Spring World 2015

Conference & Exhibit

Attend The #1 BC/DR Event!

Fall Journal

Volume 27, Issue 4

Full Contents Now Available!

Press Releases

Press Releases (1456)

Columbus, Ohio – Emerson Network Power, a business of Emerson (NYSE:EMR) and a global leader in maximizing availability, capacity and efficiency of critical infrastructure, today released a white paper discussing rack enclosure trends and best practices. As rack densities have increased along with overall facility power requirements, taller, wider and deeper racks are required to effectively accommodate these changes.

The white paper, titled “Data Center Rack Systems Key to Business-Critical Continuity,” takes a close look at the need for data center planners to be flexible and adaptable in rack selection. 

“Taking a best practices approach when specifying racks – planning and investing to meet today’s needs with the thought of expansion tomorrow – helps to ensure that data center needs won’t readily outgrow capabilities,” said Ron Bednar, director, solutions technologies, Emerson Network Power. “Flexibility allows a data center to respond quickly to changing business needs. And while the racks themselves need to adapt to the room in which they are housed, the data center must be able to adapt to individual rack environments and zones.”

The Emerson Network Power white paper notes that racks are now available that improve equipment installation speed via tool-less, “slide in, slide out” procedures. Taller racks take advantage of the data center’s headroom, while rack depth has increased to accommodate equipment. Side breathing needs have increased rack width to meet new manufacturers’ specifications and to enhance equipment performance and life through hot-aisle/cold-aisle arrangements.

Also discussed are:

  • Increased weight capacities up to 3,000 lbs.
  • 19-inch rails for easier equipment installation and adjustment
  • Door configurations that increase air flow and are reversible to ease maintenance
  • Split-locking side panels to simplify installation
  • Cable-ready roof tops and cable ingress/egress
  • Rack grounding
  • Rack stability and security
  • Rack accessories, including cable and airflow management and IT equipment support

For more information on data center rack systems, or other Liebert technologies and services from Emerson Network Power, or to download the white paper, visit www.Liebert.com.

About Emerson Network Power

Emerson Network Power, a business of Emerson (NYSE:EMR), delivers software, hardware and services that maximize availability, capacity and efficiency for data centers, healthcare and industrial facilities. A trusted industry leader in smart infrastructure technologies, Emerson Network Power provides innovative data center infrastructure management solutions that bridge the gap between IT and facility management and deliver efficiency and uncompromised availability regardless of capacity demands. Our solutions are supported globally by local Emerson Network Power service technicians. Learn more about Emerson Network Power products and services at http://www.emersonnetworkpower.com/">www.EmersonNetworkPower.com.          

Hamburg - Enterprise cloud synchronization provider TeamDrive is warning about the serious security risks being run by companies that ban document and file sharing services, such as Google Drive and Dropbox, without providing an encryption-based alternative.

According to the 1,300 respondents to a survey conducted by storage firm Nasuni, one in five employees is using Dropbox. What is more worrying is that 49 percent of users ignore corporate policies and use the service regardless, according to the Shadow IT in the Enterprise report.

This implies that the perceived benefits of having an unmanaged, unmonitored and unsupported element in business IT overrides any sense of responsibility. TeamDrive recommends accepting the irresistible trend by embracing it within a secure and manageable system such as its own.

Departments most likely to use file synchronizing services are IT, sales, finance and engineering - the latter three being sectors likely to have access to extremely business-sensitive data. Users around these departments are just as likely to be senior management as rank and file workers.

In May 2012, IBM was so concerned about the growing use of cloud file synchronization services that it banned its staff from using Dropbox and Apple's iCloud. It is likely that others will follow suit but the growing use of Bring Your Own Device (BYOD) strategies makes enforcement difficult, if not impossible.

Many of the services available seem to be secure because they use encryption between the user and the service but this protection is stripped away at the receiving end and the files are stored by the service provider in the clear. If a hacker, or even a rogue employee of the storage firm, gains access to a cloud drive, it could be costly if sensitive documents are being passed through the service.

Even when documents are encrypted at rest in the cloud, the providers, such as Dropbox, use a single key held in their system to unlock files as they are accessed by the document's owners or their sanctioned colleagues.

TeamDrive provides an individual service where a separate encryption key is generated for each user and stored on the client device. This means that TeamDrive cannot access the contents of any information stored on its systems and, if any files were stolen, a hacker would only have useless files encrypted to a 256-bit standard. The files are only available in the clear on the client devices and not anywhere in the cloud, giving true end to end security.

It is the service, not the cloud provider that is the attraction. Even if a ban on one provider's product is adhered to, staff would turn somewhere else. It is better to provide a secure system, like TeamDrive, to bring the renegades back into the security of the fold.

 Leading Information Security consultancy, MWR InfoSecurity, has released Mercury v2.0 today, Friday 14th December. MWR are building on the success of their tool Mercury v1.1 which is the first and only security testing framework that allows for dynamic analysis of apps running on Android devices.

The power of Mercury was demonstrated by a team from MWR Labs, the company’s research arm, when they used the tool to win the Pwn2Own competition for Android at EUSecWest in September this year.

Tyrone Erasmus, creator of Mercury, said: “Mercury allows Android developers and security researchers to investigate the Android environment to identify security vulnerabilities. The v2.0 release introduces a number of significant new features and many important changes under the bonnet.”

He added: “We have improved the usability and want to push out this new version to allow more people to explore the Android platform with ease.”

One of the new features is the Infrastructure Mode - it is a new way to use Mercury where the Android device can phone home to a central server which allows Mercury to traverse common network security equipment such as firewalls. This new feature is an improvement on Mercury v1.1 because users can now connect to an Android device without knowing its IP address.

Daniel Bradberry, Head of Security Tools Development at MWR, said:  “The Infrastructure Mode is a significant new feature which allows security researchers to build real world attack scenarios and test how devices may be used to compromise corporate environments. This is particularly important given the rise in BYOD strategies.”

Mercury v2.0 provides support for more devices, covering over 99% of those active in the market. Support has been extended back to Android 2.1 (Eclair) and all later versions. The release also introduces an improved User Interface which has replaced multiple levels of menus with a single prompt that gives access to all of Mercury’s functionality; this makes it faster and easier to perform an assessment.

Daniel Bradberry added: “The key is we have made it simpler. We have tried to improve the interface by drawing on the shells we use on a daily basis; this should make it more comfortable for people when they first start using Mercury.”

Additionally, Mercury v2.0 provides very easy access to allow users to write code and execute it directly on the device without altering the existing software. This improves the ability to extend Mercury’s functionality and provides the user with the opportunity to dig deeper than before.

Erasmus said: “The development of Mercury v2.0 has been enhanced by the substantial amount of feedback we have received from the community and the comments and suggestions we have been  provided with as a result of the beta testing.”

Mercury v2.0 is free and available to download from today at mwr.to/mercury – Daniel Bradberry and Tyrone Erasmus will also be tweeting useful hints and tips on how to use and get the most out of the tool throughout the release day from @droidhg.

PALO ALTO, Calif. -- In today's increasingly virtualized, mobile, and cloudy world, Chief Information Officers (CIOs) and Chief Information Security Officers (CISOs) are confronted with complex challenges around information security, big data management, and compliance with regulations such as SOX, PCI DSS, HIPAA, NERC, FISMA, and ISO 27001. The traditional approach of managing these requirements in multiple silos and systems is not only inefficient and expensive, but also leads to redundancies and conflicts. Today, organizations seek to rationalize and harmonize their IT GRC processes, while also providing top-level visibility into enterprise IT risk and compliance data that can help determine areas of concern, and enable management to make quick, actionable decisions based on sound data points.

MetricStream provides a comprehensive suite of IT GRC solutions that aggregate and unify IT risk and information security and compliance data from across the hyper-extended enterprise. The solutions also help add business context to the data, as well as provide strong analytics capabilities to support mature, risk-oriented security programs.

The MetricStream solutions integrate with various applications – such as those for identity management, asset management, Security Information and Event Management (SIEM), threat and vulnerability assessment, intrusion detection and prevention, and security feeds – to consolidate data related to information security, and technology risks. Powerful dashboards present a real-time, top-level view of this information. The solution also facilitates a robust workflow-based approach to IT audit management and remediation management.

MetricStream IT GRC Solutions were recently reviewed by IDC, a leading provider of global IT research and advice, in its report - "MetricStream: Comprehensive Solutions for IT Governance, Risk, and Compliance[1]." The report highlights MetricStream's "strong intellectual property (IP) portfolio around GRC," its "strong portfolio of IT GRC products that address end-to-end customer requirements," and its "strong partnership with various technology vendors in the security, smart grid, network management, operations, and asset management spaces." The report also highlights MetricStream's "strong IT GRC capabilities around cloud and virtualized environments."

Mayur Sahni, Research Manager, Services at IDC Asia/Pacific says, "Compliance requirements today are non-negotiable, and it's imperative for enterprises to implement a structured, organization-wide approach to IT GRC. MetricStream has a broad set of technologies not only to enforce and implement IT controls, but also to collect and harvest the information required to manage risk and demonstrate governance."

MetricStream IT GRC solutions provide integration capabilities for IT security, cloud, infrastructure, General Computer Controls (GCC), and business application controls. It simplifies compliance across IT regulations, standards, and frameworks by supporting automated monitoring and reporting of IT risk and control effectiveness and provides comprehensive content for meeting compliance challenges, including over 5,000+ IT control statements from over 800+ authority documents through a partnership with UCF, which helps organizations harmonize on the smallest possible set of IT controls to meet all their compliance requirements. The solutions also provide robust IT audit management capabilities, streamlines the IT audit and compliance process, and enable multiple stakeholders to gain visibility into the status of these processes and their results. IT control or compliance issues that arise are automatically routed through a systematic process of investigation and remediation.

With MetricStream's acquisition of vPanorama cloud GRC technology from TBD Networks, the company is able to provide solutions that allow its customers to seamlessly manage risks, regulatory compliance challenges, privacy requirements, security threats, and performance metrics across the cloud & virtualized infrastructure. The technology has augmented MetricStream's IT GRC solutions by providing granular visibility and control over security configuration assessments, continuous controls monitoring, risk management, and threat and vulnerability management. It helps minimize inefficiencies, while enhancing the reliability and performance of the cloud infrastructure.

MetricStream's robust functionality has attracted marquee customers across industry segments, which include some of the largest and most respected companies in social media and Internet information, banking and financial services, healthcare, manufacturing, energy, and retail.

"IT organizations have focused solely on a bottom-up approach so far – implementing granular IT controls based on vulnerability scans, patch, and configuration control data. This approach results in a lot of data but little actionable intelligence," said Vasant Balasubramanian, Vice President of Product Management at MetricStream. "MetricStream combines bottom-up data with a top-down approach and over-arching analytics that correlate information risk, security, compliance, and business issues to provide actionable risk intelligence. Furthermore, with MetricStream's recent acquisition of vPanorama technology, we provide the unique capability of bringing top-down risk intelligence and IT GRC controls to the cloud. We also help enhance business value by closely aligning IT investments with organizational strategy and corporate objectives."

[1] IDC, MetricStream: Comprehensive Solutions for IT Governance, Risk, and Compliance, Doc #IN2672604U, July 2012

About MetricStream

MetricStream is a market leader in Enterprise-wide Governance, Risk, Compliance (GRC) and Quality Management Solutions for global corporations. MetricStream solutions are used by leading corporations such as UBS, P&G, Constellation Energy, Pfizer, Philips, BAE Systems, Twitter, SanDisk, Cummins and Sonic Automotive in diverse industries such as Financial Services, Healthcare, Life Sciences, Energy and Utilities, Food, Retail, CPG, Government, Hi-tech and Manufacturing to manage their risk management, quality processes, regulatory and industry-mandated compliance and corporate governance initiatives, as well as several million compliance professionals worldwide via the www.ComplianceOnline.com portal. MetricStream is headquartered in Palo Alto, California and can be reached at www.metricstream.com.

MINNEAPOLIS –  The rise of mobile devices in the workplace and widespread adoption of virtualization drove an increase in data recovery requests globally in 2012, according to Kroll Ontrack, a leading provider of data recovery, information management, and ediscovery products and services. The race to reduce the cost of solid state drives (SSDs) will further fuel adoption and even higher volumes of data recovery requests in 2013.

 

Due to well-recognized cost and flexibility benefits, small- to medium-sized businesses, in particular, adopted virtual environments in 2012. With an increase in adoption came an increase in data loss from these environments. Specifically, Ontrack Data Recovery engineers at Kroll Ontrack saw a 10 percent increase in user errors, such as administrators deleting virtual drives by mistake.

 

Encryption proved to be another data recovery challenge this year. As devices with hardware-based encryption became more widespread because of faster processing speeds, the use of software-based encryption decreased. Included as a standard feature, manufacturers shipped external hard disk drives (HDDs) with the encryption functionality activated. Users were often unaware that their hardware encryption was active, instead believing the HDD to simply be password protected. While encrypted drives are more secure, encryption adds an extra layer of complexity and makes it a more painstaking task to recover lost data.

 

2012: Top Three Witnessed Data Recovery Challenges

2013: Top Three Predicted Data Recovery Challenges

Growing use of mobile devices (tablets, smartphones, laptops) in the workplace (BYOD)

 

Greater use of solid state drives in business computing

Virtualized environments, particularly in small- to medium-sized enterprises

 

Adoption of more mobile platforms, such as Microsoft Surface™ and Microsoft Office 365™

Encryption on hardware devices replacing software encryption

Migration to new platforms, such as Windows® 8,  Microsoft SharePoint® 2013 and Windows Server® 2013

 

Beyond virtualization and encryption, mobile devices are also impacting data recovery trends. Kroll Ontrack experienced an influx in mobile device data recovery requests in 2012 – in line with the bring your own device (BYOD) to work trend. Specifically, the ratio went from 50 percent desktop-sized hard drives (3.5 inch format) and 50 percent laptop-sized hard drives (2.5 inch or smaller format) in 2010, to 20 percent desktop-sized drives and 80 percent laptop-sized drives, which also includes external memory, tablets and phones, in 2012.

 

 

Data recovery requests handled by Kroll Ontrack

 

 

2010

2011

2012

 

Desktop-sized Hard Disk Drives

   3.5 inch format

 

50%

 

 

35%

 

 

20%

Laptop-sized Hard Disk Drives

   2.5 inch format or smaller

(includes laptops, tablets, phones and external hard disk drives)

 

50%

 

65%

 

80%

 

“In addition to the BYOD phenomenon this year, we saw a significant increase in the use of SSDs within laptops and PCs, as well as more external HDDs,” said Todd Johnson, vice president of operations, Kroll Ontrack. “This trend introduced new areas of risk to businesses and consumers alike. SSDs are more complex devices to recover from than traditional hard drives, but the use of personal external hard drives brings extra risks associated with lost or failing devices that are themselves not backed-up properly.”

 

2013 predictions: SSDs, mobile and migration

Looking forward, Kroll Ontrack predicts that SSDs will continue to cause individual users and businesses data recovery issues in 2013. The complexity of how data is stored on SSDs makes data recovery highly specialized and time consuming. A single SSD recovery can be as complex as a RAID recovery with eight, 16 or even 32 drives.

 

”SSDs are a newer technology, and very few data recovery providers have the ability to handle the RAID and SSD layers required to put the data together in the event of a failure,” said Jeff Pederson, manager of data recovery operations, Kroll Ontrack. “Recovery requires specialized tools and software, and usually a significant investment in R&D, as data is stored in a different way on each drive. When evaluating SSDs against traditional hard disks, organizations need to make sure that they take into consideration the possibility of data loss and the subsequent need for a more time-consuming data recovery.”

 

The ubiquity of mobile devices will also continue to cause challenges in 2013, especially since new mobile platforms, such as Microsoft Surface and Microsoft Office 365, will drive further use of tablets at work. Organizations will need to find ways to accommodate this trend in a secure environment, with both data recovery and data destruction playing a key role in planning.

 

Migration to new IT platforms can also cause challenges for corporations, who may lose vital data as part of the process if they fail to back up their data properly in the interim. One platform to be aware of is Windows Server 2012, formerly Windows Server 8, which will incorporate a new file system. Windows 2012 also comes with a new file system (ReFS) and a new storage management system (Storage Spaces).

 

“Technology continues to improve in terms of the value it adds to organizations, but the flipside is that data can be at risk during the transition phase if companies do not maintain effective backups,” added Johnson. “Our role is to anticipate the challenges new technologies cause. We already have our developers researching all of these new systems in order to add support for them to our tools.”

 

About Kroll Ontrack Inc.
Kroll Ontrack provides technology-driven services and software to help legal, corporate and government entities as well as consumers manage, recover, backup, search, analyze, produce and present data efficiently and cost-effectively. In addition to its award-winning suite of software, Kroll Ontrack provides data recovery, data backup, data destruction, electronic discovery and document review. Kroll Ontrack is a subsidiary of Altegrity, an industry-leading provider of information solutions. For more information about Kroll Ontrack and its offerings please visit: www.krollontrack.com.

SAN FRANCISCO, Calif. – 365 Main Inc., a leading data center developer and operator, has purchased 16 data centers located across the U.S. from Equinix, Inc. Chris Dolan, CEO and Jamie McGrath, COO, led the purchase along with financial partners Crosslink Capital, Housatonic Partners and Brightwood Capital.

The data centers span the U.S., located in Buffalo, Chicago, Cleveland, Dallas, Detroit, Indianapolis, Nashville, New York, Philadelphia, Phoenix, Pittsburg, San Jose, Seattle, St. Louis, Tampa and Washington D.C. Key employees from these sites joined 365 Main to facilitate a smooth transition and ongoing support for local customers.

According to Chris Dolan, 365 Main CEO, "365 Main now has a national reach with a local focus. In the last decade we earned the reputation of proven data center expertise coupled with high touch customer service, satisfaction and retention. With these newly acquired data centers, we plan to bring that level of service to small businesses up to large enterprises."

About 365 Main Inc.

365 Main was founded by industry leaders Chris Dolan and James McGrath in 2002. They began with a single data center based in San Francisco and grew to five facilities nationwide with 39 megawatts of power under management. These data centers were developed and certified to the highest industry standards and compliance requirements. Today, 365 Main operates 16 data centers nationwide, having earned an industry reputation for high touch customer service, satisfaction and retention. With its years of experience in modern data center development and operations, 365 Main has proven its capability of managing customers with a broad range of requirements ranging from retail colocation to build to suit. 365 Main is a privately held company based in San Francisco. Its financial partners include Housatonic PartnersCrosslink Capital and Brightwood Capital.  More information is available at 415-901-5700 or www.365main.com###

AUSTIN, Texas — Caringo, the leading provider of object storage software, today announced that it has completed its most successful year ever. Caringo attributes their success to the overall strength of the object storage marketplace, which is being driven by emerging industry trends in the fields of cloud storage, research, healthcare, government, life sciences, email and file archiving.

With the increased adoption of public and private cloud services and the need for cost effective yet accessible storage that provides rapid performance on commodity hardware, Caringo is ideally positioned to capitalize on the growth in object storage as it moves from enabling technology for early adopters to the future of storage for the mass market. This past year saw Caringo increase the number of petabytes sold by more than 10 times over 2011. In 2012, the largest customer started with 15 petabytes, and multiple customers purchased over 10 petabytes each. Additionally, its largest OEM partner sold over 35 petabytes.

"2012 will be looked upon as the tipping point for the object storage market and our successful growth this year can be directly attributed to our position as a leader within that space," said Mark Goros, CEO of Caringo. "The largest storage providers in the industry today understand that only object storage can satisfy the demands for cloud services and Big Data. This is a trend that’s accelerating, and our accomplishments this year have set the stage for continued large magnitude growth in 2013."

In addition to record setting growth, 2012 was also the year that Caringo extended its technological leadership position within this space with several new advancements including:

• Any number of 9s data durability and optimized footprint with CAStor® 6.0 and Elastic Content Protection (ECP), which provides the storage industry's most-comprehensive data protection functionality, allowing organizations to meet any storage SLA, optimize deployment footprint and enhance data accessibility regardless of content size and capacity. ECP uses replication and erasure coding and leverages Caringo's automated health monitoring and recovery to optimize responsiveness as capacity grows.

• Robust insight and control over content with Caringo Indexer, adding real-time NoSQL indexing and the ability to perform ad-hoc searches of content within CAStor by name or metadata. The Indexer enhances the CAStor API adding the ability to perform granular searches and can be accessed directly or through the included Indexer Portal, a web-based application that provides instant, graphical insight and control over content stored in a CAStor cluster.

• A complete cloud storage service enablement stack with Caringo CloudScaler™, software that extends the Caringo Object Storage Platform, providing everything needed to deliver a highly scalable, cloud storage service with secure metering and monitoring, in a private or public configuration.

• Virtual Machine editions of the entire Caringo product suite, enabling organizations to rapidly deploy and scale the market leading object storage solution.

• Unrivaled support for the open cloud with the seamless integration of CAStor as an enterprise-ready object store for Apache CloudStack 4.0 to enable cost-effective, rapidly scalable storage for any cloud storage use through CloudStack; as well as the introduction of CAStor for OpenStack, which gives organization an option to include a more-robust, fully supported object store while still benefitting from the progress of the OpenStack community.

Based on current growth, pipeline and overall object storage benefit awareness, 2013 is primed to grow at an even faster pace. Cloud storage and Big Data will continue to drive the need for object storage. While the consumerization of IT and the velocity of file-based data creation will drive organizations to object storage’s always accessible, scalable and efficient characteristics.

About Caringo

Caringo software gives enterprises everything they need to deliver private cloud storage or cloud storage as a service. The solution combines efficient object storage technology with elastic content protection, intelligent and automatic distribution and centralized management under a global namespace on your choice of commodity hardware. The result is a secure and compliant unified pool of storage that can expand or contract capacity and object count to meet any operational or business requirements – all at cloud economics and secure in your datacenter.

Cristie Software today announced that NBMR and CBMR will now be available to order through the EMC Brokerage system. This system provides worldwide ordering capabilities for both EMC and all of EMC’s channel partners and greatly simplifies the ordering process.

NBMR provides a unique BMR solution for EMC NetWorker users as it recovers servers directly from NetWorker backups and without having to perform separate backups. This reduces the requirements for both storage space and network bandwidth.

CBMR is Cristie Software’s standalone solution that integrates with EMC Avamar.

Cristie Software provides fast, automated recovery of downed servers whether to similar or dissimilar hardware. Recoveries are typically completed in less than ten minutes and multiple servers can be recovered simultaneously.

Ian Cameron, CEO at Cristie Software said “Cristie are currently working very closely with EMC to develop sales into their NetWorker and Avamar user base. In addition EMC announced in August this year that it has discontinued sales and support for HomeBase and we expect that NBMR will offer NetWorker users an excellent alternative. We are looking forward to 2013 and continuing to build a strong foundation for the future.”

To find out more about ordering through EMC Brokerage and the simple steps to placing an order for NBMR and CBMR please contact Cristie Software at sales@cristie.com for more information.

- ends

About Cristie Software Limited
Cristie Software Limited was established in the UK in 2007 and has grown rapidly to become a leading software provider specializing in machine recovery, migration and data protection.

The software provides fast, reliable and highly automated backup, recovery and migration solutions for Windows, Linux and other Unix machines. Cristie Software solutions are sold worldwide by EMC, IBM and through a global network of leading resellers.

Connect with Cristie Software on Twitter and LinkedIn

Press Contact
Natalie Schofield – International Marketing Manager
Email: natalie.schofield@cristie.com / Telephone: +44 1453 847000 / Website: www.cristie.com

All trademarks are duly acknowledged and are used only to indicate compatibility or integration with those products.
Cristie, NBMR and CBMR are trademarks of Cristie Software Limited.
© 2012 Cristie Software Limited

COLUMBIA, S.C. - Unitrends, the leading provider of all-in-one backup, archiving, instant recovery and disaster recovery solutions, today announced Unitrends Release 7.0, the next generation of software powering its physical and virtual backup and recovery appliances. Unitrends 7.0 bolsters data protection in virtualized and cloud environments, while providing an expanded range of platform and enterprise application support.


Unitrends' portfolio of physical (Recovery Series) and virtual (Unitrends Enterprise Backup™) appliances provide unified data protection across heterogeneous environments. Powered by Unitrends 7.0, these solutions now give companies unprecedented flexibility for optimizing backup and recovery in virtualized and cloud environments, with new capabilities including:

Hot-hot replication and retention – Simplifies disaster recovery by eliminating cumbersome and expensive two-step disaster recovery operations. This capability keeps disaster recovery sites active, online and continuously updated – expediting disaster recovery processes and preventing data loss due to backup windows.
Private virtual machine spin-up – Enables companies to instantly spin up a virtual machine in the cloud to add another layer of redundancy to their disaster recovery infrastructure. This capability can keep businesses running and data accessible even when on-premise locations experience total outages.
VMware® SAN direct backup and recovery – Reduces backup windows, recovery time objectives (RTOs) and local area network traffic by performing fabric-based backup and recovery of virtual machines residing on SAN storage.
Application-aware VMware backups – Enables increased application-aware integration for VMware host operating system (HOS)-based backups and ensures application consistency during and after the backup.
Private one-click recovery – Enables instant recovery for VMware on the replication target and direct bare metal recovery and system recovery at the off-site premise location.
Cloud-sourced deduplication – Increases cloud storage capacity and improves data retention by extending deduplication functionality to data in the cloud.


In addition to enhanced data protection in virtualized and cloud environments, Unitrends 7.0 also includes expanded enterprise application and platform support. In addition to SQL Server® and Microsoft® Exchange support, Unitrends now offers Oracle and Microsoft Office SharePoint support for native application protection – extending its robust, feature-rich data backup and recovery functionality to even more enterprise-level applications. Unitrends 7.0 also includes agent push simplification, which deploys install and upgrade Windows® agents from the backup appliance – decreasing total cost of ownership and lowering time-to-value.


"Having the ability to protect data across physical, virtual and cloud environments is essential to companies today, and our mission has always been to enable our customers to do this easily and affordably," said Dr. Mark Campbell, chief strategy and technology officer at Unitrends. "Unitrends 7.0 extends our legacy by providing a broad range of capabilities that make it easy for companies to expedite backup and disaster recovery processes, ensure continuous access to data and maintain business operations regardless of what is happening around them."


For more information on Unitrends and its enterprise-class data protection solutions for heterogeneous environments, please visit www.unitrends.com.


About Unitrends

The trusted provider of all-in-one backup solutions, Unitrends enables its customers to focus on their business instead of backup. The company's family of scalable, all-in-one appliances and software solutions for backup, archiving, instant recovery and disaster recovery protects corporate data, over 100 different versions of servers, operating systems (including Windows, Hyper-V, VMware, Mac OS, Linux, AIX, Solaris and many others), SAN, NAS, hypervisors (including Hyper-V and VMware) and applications (including Exchange, SQL, Oracle and many others). Unitrends is the preferred choice of IT professionals because the company sets the standard in virtual, physical and cloud server data protection with instant recovery that enables complete system recovery in less than five minutes while Unitrends' pricing offers the lowest TCO in the industry. Unitrends' U.S.-based support team boasts a 99% customer satisfaction rate. Visit www.unitrends.com.

Following on the unprecedented success of last year's inaugural event, the BCI is truly excited to announce its 2013 BCI North America Awards, which will be taking place in March 2013 at DRJ Spring World in Orlando, Florida, USA .

The categories for the 2013 Awards are:

Judged Categories:

  • Business Continuity Consultant of the Year
  • Business Continuity Manager of the Year
  • Public Sector Business Continuity Manager of the Year
  • Most Effective Recovery of the Year
  • BCM Newcomer of the Year
  • Business Continuity Team of the Year
  • Business Continuity Provider of the Year (BCM Service)
  • Business Continuity Provider of the Year (BCM Product)
  • Business Continuity Innovation of the Year (Product/Service)

Public Vote Category

  • Industry Personality of the Year

The BCI North America Awards were set up by the BCI to recognize and celebrate unparalleled achievement in 12 critical areas of the business continuity discipline. Start submitting your nominations for these prestigious awards today, by emailing: Tammy.Lewis@thebci.org