Fall World 2016

Conference & Exhibit

Attend The #1 BC/DR Event!

Spring Journal

Volume 29, Issue 2

Full Contents Now Available!

Jon Seals

Digital Realty has pre-leased the entirety of its first data center in Japan. The anchor tenant who signed the lease is a major hyperscale cloud provider whom the data center company did not name.

There’s currently a wave of high demand for large chunks of data center space in top markets around the world as the biggest cloud providers race to increase the scale of their infrastructure and win share of the quickly growing enterprise cloud market. This wave has fueled a boom for wholesale data center providers like Digital Realty.

It’s difficult to deduce which of the hyperscale cloud providers has signed the multi-megawatt lease in Osaka, but the top players in this category are Amazon, Microsoft, and Google, as well as IBM and to a lesser degree Oracle. Some Software-as-a-Service providers, such as Salesforce, could also be considered hyperscale.

...

http://www.datacenterknowledge.com/archives/2016/04/29/big-cloud-provider-pre-leases-digitals-entire-first-osaka-data-center/

In the early years of the internet, it was often recommended, when addressing the question of security in the net, to disconnect the connected computer to the Internet from the rest of the working processes. That way, the malware from the net would not corrupt the data of the companies. It used to be a simpler and more efficient suggestion, obviously no longer practicable in the current era of almost total connections: rarely can a firm avoid having a computer network. However, the constant connection to the Internet – also from mobile devices – makes these nets easily vulnerable and this is why sensitive data must be more and more protected.

What are the threats?

Cybercriminals use unprotected web protocols to launch their attacks. These protocols are responsible for the exchange of data between computers and net providers, the most popular being the TCP/IP protocol. Under an insufficient protection, what is known as man-in-the-middle attacks can be started. If an attacker has obtained access to a computer network he or she can stand between two communication partners without being noticed. That way the intruder can hear – or rather read – the whole communication content, impersonate one of the communication partners or intercept confidential data.

...

http://blog.krollontrack.co.uk/making-data-simple/cyber-attacks-the-illusion-of-a-safe-network/

When Joseph Latouf was in high school, a challenge sparked his curiosity. His algebra class was informed that if anyone could come up with a prime number generator, they would win a $100,000 reward. Latouf got fast at work, and after some intense analyzing and deliberating, uncovered a clever method of creating a prime number generator. A professor at a nearby university was called in to prove that his prime number generator worked—and indeed, it did. Sadly, however, there really wasn’t a $100,000 prize.

Latouf said he tucked away the fruits of his labor in his back pocket, hoping that it would someday lead to something of value. After all, he knew that a prime number generator was important, since it holds the keys for encryption.

Fast forward many years later, when Latouf was wrestling with the idea of security and encryption and feeling uneasy about the fact that if he had a prime number generator, others likely do too. And, that meant that there were people out there who can crack encryption.

...

http://www.datacenterknowledge.com/archives/2016/04/28/it-innovators-taking-data-security-to-the-next-level/

Friday, 29 April 2016 00:00

The Demands for Cyber Security

We’re under attack and to say organizations across the board are slow to respond is an understatement. On average, it takes the Enterprise anywhere from nine to eighteen months to identify that a security breach has occurred.

How much data do you think the bad guy is able to exfiltrate in that period of time? All of it!

The demands for Cyber Security amid the ever-increasing pressures in the enterprise for bigger, better, faster and yesterday, have become a huge challenge for any administrator and/or security professional.

Within the plethora of technologies, demands from users and compliance, keeping the organization’s most prized assets – their data – safe is a highly complex task. Time and again, the age old problem perpetuates a weakened security posture. Is this Groundhog Day reality, the result of highly sophisticated and innovative threats? Are attackers all of a sudden much smarter and more coordinated?

...

https://www.citrix.com/blogs/2016/04/28/the-demands-for-cyber-security/

Friday, 29 April 2016 00:00

My Technical Learning Curve: Encryption

Resilience professionals, particularly those from a non IT background, really need to step up and develop their overall understanding of technology, especially focusing on how we all communicate with one another in the modern age. I mean, how else are you going to be able to fully appreciate the magnitude of risks potentially facing your business?

I hear you say “my IT guy will tell me” but even then beyond the tech descriptions you’re only ever getting their individual perspective. How confident are you of their awareness of the business process that’s using the technology? or the impact to customer experience? Or how it might affect the long term leadership strategy as to why you have that technology in the first place? In my experience, very technical employees are often very skilled in one particular area of focus and tend to think in a very linear way. I therefore think it’s vital that resilience professionals who face off to senior management and leadership need to have a basic understanding of how some of it actually works.

Oh and by the way I’m not just talking about all the buzzwords you see coming out from half-baked vendor blogs repeatedly referencing cool words like “Brute Force,” “Spear Phishing” or “Whaling” or “Social Engineering.”

...

http://blueyedbc.blogspot.com/2016/04/my-technical-learning-curve-encryption.html

When I started in this business more than 30 years ago, it took a supercomputer to do what a laptop can do today, and networks were in their infancy in places like Stanford. Storage is a lot more complicated these days, and storage architects and administrators need to be on top of a whole lot more than they used to. So with a nod to the now-retired David Letterman, here is my list of the Top 10 things storage architects and admins need to be monitoring and doing.

...

http://www.enterprisestorageforum.com/storage-management/ten-trends-data-storage-pros-need-to-watch-1.html

Friday, 29 April 2016 00:00

A Generation that Speaks Up

It is becoming more common to see the integration of millennials in the workforce. Many people assume this population of workers to be young kids fresh out of college. However, that is not the case. The higher ladder of millennials are already holding roles in management, leadership and even executive positions. Companies are seeking out millennials because they are a generation of visionaries and bring new perspectives. It is estimated that by the end of 2016, millennials will be the largest generation in the workforce.

A key characteristic of these young workers is their ability to speak up and take a stand. They have been socially trained to look at the bigger picture and ask necessary relevant questions that will take your organization to the next level. Given their go-getter mentality, millennials want to grow and that includes growing out of your company if they don’t see the promise of personal benefit or growth.

...

http://www.bcinthecloud.com/2016/04/a-generation-that-speaks-up/

In today’s corporate world, most organizations have a crisis management plan in place. However, many of these plans are out of date or not truly actionable, leaving businesses vulnerable to a wide range of threats.

In a recent Deloitte survey, researchers found that after a crisis more than 70 percent of organizations took up to three years to fully recover their reputation and operations. Many of these companies even had a plan in place—but it simply didn’t get the job done.

Is your crisis plan operational? If a crisis strikes tomorrow, would your stakeholders be prepared to react accordingly to protect themselves and mitigate damage to the company? Or would you still be cleaning up the mess three years later?

...

http://www.rockdovesolutions.com/blog/4-ways-to-operationalize-your-crisis-management-plan

RagingWire's Ashburn Data Center Campus Expands to 290,000 Square Feet and 28 Megawatts of Power in the Top Market for Data Centers in the World

ASHBURN, Va. – (Marketwired - April 28, 2016) RagingWire Data Centers, the premier data center provider in the United States and an NTT Communications group company, cut the ribbon today on its new data center known as Ashburn VA2. The ribbon cutting took place at a gala event, one of the biggest in the industry this year, attended by over 600 business, technology, and civic leaders from around the world. 

VA2, with 140,000 square feet of data center space and 14 megawatts of critical IT power, is designed for large-footprint deployments. The facility features seven turn-key vaults and highly flexible colocation configurations tailored for wholesale data center buyers. One and two megawatt private suites are available, as well as multi-rack cages. The site is fully secured, has multiple conference rooms and a customer lounge, and includes 10,000 square feet of office space which can be included as part of a data center solution. VA2 is fully integrated and fiber connected with RagingWire's Ashburn VA1 Data Center, expanding the campus to 290,000 square feet and 28 megawatts of power.

"Ashburn has become a 'must have' location in the data center portfolios of enterprises seeking to maximize application performance," said George Macricostas, Founder and Chief Executive Officer of RagingWire. "We designed our new VA2 Data Center and our Ashburn Data Center Campus to be a preferred computing site for the top companies in the world."

The Ashburn VA2 Data Center is the latest facility to join the global data center platform of NTT Communications, which includes over 140 locations as part of its Nexcenter™ brand of data center service. NTT Communications and its affiliate companies are known for delivering seamless information and communications technology (ICT) solutions. These solutions provide innovative services and cutting-edge technologies that transform business, markets, and society, creating new value that exceeds expectations and transcends the boundaries that limit people.

Katsumi Nakata, Senior Executive Vice President of NTT Communications, attended the RagingWire ceremony along with 20 other executives from NTT Communications and its affiliates. According to Mr. Nakata, "We are proud to include RagingWire's Ashburn VA2 Data Center as part of our global solutions portfolio, helping companies transform and transcend. Congratulations to RagingWire on opening another world-class data center."

The ribbon cutting program was hosted by Peggy Fox, three-time Emmy award winning multi-media journalist. Speakers included, Douglas Adams, president of RagingWire, Katsumi Nakata from NTT Communications, and special guest Bobbie Kilberg, President and CEO of the Northern Virginia Technology Council (NVTC), one of the largest tech associations in the United States. 

Kilberg commented, "In our interconnected world, data centers have become fundamental to everything we do and a critical driver of our economy. On behalf of the Northern Virginia Technology Council and the over 1,000 companies and organizations we serve -- congratulations to the entire RagingWire team on opening the Ashburn VA2 Data Center." 

RagingWire operates nearly 1,000,000 square feet of data center space in the United States. The Sacramento Data Center Campus is the largest commercial data center in the state of California with 680,000 square feet and 53 megawatts of critical IT power. In Ashburn, Virginia, in addition to the VA1 and VA2 data centers, the company has broken ground on a massive 2,000,000 square foot data center campus on 78 acres of land. In the Dallas-Fort Worth Metroplex, RagingWire has begun construction on a new 1,000,000 square foot data center campus on 42 acres of land with plans for the first customers by the end of 2016.

About RagingWire Data Centers

RagingWire Data Centers designs, builds, and operates mission critical data centers that deliver 100% availability and high-density power. The company currently has over 80MW of critical IT load spread across nearly 1 million square feet of data center infrastructure in Northern California and Ashburn, Virginia, with significant growth plans in both locations, Texas, and other top North American data center markets. As an NTT Communications group company, RagingWire is one of the most financially strong companies in the data center industry and is part of the global network of 140 data centers operated by NTT Communications under the Nexcenter™ brand. For more information visit www.ragingwire.com.

All trademarks, service marks, registered trademarks, and registered service marks are the property of their respective owners.

Image Available: http://www.marketwire.com/library/MwGo/2016/4/29/11G095765/Images/VA2_Ribbon_-_Nakata_Doug_confetti_4-28-2016-99e53818b2bf8819894663fa75d758e5.jpg
Image Available: http://www.marketwire.com/library/MwGo/2016/4/29/11G095765/Images/VA2_Ribbon_-_Crowd_4-28-2016-bc7377e689bcac909effa9ed13ea7e84.jpg

Companies Unite on May 5 to Educate Consumers on the Importance of Password Safety and the Value of Two Factor Authentication (2FA)

SUNNYVALE, Calif. – (Marketwired - Apr 28, 2016) In support of the annual World Password Day on May 5, Zetta, a leading provider of high-performance cloud backup and disaster recovery solutions, has joined Intel Security, Microsoft, Dell and others in support of promoting better password habits and the value of two factor authentication (2FA). The effort is designed to help educate consumers worldwide on the importance of password safety and to encourage everyone to change or strengthen their passwords using tips found at passwordday.org.

Recent research1 states that as many as three in four consumers use duplicate passwords, many of which (47%) have not been changed in five years or more. As a result, as many as 90% of online accounts are vulnerable to hacking2. Consumers do want greater online security. In fact, 68% report that they want companies to provide an extra layer of internet security, such as 2FA. 2FA provides an additional layer of protection that can significantly decrease the risk of a hacker accessing vital information, including online backup files. When using 2FA, 86% of people feel their accounts are more secure.

For its direct-to-cloud backup and recovery customers, Zetta delivers a seamless approach to 2FA, using standards-compliant, time-based authentication. Compatible with Google Authenticator and other standards-compliant 2FA devices, Zetta 2FA is both unobtrusive and truly secure. Users only need to validate their 2FA code every 30 days from a new device, while the code provided changes every minute for truly secure validation.

"When protecting your vital business data using a cloud-based backup and recovery solution it's imperative that you utilize the most secure and compliant technology available," said Mike Grossman, CEO, Zetta. "Using state-of-the-industry security protocols, including 2FA, SSL encryption in flight and AES encryption at rest, along with 100% recovery reliability, Zetta cloud backup and disaster recovery provides the compliant data protection businesses need to rest easy. We are a proud supporter of World Password Day, evangelizing best password practices to prevent the threat of data breaches."

World Password Day 2016, Thursday, May 5, is a global celebration to promote better password habits. To learn more, visit passwordday.org.

About Zetta
Zetta is an award-winning provider of high-performance cloud backup and disaster recovery solutions that are a worry-free choice for businesses and managed service providers. The Company's direct-to-cloud approach provides businesses a fast and reliable way to protect, access and quickly recover their business-critical data and systems -- both physical and virtual -- without the need for costly extra hardware. For more information, visit www.zetta.com.

1 Entrepreneur, June 2015

2 Deloitte, Telecommunications Predictions Collection