customers to get a deeper understanding of what is happening in their hybrid and cloud environments to help mitigate the risk of security breach."

Netwrix Auditor is available now for authorized CenturyLink Cloud users through the CenturyLink Blueprint integration. 

To learn more about Netwrix Auditor in the CenturyLink Cloud Marketplace, visit www.centurylinkcloud.com/marketplace.

About Netwrix Corporation

Netwrix Corporation provides IT auditing software that delivers complete visibility into IT infrastructure changes and data access, including who changed what, when and where each change was made, and who has access to what. Over 150,000 IT departments worldwide rely on Netwrix to audit IT infrastructure changes and data access, prepare reports required for passing compliance audits, and increase the efficiency of IT operations. Founded in 2006, Netwrix has earned more than 70 industry awards and was named to both the Inc. 5000 and Deloitte Technology Fast 500 lists of the fastest growing companies in the U.S. For more information, visit www.netwrix.com.

IRVINE, Calif. – Cylance, the company that is revolutionizing cybersecurity through the use of artificial intelligence to proactively prevent advanced persistent threats and malware, today announced that it has retained RiceHadleyGates LLC to advise the company on a range of strategic cybersecurity issues related to global deployment of its highly sophisticated cybersecurity solutions.

"The cyber threat landscape is continually and rapidly evolving, and the volume of threats and attacks is ever increasing," said Stuart McClure, Cylance CEO and founder. "Using better cybersecurity technology is a key element of reducing the significant risks posed by these threats, but so, too, is the deepest possible understanding of the sources of the threats and their likely targets. Cybersecurity is now in many ways indistinguishable from national security, and having advisors with the security and intelligence experience of RiceHadleyGates is invaluable to the achievement of our mission of protecting every computer on the planet."

"Cylance has a track record of preventing successful cyber-attacks by partnering with the U.S. government and other global enterprises for whom the implementation of cybersecurity is a requirement," said Condoleezza Rice, 66th US Secretary of State and RiceHadleyGates Partner. "We look forward to working with Cylance to dramatically reduce the risk to critical infrastructure and governmental and business assets around the world."

RiceHadleyGates LLC is a strategic consulting firm based in Silicon Valley and Washington, DC that works with major companies -- many of them in the technology sector -- to help them expand in major emerging markets and handle the national security and public policy challenges of offering globally technologically sophisticated products and services. The firm's leadership includes of Condoleezza Rice, Stephen Hadley, and Robert Gates, all of whom held senior governmental leadership positions relating to national security and global affairs. With the unquestioned emergence of cybersecurity as a matter of national and economic security worldwide, their background and experience will provide a critical perspective to Cylance as it executes its mission to reduce the impacts of hacking by both state and criminal actors. 

Cylance is already well established in the strategic cybersecurity community with several of the company's principals having background as federal cybersecurity and national security agency leaders. Many government organizations were early adopters of the company's advanced threat endpoint security product, CylancePROTECT™, and Cylance Professional Services to prevent and protect them from cyber-attacks.

About Cylance Inc.
Cylance makes software that predicts cyberattacks and blocks them on the endpoint in real time before they ever execute. Applying a revolutionary artificial intelligence approach, CylancePROTECT™ analyzes the DNA of code prior to its execution to find and prevent threats others can't, while using a fraction of the system resources associated with antivirus and detect and respond solutions deployed in enterprises today. For more information visit: www.cylance.com

 

Zetta Maps Out Trends Putting Pressures on Disaster Recovery Solutions in 2016

SUNNYVALE, Calif. – Enterprises are beginning to fully embrace the utility of the cloud, and offsite recovery, as the most effective means of backing up data. Also, as virtualization continues to gain dominance, enterprises are finding their legacy systems inadequate for recovering data at the speed and currency they need in order to operate a successful business. In 2016, more enterprises will transition further to cloud-based backup and recovery to support a virtual environment and provide business continuity.

Tweet This: @zettanet #2016ITPredictions say virtualization driving offsite recovery and more #cloudbackup to spin up systems in the cloud

Zetta, a provider of enterprise-grade cloud backup and disaster recovery solutions for businesses and managed service providers, examines the trends developing in enterprise requirements for backup and recovery to support virtualization, offering the following predictions:

1. Enterprises Will Realize Fast Recovery Is Essential. More organizations are considering a secondary continuity plan -- such as offsite recovery -- to further ensure business continuity. When physical servers go down, offsite redundancy enables organizations to get back in operation more quickly. 
2. Virtualization Will Catch a Break. The 'last mile' of virtualization poses a challenge with enterprises reliant on older applications and operating systems. Fortunately, 2016 will be the year of the truly virtual datacenter as operating systems and applications are upgraded to become more virtualization-ready. As a result, enterprises may finally be able to migrate those legacy applications to their virtual infrastructure. 
3. Compliance Requirements Demand Solid Disaster Recovery. Enterprises need to be compliant in meeting regulatory standards for business continuity. Backup and recovery is a critical part of business continuity -- ensuring that operations can continue after a disruptive event. As compliance requirements escalate, enterprises are adding disaster recovery (DR) improvements to their overall IT strategy, notably direct-to-cloud backup and recovery. This approach controls costs by eliminating the need to invest in additional physical resources or to build an offsite datacenter. 
4. DR Evolves to DRaaS. Disaster Recovery as a Service, or DRaaS, is the successor to DR, as enterprises seek to do more than recover file data from the cloud or wait for systems to be spun up, on demand. The future lies in greater functionality, in advanced solutions that not only spin up servers in the cloud, but also integrate all the pieces together, to run a usable environment and enable true continuity. 
5. Interdependency Will Drive DR Expansion. Today, applications, critical or operational, are becoming much more interdependent, necessitating a different approach to disaster recovery. Now, all business systems need to be fully recoverable. In 2016 and beyond DR strategy will shift to including all systems in a recovery scenario, to provide continuous availability.

"We are starting to see more businesses implementing a true disaster recovery/business continuity strategy for two main reasons: first, boards and senior management are becoming more aware of the exposure of not having a DR/BC plan in place, and secondly, new technologies are bringing big-enterprise type IT DR capabilities within the budgetary constraints of smaller organizations," says Jeff Whitehead, CTO, Zetta. "In 2016, we expect to see businesses from small to large capitalizing on direct-to-cloud backup and disaster recovery to take advantage of its inherently offsite nature, which provides more resilient business continuity."

About Zetta
Zetta is an award-winning provider of high-performance cloud backup and disaster recovery solutions that are a worry-free choice for businesses and managed service providers. The Company's direct-to-cloud approach provides businesses a fast and reliable way to protect, access and quickly recover their business-critical data and systems -- both physical and virtual, without the need for costly extra hardware. For more information, visit www.zetta.net.

Tags: online backup, cloud backup, disaster recovery, offsite backup, remote backup, server backup, data protection, cloud computing, backup support

 
Avere FXT Series Edge Filers and Flash Capabilities Vault Space Data onto the AWS Cloud

PITTSBURGH, Pa. – Avere Systems, a leading provider of enterprise storage for the hybrid cloud, today announced that NASA has selected Avere to help consolidate legacy storage and move many of its datasets to the Amazon Web Services (AWS) Cloud. Avere will be supporting the Ames Research Center, NASA's Silicon Valley field center, which has led NASA in conducting world-class research and development. Breakthrough research conducted at the Ames Research Center includes advancements in supercomputing, NexGen air transportation, missions for low-Earth orbit and the moon, lunar science and advancing human-technology interaction. 

The Ames Research Center decided to transition from general NFS and CIFS file services to Amazon Simple Storage Solution (Amazon S3) and considered several options before choosing Avere to lead the transition to the AWS Cloud. With Avere's unique set of capabilities, NASA's Ames Research Center was able to keep speedy NFS/CIFS response times while also benefitting from hybrid capabilities and cost-effective pricing that AWS offers. Additionally, Avere's encryption capabilities were the right fit for NASA's stringent requirements for sensitive data. 

Avere FlashMove makes NASA data migrations simple with moves of live data between multiple heterogeneous environments while Avere FlashCloud eliminates the latency associated with cloud by using Avere Edge-Core architecture to make hot data more available while pushing warm and cold data backwards. 

"The stakes are high when it comes to the transferring data to and securing it in the cloud -- Avere makes moving legacy storage to AWS very straightforward and safeguarded," said Ron Bianchini, president and CEO at Avere Systems. "With Avere, the researchers at Ames Research Center didn't encounter downtime during their transition and were able to maintain the best possible performance when it comes to accessing their data while keeping the data protected." 

About Avere Systems
Avere is radically changing the economics of data storage. Avere's hybrid cloud solutions give companies -- for the first time -- the ability to end the rising cost and complexity of data storage and compute via the freedom to store and access files anywhere in the cloud or on premises, without sacrificing the performance, availability, or security of enterprise data. Based in Pittsburgh, Avere is led by veterans and thought leaders in the data storage industry and is backed by investors Lightspeed Venture Partners, Menlo Ventures, Norwest Venture Partners, Tenaya Capital, and Western Digital Capital. For more information, visit www.averesystems.com.

 
Zetta Maps Out Trends Putting Pressures on Disaster Recovery Solutions in 2016

SUNNYVALE, Calif. Enterprises are beginning to fully embrace the utility of the cloud, and offsite recovery, as the most effective means of backing up data.  Also, as virtualization continues to gain dominance, enterprises are finding their legacy systems inadequate for recovering data at the speed and currency they need in order to operate a successful business.  In 2016, more enterprises will transition further to cloud-based backup and recovery to support a virtual environment and provide business continuity.

Tweet This:  @zettanet #2016ITPredictions say virtualization driving offsite recovery and more #cloudbackup to spin up systems in the cloud

Zetta, a provider ofenterprise-grade cloud backup and disaster recovery solutionsfor businesses and managed service providers, examines the trends developing in enterprise requirements for backup and recovery to support virtualization, offering the following predictions:

  1. 1.Enterprises Will Realize Fast Recovery Is Essential. More organizations are considering a secondary continuity plan – such as offsite recovery – to further ensure business continuity. When physical servers go down, offsite redundancy enables organizations to get back in operation more quickly. 
  2. 2.Virtualization Will Catch a Break.  The ‘last mile’ of virtualization poses a challenge with enterprises reliant on older applications and operating systems.  Fortunately, 2016 will be the year of the truly virtual datacenter as operating systems and applications are upgraded to become more virtualization-ready. As a result, enterprises may finally be able to migrate those legacy applications to their virtual infrastructure.
  3. 3.Compliance Requirements Demand Solid Disaster Recovery.  Enterprises need to be compliant in meeting regulatory standards for business continuity.  Backup and recovery is a critical part of business continuity -- ensuring that operations can continue after a disruptive event.  As compliance requirements escalate, enterprises are adding disaster recovery (DR) improvements to their overall IT strategy, notably direct-to-cloud backup and recovery.  This approach controls costs by eliminating the need to invest in additional physical resources or to build an offsite datacenter.
  4. 4.DR Evolves to DRaaS.  Disaster Recovery as a Service, or DRaaS, is the successor to DR, as enterprises seek to do more than recover file data from the cloud or wait for systems to be spun up, on demand.  The future lies in greater functionality, in advanced solutions that not only spin up servers in the cloud, but also integrate all the pieces together, to run a usable environment and enable true continuity.
  5. 5.Interdependency Will Drive DR Expansion. Today, applications, critical or operational, are becoming much more interdependent, necessitating a different approach to disaster recovery. Now, all business systems need to be fully recoverable.  In 2016 and beyond DR strategy will shift to including all systems in a recovery scenario, to provide continuous availability.

“We are starting to see more businesses implementing a true disaster recovery/business continuity strategy for two main reasons: first, boards and senior management are becoming more aware of the exposure of not having a DR/BC plan in place, and secondly, new technologies are bringing big-enterprise type IT DR capabilities within the budgetary constraints of smaller organizations,” says JeffWhitehead, CTO, Zetta. “In 2016, we expect to see businesses from small to large capitalizing on direct-to-cloud backup and disaster recovery to take advantage of its inherently offsite nature, which provides more resilient business continuity.”

 

About Zetta
Zetta is an award-winning provider of high-performance cloud backup and disaster recovery solutions that are a worry-free choice for businesses and managed service providers. The Company’s direct-to-cloud approach provides businesses a fast and reliable way to protect, access and quickly recover their business-critical data and systems—both physical and virtual, without the need for costly extra hardware. For more information, visit www.zetta.net.

Tags: online backup, cloud backup, disaster recovery, offsite backup, remote backup, server backup, data protection, cloud computing, backup support

Tuesday, 19 January 2016 00:00

Enterprise Still Unclear on Storage

Of the three pillars of enterprise hardware – compute, storage and networking – the future of storage is the least clear. Servers are being virtualized and containerized, networking is being defined by software, but storage is still swirling amid a plethora of media types and architectures.

For any given application, then, data managers or their automated systems have to match data loads to tape, disk, Flash or optical systems, using in-line, near-line or even off-line architectures in the data center, on the cloud or in a colocation setting for real-time, short-term, medium-term or long-term archival purposes. And all of these situations must be built, managed and maintained under tight budgets and in ways that accommodate rapidly shifting data requirements.

...

http://www.itbusinessedge.com/blogs/infrastructure/enterprise-still-unclear-on-storage.html

Tuesday, 19 January 2016 00:00

BCI: A world at risk in 2016

A world at risk in 2016

An increased likelihood for all risks, from the environmental to society, the economy, geopolitics and technology, looks set to shape the global agenda in the coming year, the World Economic Forum’s Global Risks Report 2016 has found.

In this year’s annual survey, almost 750 experts assessed 29 separate global risks for both impact and likelihood over a 10-year time horizon. The risk with the greatest potential impact in 2016 was found to be a failure of climate change mitigation and adaptation. This is the first time since the report was published in 2006 that an environmental risk has topped the ranking. This year, it was considered to have greater potential damage than weapons of mass destruction (2nd), water crises (3rd), large-scale involuntary migration (4th) and severe energy price shock (5th).

The number one risk in 2016 in terms of likelihood, meanwhile, is large-scale involuntary migration, followed by extreme weather events (2nd), failure of climate change mitigation and adaptation (3rd), interstate conflict with regional consequences (4th) and major natural catastrophes (5th).

Geopolitical instability is exposing businesses to cancelled projects, revoked licenses, interrupted production, damaged assets and restricted movement of funds across borders. These political conflicts are in turn making the challenge of climate change all the more insurmountable – reducing the potential for political co-operation, as well as diverting resource, innovation and time away from climate change resilience and prevention,” said Cecilia Reyes, Chief Risk Officer of Zurich Insurance Group.

One potential black swan event could be in the area of technological risk. While cyberattacks rises slightly in terms of likelihood and impact in 2016, others, including failure of critical information infrastructure, appear to be declining as a risk in the eyes of experts. Technological crises have yet to impact economies or securities in a systemic way, but the risk still remains high, something that potentially may not have been fully priced in by experts.

Unemployment and under-employment appears as the risk of highest concern for doing business in more than a quarter of the 140 economies covered, and is especially featured as the top risk in two regions, sub-Saharan Africa and the Middle East and North Africa. The only region where it does not feature in the top five is North America. Energy price shock is the next most widespread risk, featuring in the top five risks for doing business in 93 economies. Cyberattacks, mentioned above, feature among the top five risks in 27 economies, indicating the extent to which businesses in many countries have been impacted already by this rising threat.

Remember the hover boards in the "Back to the Future" movies--those levitating skateboards that characters in the films used to get around? As you’ve no doubt seen if you’ve stepped outside your house lately, more than 25 years after they first appeared in those movies, hover boards are finally here—in the real world—sort of. (They unfortunately don’t actually levitate.)

Science fiction often provides the inspiration for real-world innovations. And one very recent example in the medical industry offers an important lesson to you as an MSP. An amazing new personal medical device, which CNN reported on in early 2015, is based on the fictional medical “tricorder” from Star Trek. The real device is a handheld scanner that, when placed against your forehead, measures your heart rate, blood pressure, oxygen levels and other key details about your health.

Then (and here’s the lesson for your MSP business) the device will send all of this medical data wirelessly, via a Bluetooth signal, to a smartphone or other device—or directly to your doctor.

...

http://mspmentor.net/blog/what-star-trek-can-teach-you-about-helping-your-healthcare-clients-secure-patient-data

Remember Alice in Wonderland? For most of us, the world of data is a wonderland — we don’t care how it works, we just want it to work. But I’m here to take you all the way down the rabbit hole of binary code to show you what’s hiding at the bottom. You’ll have to be vigilant — a mole could follow you down there when you aren’t looking. You make a mistake, he infiltrates your hard drive!

Who could be a mole?

Data thieves, IT investigators, forensic data experts – one thing they all have in common is that they’d follow exactly the same traces when going through your hard drive (I will describe these traces in this part of the course). All of these could be used either against you, or to your advantage (for example, if you accidentally lose your data, it would be retrieved in the same way). Only someone intent on hurting you, who would go behind your back and without your consent, would be considered a mole. Here are some sample situations that would call for your heightened interest in thoroughly erasing your data:

...

http://blog.krollontrack.co.uk/concepts-explained/a-rabbit-hole-full-of-data-and-in-it-a-mole/