Spring World 2017

Conference & Exhibit

Attend The #1 BC/DR Event!

Spring Journal

Volume 30, Issue 1

Full Contents Now Available!

We have been a fan of the Incident Command System (ICS) since the 1990s. It was created in my fair state – California – to manage wildfires. Everyone realized early on, it had many more uses that just the fire service.  It it now required for all city, county, state and federal departments and agencies. What about a company?

Many companies fail to have a great Crisis Management Team because they lack four simple things. Are you developing or retooling the team you have? Then you should consider using ICS.

On Wednesday, March 29, I will be doing a general session at DRJ in Orlando with one of our clients,Salt River Project (SRP), who have embraced ICS.  We will both be speaking so you will learn from the “horses mouth” how SRP reorganized their team and the results.

The goal of this presentation is to help you create both a great team and a great process in order to manage incidents large and small. There are four key things that we often find missing in company teams and plans:

  1. A clearly defined structure
  2. Identified roles and responsibilities
  3. A formal assessment process and team
  4. The ability or knowledge to develop an Incident Action Plan (IAP)

You will learn how SRP has embraced the Incident Command System, refocusing their Crisis Management Team and their processes to be even more effective.

Topics Covered

  • Incident Command System – a powerful methodology.
  • Crisis Management Teams – Roles and responsibilities.
  • Initial Assessment Team – Who should be on the team.
  • Incident Action Plan (IAP) – How to write one.

Speakers

  • Regina Phelps, EMS Solutions Inc.
  • Kenneth Lewis, Salt River Project, Principal Emergency Management Program Analyst

http://www.drj.com/springworld/index.php/event-program/general-sessions

You lock your home—now lock your network. This means having a reliable and secure data center and following basic safety rules, like locking down ports, shutting off services, removing rights and privileges when no longer justified, and using firewalls. You’ll also need host and network intrusion detection and prevention (IDS/IPS) as well as physical access controls such as badge, PIN pad and biometrics etc., to ensure you let only the right traffic and the right people in.

The best way to keep a secret is to encrypt it. But what to encrypt? Encryption can occur at many layers—the network, the physical disk drive, the database, or individual fields. All encryption is not the same; algorithms have different key lengths, some are slower in performance than others and some have been compromised through the ages. Be aware, and keep current with encryption techniques.

At the application layer, strong authentication is key. Create a process for good passwords and keep it simple so people will use it, but make it strong to keep the bad guys out. Passphrases, account ID images and challenge questions are other techniques. A simple technique to use for challenge questions is to not respond with the answer to the question being asked. If the question is “What is your mother’s middle name” use a word like “chair” or “fish.” These red herring responses cannot be traced back to your Facebook or other social accounts.

...

http://www.mir3.com/cybersecurity-principle-locked-door/

A man drives a car into pedestrians on Westminster Bridge, keeps driving, crashes the car outside the Houses of Parliament, then tries to enter the complex armed with a knife. Four people are dead, including a policeman and the assailant, and at least 40 injured.

The investigation into yesterday’s terrorist attack in the heart of London is ongoing, as Westminster bridge reopens and Parliament gets back to work.

Small group and “lone wolf” terrorist attacks are seen as indicative of the shifting nature of terrorism, according to experts (here and here).

...

http://www.iii.org/insuranceindustryblog/?p=4875

Monday, 27 March 2017 20:38

Crowds in Crises

Back in 2015 the world was captivated by the Universal film “Jurassic World”. Viewers praised Chris Pratt’s performance in this science fiction thriller, but were more entertained by a different kind of hero. During a pterosaur attack causing resort guests to push, shove, and trample each other as they flee, a man is spotted grabbing two margaritas before seeking his own safety…or the safety of the second margarita’s owner. #priorities

Movies typically depict a crowd’s response to an emergency or disaster scenario as emotionally driven, almost irrationally selfish. It’s widely assumed that as mass hysteria and panic take hold of a crowd, people do whatever they can to better serve themselves. But does this actually occur off the screens? Are we really all the margarita man?

Social psychology says no. Research dating back as far as the 1950’s show that behavior in disaster response is generally pro-social and collaboratively altruistic. History backs this theory up.

...

http://www.bcinthecloud.com/2017/03/crowds-in-crisis/

In theory, BYOD or bring your own device lightens the load in terms of IT sourcing, because it transfers the work (and cost) of acquiring a device to the user of that device.

 

Users are happy because they can use the devices they favour, while IT departments can free up time and budget to use elsewhere. Everyone is happy, end of story – or not quite.

Paranoid IT managers can over-compensate for the wide variety of different devices, going overboard on security and bandwidth investments.

On the other hand, unwary IT organisations can end up with more problems than they solve, if they fail to put IT management in place (which requires IT sourcing of its own) and users swamp out helpdesks with issues that mix personal and professional device usage.

Is CYOD rather than BYOD the answer?

...

http://www.opscentre.com/adapting-sourcing-byod-cyod/

Wednesday, 22 March 2017 18:37

Company Spotlight: Veeam Software Corporation

Written by
Veeam Cloud Connect Replication for Service Providers

 

Your DRaaS opportunity awaits!

Watch webinar or download slides

Watch webinar or download slides

Disaster Recovery as a Service (DRaaS) is your #1 opportunity to sell cloud services to new and existing customers. Demand is high, and the cloud has eliminated the need for a traditional disaster recovery (DR) site. Veeam® Cloud Connect Replication for Service Providers makes DRaaS easy, profitable, and practical for any customer environment.

NOTE: Exclusively for Veeam Cloud & Service Provider partners. Join now


Download Free Trial

No feature limitations for 30 days

Cloud-based disaster recovery

Grow your DRaaS business with Veeam’s expanding market presence and purpose-built technology for service providers. Veeam Cloud Connect allows you to easily set up and maintain a secure multi-tenant environment for hosting standby virtual machines (VMs).

And with Veeam, you can offer your customers the best that DRaaS has to offer, including:

  • Fast, flexible failover of specific VMs or an entire site
  • Streamlined failback with zero data loss and minimal disruption to users
  • Recovery assurance, including support for replica and failover testing and alternating production between sites
  • Seamless integration with Veeam user interfaces, workflows and data collection

Veeam Cloud Connect Replication: DRaaS that is extremely powerful and extremely easy

For a decade, iland has worked with customers around the globe to protect their businesses through cloud-based disaster recovery. Veeam Cloud Connect expands our market by making DRaaS practical for any customer and all their applications.

Justin Giardina
CTO
iland

Forrester has named iland a Leader in Disaster Recovery as a Service.*

Gartner has named iland a Leader in Disaster Recovery as a Service.**

How it works

Veeam Cloud Connect presents your customers with a “cloud host” that they can replicate VMs to:

  • Your customers simply click “Add Service Provider” from the Veeam console and enter the credentials you’ve given them.
  • Their cloud hosts appear in their Veeam infrastructure.

That's it! There’s no VPN, no separate console, and cloud hosts work like other replication targets – except customers can provision them on demand and without having to maintain a second site.

Veeam Backup & Replication v9: Cloud Connect for Service Providers Reference Architecture

 

Veeam Cloud Connect includes multi-tenant support, requires only a single port, and securely transfers data over SSL/TLS (no VPN required).

 

Why it’s better

No dependency on third-party software

A “naked” hypervisor is all that’s required. You don’t need to acquire, learn or maintain additional technology – for orchestration, network extension, WAN acceleration, etc. – because everything is available right out of the box. Multi-tenancy is even built in, so you can securely host multiple customers on the same hardware, with complete isolation between tenants.

Expedited onboarding

A single port is all that’s needed. Veeam Cloud Connect encapsulates and encrypts all network traffic – for management, replication and even inter-VM communication – to securely transmit data over a single port using SSL/TLS. There’s no need to set up and maintain VPN connections or open multiple ports.

Automated network reconfiguration

Eliminates the high cost and headaches of reconfiguring networks for DR testing or full or partial failover. Veeam network extension appliances preserve communication with and between running VMs regardless of their location.

Bandwidth friendly features

Built-in WAN acceleration, Bitlooker, seeding and more allow you to provide DRaaS to customers with slow or unreliable WAN connections or a large number of VMs. Customers can even replicate from backups in cloud repositories you host for them with Veeam Cloud Connect Backup, further reducing the amount of data that must be sent across the WAN.

Broad coverage

Because Veeam replicates at the hypervisor layer, you can offer DRaaS to any customer in your target market regardless of the storage, applications and operating systems they use – now and in the future. Support for both VMware vSphere and Microsoft Hyper-V further maximizes your addressable market.

 

Assigning a "hardware plan" to a tenant defines the CPU, memory, storage and network resources available to them.

Don’t miss out

Demand for DRaaS is on the rise, thanks to growing acceptance of hosted solutions and the need for 24x7 access to applications and data.

Veeam is the ideal way for you to participate – and succeed – in this fast-growing market:

  • Easy licensing, including monthly rental by the VM and no VM minimum
  • A market and channel at the ready, including 230,000 current Veeam customers, 3,500 new Veeam customers each month and 45,000 channel partners
  • Zero competition from Veeam: We don’t offer our own cloud or our own DR services – instead, we enable our partners to!

 

Veeam Cloud Connect Portal Branding Blog

Veeam Cloud Connect includes a mobile-friendly portal for failover, which you can easily brand as your own. Learn more