The Continuity Logic customized demo provides an opportunity for qualifying organizations to evaluate Frontline Live 5™, with their plans, desired controls, policies, and procedures. This first-of-its-kind system for both business continuity and many other areas of Governance, Operational Risk and Compliance (GRC) is powerful, but often best viewed with some of your familiar plans, data and templates.


Spring World 2016

Conference & Exhibit

Attend The #1 BC/DR Event!

Fall Journal

Volume 28, Issue 4

Full Contents Now Available!

Jon Seals

Document Solutions Experts Have Demonstrated Success at Incorporating Enterprise Capture into Business Solutions



MUNICH, GermanyABBYY Europe, a leading provider of document recognition, data capture, and linguistic technologies, today announced Devo IT, based in Uppsala, Sweden, has joined the ABBYY European Solution Partner Programme. The certification is granted to organisations that attend and pass a full ABBYY FlexiCapture training course. Devo IT now gains full access to ABBYY’s Data and Document Capture solutions which provide a wide range of features for the extraction of business-critical information from customer documents in various industry sectors such as energy, insurance, financial services, healthcare, government, outsourcing and many others.


“As an organisation we made a strategic decision to adopt ABBYY’s enterprise capture solution in order to give us a competitive advantage in the market,” says Jan Lundqvist, Managing Director for Devo IT. “Nothing is more important to our clients in the current economic climate than improving efficiency, streamlining their business and in the end, adding to the bottom line. One of the fastest ways we can show a good ROI and help achieve these goals is to automate business processes that normally require considerable manual intervention. In ABBYY’s product portfolio, we believe we have identified a solution flexible enough for us to provide a solution for almost any data capture need.”


ABBYY FlexiCapture enables Devo IT to offer its clients services as a seamless process, from the time documents enter an organisation as post, to end-of-line business applications like SAP, Visma and various document management applications. Documents are scanned and essential data captured from business-critical documents, such as invoices, is automatically entered into the backend application while at the same time the original is digitally archived for fast and easy retrieval. This level of automation removes several of the most time-consuming manual tasks involved in paper processing. Additionally, a policy of “digitising everything” provides organisations with a robust strategy for disaster recovery.


“We place tremendous value on our relationships with partners, who help us deliver solutions and applications to customers. Devo IT has demonstrated a proven track record in providing expert and high quality customer service,” states Vladimir Tabachkov, Sales Director for ABBYY. “Customers need to rely on trusted service suppliers to help guide them through the available business technology options. Devo IT is such a service supplier and we are therefore pleased to have them as the newest member of our European Solution Partner Programme.”


To learn more about becoming an ABBYY Europe Certified Solution Partner please go to: http://www.abbyy.com/partners/trainings/


About Devo IT

Devo IT is a total document solutions service provider, including service and consultancy across:

  • medical journals
  • historical documents
  • top security documents from medical and energy industry
  • publication applications and archiving

Founded in 2005, Devo IT combines smart working processes and innovative technology with a strong focus on service and partnerships. Customers from major multi-site global companies, Government organisations and SMEs have all achieved the common goals of cost reduction and efficiency.

Technology keeps us competitive. Service gives us the edge.


More than a third (34%) of IT professionals claim that their organization has suffered a major incident that has required them to implement disaster recovery procedures. In the event of such a disaster or other incident occurring, 51% believe they are only ‘somewhat prepared’ to recover their IT and related assets, and of those who had experienced a major incident, more than half lost data and 11% experienced permanent IT losses.

These were some of the findings in a report published by Evolve IP which also showed that the leading causes of such incidents are hardware outages (47%), environmental disasters (34%), power outages (27.5%) and human error (20%). Perhaps surprisingly, a significant number of organizations continue to use legacy methods for disaster recovery. 45% of those surveyed continue to use backup tapes and 41.5% use additional servers at their primary site as a principal method for disaster recovery.

“For many organizations the question isn’t ‘if’ they will suffer a disaster, it’s ‘when,’” says Tim Allen, Chief Sales Officer of Evolve IP. “As we saw in the survey, when disaster hits, it hits hard typically taking over a day to recover and causing financial as well as data losses.”

The results of this survey demonstrate just why the IT related threats are the biggest concern for business continuity professionals as shown in the Business Continuity Institute’s annual Horizon Scan report. The latest report revealed that 77% of respondents to a survey expressed either concern or extreme concern at the prospect of an IT or telecoms outage occurring.


Organizations that reap high return rates on Big Data projects do so by changing operational systems for everybody, rather than “enlightening a few with pretty historical graphs,” according to IT research and consulting firm Wikibon.

How do you do that? You stop using Big Data to drive “using the rear-view mirror.” Instead, you couple Big Data insights with in-memory technologies so you’re “driving with real-time input through the front windshield,” writes David Floyer, a former IDC analyst and co-founder and CTO of Wikibon.org.

Floyer’s lengthy piece on Big Data ROI goes into the technical details on how you piece this together. His technologist background really shows, though, so here are a few terms you’ll need to know to follow it:



For most organizations, employees, or the human resources, account for the largest percentage of total costs. Northeastern University D’Amore-McKim School of Business Distinguished Professor of Workforce Analytics and Director of the Center for Workforce Analytics Dr. Mark Huselid says the workforce often represents fully 60 to 70 percent of all expenses. Quite clearly, the refinement of workforce management, and attempting to “connect human capital and performance with management strategy and business goals” is a keen point of interest for both HR and upper management.

The fact that a Professor of Workforce Analytics position exists is intriguing, and the sort of academic research that the Center for Workforce Analytics conducts may well result in some rather unexpected outcomes for some industries. Consider this idea, for example: “Most organizations tend to invest in talent hierarchically, where senior-level talent gets the most pay, best development opportunities and other professional perks. However, organizations should be managing vertically in who and what really matters – and in measuring and managing the outcomes associated with these processes.”

In the tech world, the idea of investing a higher percentage of pay and perks in less senior and less experienced employees is not foreign. Raising pay rates and bonuses for, say, highly in-demand developers and designers can often be easily justified in shortened time-to-market or other deliverables. In other areas, though, HR and the business would have a hard time with the concept without some solid predictive numbers.



As the enterprise tries to make the data center more efficient in the face of rising operating costs, one problem keeps reoccurring: Disparate infrastructure makes it very difficult to determine what systems and solutions are in place and how they interact with each other.

The data center, after all, is a collection of assets, so it only makes sense to have a good idea of what those assets are and how they operate in order to either improve their efficiency or swap them out for new, better assets.

The idea of asset management (AM) in the data center is not new – in fact, it is a bustling business. MarketsandMarkets puts the total value of the AM industry at $565.4 million, with annual growth rates averaging 34 percent between now and 2019 to top out at more than $2 billion. The report segments the market by region, components, services, support and other factors, concluding that efficiency, management, planning and expansion of data footprints are key drivers, while limiting factors include tight budgets, poor awareness of available solutions, and a lack of perceived benefits. And as with most technology solutions these days, established markets in Europe and North America provide the bulk of activity, while emerging markets represent the fastest growth.



Cyberattacks are clearly on the minds of President Barack Obama, Islamic State jihadists, Sony Pictures execs and the CBS producers who are launching a new show this spring called CSI: Cyber. On Jan. 13, Obama announced plans to reboot and strengthen U.S. cybersecurity laws in the wake of the Sony Pictures hack and the one on the Pentagon's Central Command Twitter account from sympathizers of the Islamic State. Whether a real attack or depicted in television and films like Blackhat, this flood of cyberattacks means that hackers are relentless and more sophisticated than ever before.

I’m not a fear monger by trade but want to sound the alarm that there is another cyber-risk that is looming and warrants attention of our emergency management community and government: electronic health records. The American Recovery and Reinvestment Act of 2009 authorized the Centers for Medicare and Medicaid Services to award billions in incentive payments to health professionals (hospitals, long-term care agencies, primary care, etc.) to demonstrate the meaningful use of a certified electronic health record (EHR) system.

The intent to create EHR systems is to improve patient care by providing continuity of care from provider to provider by creating health information exchanges (HIEs) that allow “health-care professionals and patients to appropriately access and securely share a patient’s vital medical information electronically,” says HealthIT.gov. In addition, financial penalties are scheduled to take effect in 2015 for Medicare and Medicaid providers who do not transition to electronic health records.



71% of global hotels, restaurants and other hospitality organisations jeopardise customers with inadequate security controls



WOKING, Surrey – Wick Hill is now shipping WatchGuard Next-Generation Firewall (NGFW) and Unified Threat Management (UTM) appliances that offer enhanced guest network access features. These features allow hospitality organisations to quickly and easily provide temporary user passwords to better secure guest Internet and Wi-Fi networks.


Free Wi-Fi was recently rated the most important in-room hotel amenity, above a bathroom with shower and daily housekeeping.[1] While Internet access may be a priority, lax security controls often jeopardise guest network users and create a risky proposition for global travellers wanting to stay connected. A recent WatchGuard survey revealed that 71 percent of global hotels, restaurants and other hospitality organizations do not provide unique temporary user passwords for guest Wi-Fi networks, which could compromise corporate and guest network security.[2]


With WatchGuard's new features, hospitality organisations can now tailor the user experience with custom hotspot splash pages branded with company logos. They can also provide flexible account options, such as configurable time limits, batch-generated usernames and passwords and password-only voucher options. Liability can also be minimized with custom terms and conditions. Convenience is enhanced by allowing guest administrator roles for non-IT staff to generate accounts.


Ian Kilpatrick, chairman Wick Hill Group, commented:“Everyone is (or should be) aware of the very real dangers of unsecured wireless networks. But of course everyone still uses them. Securing guest networks improves user experience, minimises costly performance upgrades, and is perceived as a real value-add. With strong ROI, this is an important new solution from WatchGuard for wireless and security suppliers to the hospitality industry.”


The WatchGuard survey also found that 51 percent of global hospitality organisations do not monitor guest networks for suspect applications, malware or malicious activities; 62 percent do not monitor guest activity to limit bandwidth-intensive applications; and 48 percent do not use policy mapping or data visualization tools to monitor performance.[3] This lapse of guest Internet and Wi-Fi network visibility and controls can have a significant impact on overall guest network performance and user experience on top of growing security risks.


"Complimentary guest Internet and Wi-Fi network access is definitely a service that people who travel as much as I do have come to expect," said Dave R. Taylor, vice president of corporate strategy and product management for WatchGuard Technologies. "WatchGuard provides the peace of mind that hospitality organizations need to feel confident that their guest network users are protected and that network security and performance won't be compromised by uninvited guests. Our customers appreciate the increased visibility into and control over their guest wireless networks delivered by WatchGuard security appliances."


About Wick Hill

Established in 1976, value added distributor Wick Hill specialises in secure IP infrastructure solutions. The company sources and delivers best-of-breed, easy-to-use solutions through its channel partners, with a portfolio that covers security, performance, access, networking, convergence, storage and hosted solutions.

Wick Hill is part of the Wick Hill Group, based in Woking, Surrey with sister offices in Hamburg. Wick Hill is particularly focused on providing a wide range of value added support for its channel partners. This includes a strong lead generation and conversion programme, technical and consultancy support for reseller partners in every stage of the sales process, and extensive training facilities. For more information about Wick Hill, please visit http://www.wickhill.com/company/company-profile or www.twitter.com/wickhill


About WatchGuard Technologies, Inc.

WatchGuard® Technologies, Inc. is a global leader of integrated, multi-function business security solutions that intelligently combine industry standard hardware, best-of-breed security features, and policy-based management tools. WatchGuard provides easy-to-use, but enterprise-powerful protection to hundreds of thousands of businesses worldwide. WatchGuard products are backed by WatchGuard LiveSecurity® Service, an innovative support program. WatchGuard is headquartered in Seattle, Wash. with offices throughout North America, Europe, Asia Pacific, and Latin America. To learn more, visit WatchGuard.com.

WatchGuard is a registered trademark of WatchGuard Technologies, Inc. All other marks are property of their respective owners.

Integration isn’t an excuse to avoid trying SaaS enterprise applications, argues principal cloud architect Mike Kavis.

“Sometimes enterprise IT executives think their requirements are so different than those of other companies that they cannot be met by a SaaS provider. This thought process is often nothing more than a poor excuse …” Kavis writes.

Kavis is also now a vice president at Cloud Technology Partners, but I’ve followed his writings for years. Kavis is an industry veteran with extensive experience as an architect and IT analyst.



A new survey from Chicago-based managed security service provider (MSSP) Trustwave revealed that organizations with 1,000 Internet users or fewer spent more than twice as much on IT security on a per-user basis than larger organizations (those with more than 1,000 Internet users).

The survey of 172 IT professionals showed that IT security cost $157 per Internet user in smaller organizations versus $73 per user in larger ones.

Also, Trustwave found that 28 percent of all respondents said they believed they were not getting full value out of their security-related software investments.



(TNS) — In the wake of the March 11, 2011, Great East Japan Earthquake, local and prefectural governments around the country rushed to assist the Tohoku region, sending material aid and personnel, while private firms and individuals arrived to volunteer their services wherever they were needed.

Few were as quick to respond as Hyogo Prefecture and the city of Kobe, which had experienced their own earthquake in January 1995, and had worked in the intervening years to become Japan’s premier center for disaster response-related knowledge, and an example that towns, cities and prefectures in Tohoku could use as they attempted to rebuild.

At a recent symposium, held ahead of the 20th anniversary this Saturday of the Great Hanshin-Awaji Earthquake and attended by officials and representatives of nonprofit organizations from Iwate and Hyogo prefectures, Hyogo Gov. Toshizo Ido and Iwate Gov. Takuya Tasso spoke on the administrative and planning challenges governments face when dealing with a large-scale natural disaster.