Remote Alarm System Monitoring Device by Nu Tech Software Solutions, Inc Is Named the Newest Winner of the Z-Wave Labs IoT Competition
Netwrix Auditor Will Empower CenturyLink Cloud Users With Complete Visibility Into Cloud IT Infrastructure
Zetta Maps Out Trends Putting Pressures on Disaster Recovery Solutions in 2016
Avere FXT Series Edge Filers and Flash Capabilities Vault Space Data onto the AWS Cloud
Zetta Maps Out Trends Putting Pressures on Disaster Recovery Solutions in 2016
SUNNYVALE, Calif. – Enterprises are beginning to fully embrace the utility of the cloud, and offsite recovery, as the most effective means of backing up data. Also, as virtualization continues to gain dominance, enterprises are finding their legacy systems inadequate for recovering data at the speed and currency they need in order to operate a successful business. In 2016, more enterprises will transition further to cloud-based backup and recovery to support a virtual environment and provide business continuity.
Tweet This: @zettanet #2016ITPredictions say virtualization driving offsite recovery and more #cloudbackup to spin up systems in the cloud
Zetta, a provider offor businesses and managed service providers, examines the trends developing in enterprise requirements for backup and recovery to support virtualization, offering the following predictions:
- 1.Enterprises Will Realize Fast Recovery Is Essential. More organizations are considering a secondary continuity plan – such as offsite recovery – to further ensure business continuity. When physical servers go down, offsite redundancy enables organizations to get back in operation more quickly.
- 2.Virtualization Will Catch a Break. The ‘last mile’ of virtualization poses a challenge with enterprises reliant on older applications and operating systems. Fortunately, 2016 will be the year of the truly virtual datacenter as operating systems and applications are upgraded to become more virtualization-ready. As a result, enterprises may finally be able to migrate those legacy applications to their virtual infrastructure.
- 3.Compliance Requirements Demand Solid Disaster Recovery. Enterprises need to be compliant in meeting regulatory standards for business continuity. Backup and recovery is a critical part of business continuity -- ensuring that operations can continue after a disruptive event. As compliance requirements escalate, enterprises are adding disaster recovery (DR) improvements to their overall IT strategy, notably direct-to-cloud backup and recovery. This approach controls costs by eliminating the need to invest in additional physical resources or to build an offsite datacenter.
- 4.DR Evolves to DRaaS. Disaster Recovery as a Service, or DRaaS, is the successor to DR, as enterprises seek to do more than recover file data from the cloud or wait for systems to be spun up, on demand. The future lies in greater functionality, in advanced solutions that not only spin up servers in the cloud, but also integrate all the pieces together, to run a usable environment and enable true continuity.
- 5.Interdependency Will Drive DR Expansion. Today, applications, critical or operational, are becoming much more interdependent, necessitating a different approach to disaster recovery. Now, all business systems need to be fully recoverable. In 2016 and beyond DR strategy will shift to including all systems in a recovery scenario, to provide continuous availability.
“We are starting to see more businesses implementing a true disaster recovery/business continuity strategy for two main reasons: first, boards and senior management are becoming more aware of the exposure of not having a DR/BC plan in place, and secondly, new technologies are bringing big-enterprise type IT DR capabilities within the budgetary constraints of smaller organizations,” says JeffWhitehead, CTO, Zetta. “In 2016, we expect to see businesses from small to large capitalizing on direct-to-cloud backup and disaster recovery to take advantage of its inherently offsite nature, which provides more resilient business continuity.”
Zetta is an award-winning provider of high-performance cloud backup and disaster recovery solutions that are a worry-free choice for businesses and managed service providers. The Company’s direct-to-cloud approach provides businesses a fast and reliable way to protect, access and quickly recover their business-critical data and systems—both physical and virtual, without the need for costly extra hardware. For more information, visit www.zetta.net.
Tags: online backup, cloud backup, disaster recovery, offsite backup, remote backup, server backup, data protection, cloud computing, backup support
Of the three pillars of enterprise hardware – compute, storage and networking – the future of storage is the least clear. Servers are being virtualized and containerized, networking is being defined by software, but storage is still swirling amid a plethora of media types and architectures.
For any given application, then, data managers or their automated systems have to match data loads to tape, disk, Flash or optical systems, using in-line, near-line or even off-line architectures in the data center, on the cloud or in a colocation setting for real-time, short-term, medium-term or long-term archival purposes. And all of these situations must be built, managed and maintained under tight budgets and in ways that accommodate rapidly shifting data requirements.
An increased likelihood for all risks, from the environmental to society, the economy, geopolitics and technology, looks set to shape the global agenda in the coming year, the World Economic Forum’s Global Risks Report 2016 has found.
In this year’s annual survey, almost 750 experts assessed 29 separate global risks for both impact and likelihood over a 10-year time horizon. The risk with the greatest potential impact in 2016 was found to be a failure of climate change mitigation and adaptation. This is the first time since the report was published in 2006 that an environmental risk has topped the ranking. This year, it was considered to have greater potential damage than weapons of mass destruction (2nd), water crises (3rd), large-scale involuntary migration (4th) and severe energy price shock (5th).
The number one risk in 2016 in terms of likelihood, meanwhile, is large-scale involuntary migration, followed by extreme weather events (2nd), failure of climate change mitigation and adaptation (3rd), interstate conflict with regional consequences (4th) and major natural catastrophes (5th).
“Geopolitical instability is exposing businesses to cancelled projects, revoked licenses, interrupted production, damaged assets and restricted movement of funds across borders. These political conflicts are in turn making the challenge of climate change all the more insurmountable – reducing the potential for political co-operation, as well as diverting resource, innovation and time away from climate change resilience and prevention,” said Cecilia Reyes, Chief Risk Officer of Zurich Insurance Group.
One potential black swan event could be in the area of technological risk. While cyberattacks rises slightly in terms of likelihood and impact in 2016, others, including failure of critical information infrastructure, appear to be declining as a risk in the eyes of experts. Technological crises have yet to impact economies or securities in a systemic way, but the risk still remains high, something that potentially may not have been fully priced in by experts.
Unemployment and under-employment appears as the risk of highest concern for doing business in more than a quarter of the 140 economies covered, and is especially featured as the top risk in two regions, sub-Saharan Africa and the Middle East and North Africa. The only region where it does not feature in the top five is North America. Energy price shock is the next most widespread risk, featuring in the top five risks for doing business in 93 economies. Cyberattacks, mentioned above, feature among the top five risks in 27 economies, indicating the extent to which businesses in many countries have been impacted already by this rising threat.
Remember the hover boards in the "Back to the Future" movies--those levitating skateboards that characters in the films used to get around? As you’ve no doubt seen if you’ve stepped outside your house lately, more than 25 years after they first appeared in those movies, hover boards are finally here—in the real world—sort of. (They unfortunately don’t actually levitate.)
Science fiction often provides the inspiration for real-world innovations. And one very recent example in the medical industry offers an important lesson to you as an MSP. An amazing new personal medical device, which CNN reported on in early 2015, is based on the fictional medical “tricorder” from Star Trek. The real device is a handheld scanner that, when placed against your forehead, measures your heart rate, blood pressure, oxygen levels and other key details about your health.
Then (and here’s the lesson for your MSP business) the device will send all of this medical data wirelessly, via a Bluetooth signal, to a smartphone or other device—or directly to your doctor.
Who could be a mole?
Data thieves, IT investigators, forensic data experts – one thing they all have in common is that they’d follow exactly the same traces when going through your hard drive (I will describe these traces in this part of the course). All of these could be used either against you, or to your advantage (for example, if you accidentally lose your data, it would be retrieved in the same way). Only someone intent on hurting you, who would go behind your back and without your consent, would be considered a mole. Here are some sample situations that would call for your heightened interest in thoroughly erasing your data: