Spring World 2017

Conference & Exhibit

Attend The #1 BC/DR Event!

Spring Journal

Volume 30, Issue 1

Full Contents Now Available!

Wednesday, 22 March 2017 18:37

Company Spotlight: Veeam Software Corporation

Written by
Veeam Cloud Connect Replication for Service Providers

 

Your DRaaS opportunity awaits!

Watch webinar or download slides

Watch webinar or download slides

Disaster Recovery as a Service (DRaaS) is your #1 opportunity to sell cloud services to new and existing customers. Demand is high, and the cloud has eliminated the need for a traditional disaster recovery (DR) site. Veeam® Cloud Connect Replication for Service Providers makes DRaaS easy, profitable, and practical for any customer environment.

NOTE: Exclusively for Veeam Cloud & Service Provider partners. Join now


Download Free Trial

No feature limitations for 30 days

Cloud-based disaster recovery

Grow your DRaaS business with Veeam’s expanding market presence and purpose-built technology for service providers. Veeam Cloud Connect allows you to easily set up and maintain a secure multi-tenant environment for hosting standby virtual machines (VMs).

And with Veeam, you can offer your customers the best that DRaaS has to offer, including:

  • Fast, flexible failover of specific VMs or an entire site
  • Streamlined failback with zero data loss and minimal disruption to users
  • Recovery assurance, including support for replica and failover testing and alternating production between sites
  • Seamless integration with Veeam user interfaces, workflows and data collection

Veeam Cloud Connect Replication: DRaaS that is extremely powerful and extremely easy

For a decade, iland has worked with customers around the globe to protect their businesses through cloud-based disaster recovery. Veeam Cloud Connect expands our market by making DRaaS practical for any customer and all their applications.

Justin Giardina
CTO
iland

Forrester has named iland a Leader in Disaster Recovery as a Service.*

Gartner has named iland a Leader in Disaster Recovery as a Service.**

How it works

Veeam Cloud Connect presents your customers with a “cloud host” that they can replicate VMs to:

  • Your customers simply click “Add Service Provider” from the Veeam console and enter the credentials you’ve given them.
  • Their cloud hosts appear in their Veeam infrastructure.

That's it! There’s no VPN, no separate console, and cloud hosts work like other replication targets – except customers can provision them on demand and without having to maintain a second site.

Veeam Backup & Replication v9: Cloud Connect for Service Providers Reference Architecture

 

Veeam Cloud Connect includes multi-tenant support, requires only a single port, and securely transfers data over SSL/TLS (no VPN required).

 

Why it’s better

No dependency on third-party software

A “naked” hypervisor is all that’s required. You don’t need to acquire, learn or maintain additional technology – for orchestration, network extension, WAN acceleration, etc. – because everything is available right out of the box. Multi-tenancy is even built in, so you can securely host multiple customers on the same hardware, with complete isolation between tenants.

Expedited onboarding

A single port is all that’s needed. Veeam Cloud Connect encapsulates and encrypts all network traffic – for management, replication and even inter-VM communication – to securely transmit data over a single port using SSL/TLS. There’s no need to set up and maintain VPN connections or open multiple ports.

Automated network reconfiguration

Eliminates the high cost and headaches of reconfiguring networks for DR testing or full or partial failover. Veeam network extension appliances preserve communication with and between running VMs regardless of their location.

Bandwidth friendly features

Built-in WAN acceleration, Bitlooker, seeding and more allow you to provide DRaaS to customers with slow or unreliable WAN connections or a large number of VMs. Customers can even replicate from backups in cloud repositories you host for them with Veeam Cloud Connect Backup, further reducing the amount of data that must be sent across the WAN.

Broad coverage

Because Veeam replicates at the hypervisor layer, you can offer DRaaS to any customer in your target market regardless of the storage, applications and operating systems they use – now and in the future. Support for both VMware vSphere and Microsoft Hyper-V further maximizes your addressable market.

 

Assigning a "hardware plan" to a tenant defines the CPU, memory, storage and network resources available to them.

Don’t miss out

Demand for DRaaS is on the rise, thanks to growing acceptance of hosted solutions and the need for 24x7 access to applications and data.

Veeam is the ideal way for you to participate – and succeed – in this fast-growing market:

  • Easy licensing, including monthly rental by the VM and no VM minimum
  • A market and channel at the ready, including 230,000 current Veeam customers, 3,500 new Veeam customers each month and 45,000 channel partners
  • Zero competition from Veeam: We don’t offer our own cloud or our own DR services – instead, we enable our partners to!

 

Veeam Cloud Connect Portal Branding Blog

Veeam Cloud Connect includes a mobile-friendly portal for failover, which you can easily brand as your own. Learn more

Whether you’re looking to hire a business continuity expert, or you’re training to become one, this guide will help you determine the qualifications and experience that are required

Before we get into certifications or BCM specific qualifications, let’s review the important non-BCM skills that make an effective BCM professional.

  • Business function experience or technical IT experience. This is a must. Business Continuity is about business, and without basic business function knowledge and experience, guiding departments and interfacing with IT areas will be challenging.
  • Project management experience. You do not necessarily need a certified project manager, but you do need someone who is familiar with project management concepts and project organization. In the end, BCM is a program and requires organizational skills.
  • Interpersonal skills. Effective BCM programs must work with multiple levels of an organization, so the ability to communicate across all levels, as well as to understand and address concerns and pushback are necessary for success.
  • Flexibility and adaptability. Organizational needs change over time, and a demonstrated ability to be flexible in both process and problem solving will help identify solutions to BCM issues surrounding implementation, documentation, and governance.

...

https://www.mha-it.com/2017/03/business-continuity-expert-skills/

Got data?  But more to the point, got the RIGHT data, and now?  Low-friction and fast access to data are top priorities for data/analytics and marketing professionals in 2017.  Here’s the picture of priorities:  It’s a high or critical priority for 70% of marketing pros to increase their use of data and analytics for marketing measurement and customer insights – their fourth highest priority.  Data and analytics pros’ highest priority – at 60% of data and analytics pros – is implementing or expanding their complete view of the customer across channels, and over 50% are providing self-service data preparation tools to business users.   Firms are stepping up the pace.

What can help with these priorities?  Data preparation tools.  To accelerate time-to-insights and therefore time-to-actions, business end users and analysts who today wrangle data in spreadsheets or other traditional tools need direct access to data and a significant power assist. Data preparation tools can provide this power, but they must balance features and functions to support different roles and use cases and enable appropriate manageability, security, and governance in today's enterprises — while at the same time delivering speed-to-value.

...

http://blogs.forrester.com/cinny_little/17-03-21-seven_data_preparation_tools_for_business_insights_users_which_one_is_best_for_you_0

The concept of cyber threat intelligence is really not much different from other areas of the intelligence field. In national security, intelligence gathering techniques seek to detect potential situations and draw conclusions that enable people to take action before anything serious occurs. Similarly, cyber threat intelligence is only one tool in the security arsenal. Used well, it can warn companies that the bad guys are active inside their network and what they are looking for. It points out unusual patterns to look for in systems and other valuable data. But it won’t stop an attack. That takes human intervention and the deployment of the right technology tools to block or at least mitigate an attack.  

But as time goes on, the potential threat vectors are multiplying: servers, desktops, laptops, mobile devices, and now the Internet of Things (IoT), which could open enterprises to attacks via innocuous objects such as thermostats and a myriad of other devices that contain sensors and processors.

“Every device large or small becomes a source for cyber threat intelligence,” said Peter Tran, senior director of Worldwide Advanced Cyber Defense at RSA Security. “With the Internet of Things (IoT) projected to grow to over 50 billion connected devices by 2020, there is a real challenge ahead in terms of structuring effective threat analysis across massive volumes of smart connected devices.”

...

http://www.esecurityplanet.com/network-security/threat-intelligence.html

(TNS) — Communities across Ohio on Wednesday will be testing tornado sirens as part of a drill for the Emergency Alert System.

The sounding of the sirens, which is set for 9:50 a.m., is part of Severe Weather Awareness Week, which runs through March 25, according to the Ohio Emergency Management Agency.

The testing comes on the eve of Ohio’s tornado season, which runs April 1 through July 30.

...

http://www.govtech.com/em/disaster/As-Tornado-Season-Approaches-A-Look-Back-at-3-Deadly-Tornadoes-in-Ohio.html

DURHAM N.C. — If local building officials notified you that your home is substantially damaged, you may be able to receive funds to make your structure safer and stronger.

If you are rebuilding or repairing a substantially damaged home or business, your community may require you to elevate or make other changes. Substantial damage applies when the cost of restoring a structure equals or exceeds 50 percent of its pre-damage market value. However, some communities have regulations that are more restrictive. Check with your local building officials or community flood-plain administrator for more information.

If the substantial damage is solely from flooding, your National Flood Insurance Program (NFIP) policy may provide up to $30,000 to update your structure so it meets local flood-plain management regulations. To apply, you must first submit a signed Increased Cost of Compliance (ICC) Proof of Loss form to your insurance company.

To be considered for an ICC claim, your insurance company needs a contractor’s estimate for the proposed ICC-eligible measures to your home or business and copies of construction permits.

Structures that comply with flood-plain management regulations have an enhanced ability to withstand storms and floods. Mitigation measures eligible for ICC include elevation, relocation, demolition and flood proofing.

You have six years from the date of loss to complete the chosen and approved ICC measures.

The U.S. Small Business Administration (SBA) may be another source of funds if your home or business was determined to be substantially damaged.

If you applied for an SBA Home Disaster Loan or Business Physical Disaster Loan and your
application was approved, you may be eligible for additional funds to pay for improvements that will protect your property against future damage. The funds can be up to 20 percent of the amount of the approved loan.

For more information, call the SBA at 800-659-2955 or TTY 800-877-8339. You may also go online to sba.gov/disaster.

For more information on North Carolina’s recovery, visit fema.gov/disaster/4285 and readync.org. Follow FEMA on Twitter at @femaregion4 and North Carolina Emergency Management @NCEmergency.

###

Disaster recovery assistance is available without regard to race, color, religion, nationality, sex, age, disability, English proficiency or economic status. If you or someone you know has been discriminated against, call FEMA toll-free at 800-621-3362 or TTY at 800-462-7585.

FEMA’s mission is to support our citizens and first responders to ensure that as a nation we work together to build, sustain, and improve our capability to prepare for, protect against, respond to, recover from, and mitigate all hazards. Follow FEMA on twitter at @femaregion4. Download the FEMA app with tools and tips to keep you safe before, during, and after disasters.

Dial 2-1-1 or 888-892-1162 to speak with a trained call specialist about questions you have regarding Hurricane Matthew; the service is free, confidential and available in any language. They can help direct you to resources. Call 5-1-1 or 877-511-4662 for the latest road conditions or check the ReadyNC mobile app, which also has real-time shelter and evacuation information. For updates on Hurricane Matthew impacts and relief efforts, go to ReadyNC.org or follow N.C. Emergency Management on Twitter and Facebook. People or organizations that want to help ensure North Carolina recovers can visit NCdisasterrelief.org or text NCRecovers to 30306.

The U.S. Small Business Administration (SBA) is the federal government’s primary source of money for the long-term rebuilding of disaster-damaged private property. SBA helps homeowners, renters, businesses of all sizes, and private non-profit organizations fund repairs or rebuilding efforts and cover the cost of replacing lost or disaster-damaged personal property. These disaster loans cover losses not fully compensated by insurance or other recoveries and do not duplicate benefits of other agencies or organizations. For more information, applicants may contact SBA’s Customer Service Center by calling (800) 659-2955, emailing This email address is being protected from spambots. You need JavaScript enabled to view it., or visiting SBA’s Web site at www.sba.gov/disaster. Deaf and hard-of-hearing individuals may call (800) 877-8339.

Passwords remain one of the most critical security controls widely used to protect and secure company infrastructure and data. While the need for strong passwords has long been discussed, they continue to be the difference between a secure infrastructure and a potential cyber catastrophe.

Last year was extremely busy in cybercrime, with more than 3 billion credentials and passwords stolen and disclosed on the internet. That works out to a rate of 8.2 million credentials and passwords each day or 95 passwords every second.

Passwords have always been a good security control, but password strength and how they are processed make a major difference in how secure they really are. For example, it is critical to choose an easy password to remember, keep it long, and use some complexity and uniqueness. In addition, how the password is processed and stored in an encrypted format plays a major role in password security.

...

http://www.riskmanagementmonitor.com/8-steps-to-stronger-passwords-enterprise-wide/