Spring World 2015

Conference & Exhibit

Attend The #1 BC/DR Event!

Summer Journal

Volume 27, Issue 3

Full Contents Now Available!

Jon Seals

This course is delivered in an interactive eLearning environment and is delivered over a period of eight weeks. Each session lasts two hours with two sessions scheduled for each of the eight weeks, giving you a total of 32 hours of training.

The BCI Good Practice Guidelines Live Online Training Course has been revised for 2014 and is fully aligned to the Good Practice Guidelines (GPG) 2013 and to ISO 22301:2012, the international standard for BCM.

This course offers a solid description of the methods, techniques and approaches used by BC professionals worldwide to develop, implement and maintain an effective BCM programme, as described in GPG 2013 and takes the student step by step through the BCM Lifecycle, which sits at the heart of good BC practice.

...

http://buckssecurity.wordpress.com/2014/09/01/the-bci-good-practice-guidelines-live-online-training-course/

Infrastructure virtualization is a proven means of streamlining hardware footprints and increasing resource agility in order to better handle the demands of burgeoning data loads and wildly divergent user requirements.

But it turns out that what is good for infrastructure is also good for data itself, which is why many organizations are looking to augment existing virtual plans with data virtualization, particularly when it comes to massive volumes found in archiving and data warehousing environments.

The Data Warehousing Institute’s David Wells offers a good overview of data virtualization and how it can drive greater enterprise flexibility. In essence, the goal is to enable access to single copies of data across disparate entities, preferably in ways that make details like location, structure and even access language irrelevant to the user. For warehousing and analytics, then, this eliminates the need to move all related data to a newly created database, which gives infrastructure and particularly networking a break because data no longer has to move from site to site in order to reach the user. Couple this with semantic optimization and in-memory caching and suddenly Big Data starts to look a lot less menacing.

...

http://www.itbusinessedge.com/blogs/infrastructure/in-step-with-data-virtualization.html

September 2, 2014

Confounded and Confused

The big change has finally started to take effect, with our historic preceptions of terrorism, consequences of decades of mismanagement of the Middle East, the lack of intervention where needed and intervention where not necessary, the lack of political and public will to engage with the idea of ‘home-grown’ terrorism and the enthusiasm for disaffected youth to belong to something that allows them to ‘matter’.

In the UK, we have raised our threat level from International Terrorism to ‘Severe’.  This is in recognition of the fact that there is stated intent to attack the UK ‘homeland’ and its people.  There is known capability and the potential adversaries are motivated and perhaps preparing their plans now – raising the threat level is a sensible caution and allows some focus and thinking about what needs to be done to improve our protective and response capabilities.  The result amongst our population varies from fear about a threat we don’t understand to perhaps understandable scepticism about the motives of the Government and the wish to impose a ‘police state’ regime.

...

http://buckssecurity.wordpress.com/2014/08/31/confounded-and-confused/

Call centers equip agents with multiple high-performance desktops powered from one PC

Calgary, AB – High-performance workstations are essential to the success of most call centers, but as call centers around the world face continual pressure to reduce costs and improve performance and control costs, traditional computing approaches place are too costly. AMJ Technologies, an IT support company based in Las Vegas, NV, has adopted Userful virtualization software to reduce the cost of its computing infrastructure and improve performance and quality control.

The simplest and most flexible virtual desktop solution, the all-in-one Userful VDI software appliance leverages zero client devices to replace physical PCs, saving an average of 60% of hardware and 90% of electricity costs. From a single Core i7 PC, Userful offers concurrent use of different operating systems including full Microsoft™ Windows desktops and free, integrated desktops such as Chrome-based cloud-client, Linux, signage solutions and desktops delivered through Remote Desktop Protocol (RDP). The browser-managed Userful solution takes virtualization beyond the desktop, and can also be used to power interactive touch displays, digital signage and video walls.

AMJ Technologies has been installing Userful Multiplatform in call centers to set up fleets of workstations, and is now able to offer multiple desktop environments for each agent, but at a fraction of prior costs. Andrew Johnson, owner of AMJ Technologies, has been extremely pleased with choosing Userful Multiplatform because of it's of simple set up, affordability and high performance.

"Userful is the only software that does what it can do with very simple installation. The first station I configured was up and running within a half an hour," Johnson said. "Once it's configured you don't have to worry about it -- it just works."

Call centers of any size can take advantage of the Userful Multiplatform solution and its flexibility in order to better equip agents, improve customer service, and reduce overall costs. With Userful Multiplatform, a standard PC server can power multiple desktops along with additional digital displays, such as touch screens and digital signs. All displays can be customized with a choice of operating systems, all managed from a central application.

StorTrends 3500i, Hybrid and/or All-Flash Array, Demonstrates Top-Class Performance During Benchmark Against Well-Known Tier 1 Storage Vendors

 

NORCROSS, Ga. StorTrends® today announced that an independent lab test and benchmark conducted by StorageReview Enterprise Lab has found its StorTrends 3500i, SSD hybrid and/or full flash storage array, a powerful and easy to deploy hybrid storage platform built for high performance and maximum capacity.  During the benchmark testing, which was conducted against well-known Tier 1 storage vendors, the StorTrends 3500i demonstrated top-of-the-class performance. Listed below is an excerpt of the report for the SQL Server Output Test with 30k Virtual Users.  

 

As you can see from the charts above, under a full performance load the StorTrends 3500i outperformed the other hybrid vendors in both highest transaction per second (TPS) and lowest latency. This provides customers with the greatest TPS under strenuous load while responding to every IO in the fastest time possible.

"The real magic of the StorTrends 3500i comes from the control it offers to customers," said Brian Beeler, Founder, Publisher and Editor, StorageReview.  "The array supports both SSD caching and tiering, which is somewhat novel in the hybrid space, and a feature called Automatically Tuned Volumes (ATV).  ATV gives users a high-degree of control over what kind of performance an individual volume receives by selecting the storage it sits on, and allowing admins to prioritize (or not) the performance.  StorTrends arrays also include a robust set of enterprise-ready data services and the ability to scale up with additional disk enclosures."

Beeler continued, "While high-performance storage is certainly compelling, where many arrays fall down is on the data services side.  StorTrends has done well to mitigate that concern with the inclusion of a host of enterprise features.  These are highlighted by support for snapshots, thin provisioning, replication, WAN data services and archiving with deduplication.  The system supports RAID 5, 6, 10, 50 and 60 and is managed via an easy to use web-based GUI."

"The StorTrends 3500i was the top-performing array in the majority of the lab tests ran by StorageReview. This is a testament to the SSD caching, SSD tiering, Automated Tuned Volumes and other key technological features within the StorTrends 3500i. With more than 300 patents it's clear to see why StorTrends is a frontrunner in the Hybrid Array Lab Report," said Justin Bagby, Director of StorTrends.  "We are proud of the StorTrends 3500i benchmark results; and delighted that customers now have another undeniable proof point that the StorTrends 3500i's patented features provide the ultimate combination of extreme performance, optimal capacity and ease of use to meet their business application and budgetary requirements."

To read the complete StorageReview Enterprise Lab report on the StorTrends 3500i, please visit: http://www.storagereview.com/ami_stortrends_3500i_hybrid_array_review

Tweet this:  @storagereview benchmark demonstrates StorTrends 3500i powerful and easy-to-use hybrid or full flash storage array http://www.storagereview.com/ami_stortrends_3500i_hybrid_array_review

About StorTrends
StorTrends® from American Megatrends (AMI) isPerformance Storage with Proven Value.  StorTrends SAN and NAS storage appliances are installed worldwide and trusted by companies and institutions in a wide range of industries including education, energy, finance, state and local government, healthcare, manufacturing, marketing, retail, R&D and many more.  StorTrends meets the challenges and demands of today's business environments by offering a wide variety of solutions from all-flash storage, hybrid storage to spinning disk solutions.  StorTrends is backed by 1,100+ customer installations, 100+ storage patents and nearly 30 Years of IT leadership from a company that millions of people trust on a daily basis, American Megatrends, Inc.  For further information, please visit: http://www.stortrends.com.

Technology breakthrough is a game changer for consumers with a data loss from the latest Apple mobile devices

EPSOM – Consumers, who use Apple's newest mobile devices, including iPhones® and iPads®, can now recover data such as lost photos and videos that go missing during malfunctions that impact their operating systems.

Kroll Ontrack, the leading provider of data recovery and ediscovery products and services, today announced its engineers have developed a unique capability to recover data from the latest Apple mobile devices, which exhibit a logical failure leaving the device stuck in "Recovery" mode or "Device Firmware Upgrade (DFU)" mode. These failures can effectively trap encrypted data on the devices. However, Kroll Ontrack has devised a way to temporarily bypass the logical corruption to access the data using the consumer's login information.

This new method increases the chances of recovering encrypted data on the newest iPhones and iPads by up to 60 percent.

"Logical failures, such as OS upgrade malfunctions and corrupt software, can leave iPhone or iPad users with a device that is functional, but data that isn't accessible," said Phil Bridge, Managing Director, Kroll Ontrack. "Add to that Apple's latest generations of mobile devices with encrypted user data and data recovery success was slim because direct access to the encrypted data was not an option."

Building on its long history of delivering the most robust Mac recovery toolset in the industry, Ontrack Data Recovery engineers specifically developed the unique ability to repair the operating system to then access the data for all Apple mobile devices, including the iPhone 5S® and iPad Air®, which are hardware encrypted. This method, combined with an already extensive ability to recover from non-hardware encrypted Apple devices, significantly increases the chances of recovering photos, videos, contacts, SMS, notes, calendar and other critical mobile device content. With a diagnostic report that shows the quality of recoverable files on the Apple device, individuals benefit from knowing exactly what data will be returned to them prior to committing to the cost of the recovery. Once the recovery is complete, Kroll Ontrack provides both the raw files as well as a backup file that the individual can use to perform a full restore from iTunes to their Apple mobile device. This also provides a point in time recovery file for future use.

"Customers were coming to us for help recovering their encrypted data from their newer Apple devices because there are no commercially available solutions. We researched the issues and developed our own solution, as we often do," added Bridge. "Our solution does not defeat or bypass the device's encryption, but rather temporarily bypasses the logical corruption without "jail breaking" the device to access the data using the device and customer's user access credentials."

For more information about Kroll Ontrack's proven recovery capabilities and a full range of data recovery tools for both logical and physical failures, visit www.krollontrack.co.uk/data-recovery.

About Kroll Ontrack Inc. 
Kroll Ontrack provides technology-driven services and software to help legal, corporate and government entities as well as consumers manage, recover, search, analyse, and produce data efficiently and cost-effectively. In addition to its award-winning suite of software, Kroll Ontrack provides data recovery, data destruction, electronic discovery and document review. For more information about Kroll Ontrack and its offerings please visit: www.krollontrack.co.uk, follow @KrollOntrack on Twitter or subscribe to the Kroll Ontrack Data Blog.

Testing completed with CacheAdvance Application Acceleration Software on MongoDB using Toshiba PX02SSF 12G SAS SSD


SAN CARLOS, Calif. — CacheBox, Inc. has announced the addition of Toshiba’s PX02SSF 12G SAS SSD to the company’s Hardware Compatibility List. The PX02SSF joins other enterprise SSDs that CacheBox has qualified for use with CacheAdvance™, CacheBox’s unique application acceleration software that enables significant improvements in application throughput and processing with no disruption to a company’s compute or storage infrastructure. “In a world where application performance and scale means everything, a cost effective solution that deploys and scales users in minutes instead of months is what the industry needs to achieve high return on investment,” said Lorenzo Salhi, CacheBox CEO. “We are pleased that Toshiba’s enterprise class SSDs have been added to our hardware compatibility list. According to George Bouchaya, Vice President and CTO at Toshiba America Electronic Components, Inc., “CacheBox’s innovative CacheAdvance software can help customers get the most out of their investment in storage while helping to drive the adoption of SSDs in the enterprise.” CacheBox’s internal testing of CacheAdvance shows significant performance improvements and latency reductions over hard disk storage with MongoDB, and enables customers to realize the most cost effective solution for bridging the application requirements of performance and capacity. CacheAdvance is a software-only, application centric solution that removes application input/output (IO) bottlenecks in a targeted manner. It works by monitoring application IO requests and intelligently determines which data to accelerate to provide optimal performance and user experience.
About CacheBox, Inc. CacheBox is a privately funded, early stage global company with offices in Silicon Valley and Pune, India that is focused on using its advanced application centric architecture to vastly improve application performance. The CacheBox team includes software and storage industry veterans from companies such as sTec and Symantec/Veritas. For more information, visit www.cachebox.com

WOKING, Surrey – VAD Wick Hill has become a certified training centre for the SafeNet Authentication Service (SAS). The first three-day course at Wick Hill’s Woking HQ will run on Monday, September 29th, 2014. The course is part of SafeNet’s new partner program, designed to ensure certified resellers are rewarded for their commitment to the product.

Aimed primarily at resellers, but also available for their customers, the course will cover all aspects of implementation, provisioning and troubleshooting of both the cloud-based and the on-premises version of the SAS product. There is a certification exam, with a SafeNet certification qualification.

The course will be repeated once a quarter. It’s also available on-site and can be white-labelled by VARs to sell on to their customers, with bespoke tailoring available.

Ed Kidson, product sales manager for SafeNet at Wick Hill, commented: “Thanks to Snowden, and a range of highly visible security breaches, authentication is experiencing strong growth. This provides a major opportunity for our SafeNet resellers to get accreditation and deliver a wider range of professional services with their sales.”

 

Integration with ConnectWise Management Platform Enables IT Service Providers to More Effectively Run Their Business and Focus on Better Servicing Their Customers

 

SUNNYVALE, Calif. – Zetta.net announced today it has completed integration of its enterprise-grade (DR) solution with ConnectWise, a leading business management platform for IT service providers, VARs, ISVs, and MSPs. IT service providers now have a complete view of their Zetta.net customers' data usage, alerts, billing and other activities from within the ConnectWise platform, streamlining their management and administrative tasks. As a result, IT service providers can more efficiently run their business and focus on better servicing their customers.

Tweet this: @zettanet integrates its #cloudbackup and #disasterrecovery solution with @connectwise

More than half of the world's top managed services providers (MSPs) leverage the ConnectWise platform to increase profitability, efficiency and control. Zetta.net's integration with ConnectWise builds on its effort to simplify backup administrative processes by delivering a unified backup management and automated billing platform to MSPs.

Zetta.net partners can streamline and automate their business processes with ConnectWise to:

  • Proactively manage backup and restore status of their clients' backup environments
  • Quickly extract alerts and automatically open a service ticket
  • Link customer account usage and create automated billing

Zetta.net provides file, database and server image backups for both physical and virtual environment without the need of an appliance. With built-in WAN acceleration, the solution delivers faster backup and recovery speeds with data transfer rates of up to 5TB in 24 hours. Its appliance-free approach is an advantage for MSPs because it eliminates extra resources and cost associated with deploying and maintaining hardware at each customer site. As a result, customers are up and running in minutes and backup and recovery can be managed from anywhere.

"With Zetta.net's cloud backup and DR solution, we know our clients' data is available anytime, anywhere," said Peter Cronin at Biff Duncan Associates, Inc. "Zetta's integration with ConnectWise will give us a more integrated picture of our clients' backup and recovery status and automate common tasks so we can focus on better servicing our clients."


 

"We're excited Zetta.net's MSP strategy includes integration to ConnectWise," said Jeannine Edwards, Director, ConnectWise Platform at ConnectWise. "Their SaaS-based approach to protecting mutual partners' backup and recovery needs will make for a great addition to the ConnectWise Platform community."


 

"We continue to drive simplicity and efficiency into our solution to help MSPs build a more profitable backup service," said Art Ledbetter, Director of Channels at Zetta.net. "The integration with ConnectWise enables MSPs to eliminate manual business processes and enhance visibility into their clients' backup activities to effectively manage their business."

With the ConnectWise integration, Zetta.net continues to help MSPs simplify management of their backup service and more effectively grow their business. As a result, Zetta.net experienced unprecedented partner growth with:

  • 357% new partners in the first half of 2014
  • 871% new customers from partners in 2013
  • 97% client retention
     

About Zetta.net

is an award-winning provider of for small/medium enterprises and managed service providers (MSPs). Its software-only approach with built-in WAN acceleration enables companies to simplify backups, speed data recovery and reduce overall cost.

For more information, visit: www.zetta.net or www.linkedin.com/company/zetta-inc 


 

Follow Zetta.net on Twitter at: www.twitter.com/zettanet

Tags: cloud backup, disaster recovery, offsite backup, online backup, hybrid cloud backup, remote backup, server backup, data protection, MSP backup

Today, I conclude a three-part series on risk assessments in your Foreign Corrupt Practices Act (FCPA) or UK Bribery Act anti-corruption compliance program. I previously reviewed some of the risks that you need to assess and how you might go about assessing them. Today I want to consider some thoughts on how to use your risk assessment going forward.

Mike Volkov has advised that you should prepare a risk matrix detailing the specific risks you have identified and relevant mitigating controls. From this you can create a new control or prepare an enhanced control to remediate the gap between specific risk and control. Finally, through this risk matrix you should be able to assess relative remediation requirements.

A manner in which to put into practice some of Volkov’s suggestions was explored by Tammy Whitehouse, in an article entitled “Improving Risk Assessments and Audit Operations”. Her article focused on the how Timken Company, assesses and then evaluates the risks the company has assessed. Once risks are identified, they are then rated according to their significance and likelihood of occurring, and then plotted on a heat map to determine their priority. The most significant risks with the greatest likelihood of occurring are deemed the priority risks, which become the focus of the audit/monitoring plan, she said. A variety of solutions and tools can be used to manage these risks going forward but the key step is to evaluate and rate these risks.

...

http://tfoxlaw.wordpress.com/2014/08/28/risk-assessments-the-cornerstone-of-your-compliance-program-part-iii/