- Welcome Guest
- Sign In
As a Disaster Recovery professional, I cannot tell you how many of my clients focus only on the server systems when they do DR planning. Every server must be accounted for, protected, backed up and ready to be brought back online if they lose the physical site that hosts the production system. The...
Recovery point objective metrics are commonly defined as how much data a system can afford to lose without endangering business processes. Let's face facts: Some applications require zero-data-loss protection both within one site and between sites. These applications move millions of dollars or pot...
Today's fast-paced business environment requires that employees have access to information where and when they need it. Organizations, however, struggle to ensure that employees have just enough access -- not too much, not too little. Inappropriate access is extremely common, and it can lead to detr...
year over year, the amount of Internet traffic has grown and will continue to grow. These trends are facilitated by the continuous growth of smartphone usage and the recent introduction of the iPad. This growth in Internet traffic means that most websites today are expected to see more traffic and m...
Working for a disaster recovery solutions designer is often difficult. After being bombarded by ad slogans, magazine articles and just plain life experience, many company executives are looking to achieve a mythical figure for server uptime. Perceived uptime of 99.999 percent -- or "five nines" --...
No company can afford to have a disaster disrupt its business. Despite this, the opportunity and technology costs of a feasible disaster recovery plan have traditionally been too high for the masses to properly plan for and ensure continuity. However, recent advancements in infrastructure and the pr...
There's no shame in admitting that audits are hard. For those of us in IT, hearing the word "audit" probably brings up a groundswell of negative connotations and the corresponding aggravation and headache: We know from having lived through it that tech-heavy regulatory audits -- annual PCI assessme...
Server virtualization has crossed the proverbial chasm. Not long ago, when deploying new servers, one had to justify making them virtual, rather than physical. Now, IT managers in many organizations have decreed "virtual first" policies, requiring new server deployments to be virtual unless there is...
The No. 1 complaint that I hear from organizations when discussing IT security is that they don't have enough resources to do everything they need to. It's no mystery why: Take an ever-increasing body of regulations and laws we need to comply with, add to it demands of customers and the business, m...
Hiring a professional penetration tester is often a humbling experience. Using a mix of simple social engineering and technology savvy, a professional is often able to expose dangerous security holes in an organization's IT infrastructure with ease. In a few days, a penetration tester can identify ...
Consumers mostly used dial-up networks to access the Internet as recently as the mid-1990s. A screaming-fast modem might have synced up at 28.8 or 33.6 kbps. Surfing the Web meant waiting a minute or more for a basic Web page to open -- and forget about sharing images or video. The good news, howeve...
Over the past few years, it seems like there's one technology that almost everyone is deploying: laptop encryption. All over the industry, in nearly every vertical, it seems like everybody has either just deployed, is deploying, or is about to deploy some type of encryption technology to protect la...
Today's data-storage customer has lost his voice in a sea of vendor jockeying and positioning. This glut of vendors creates a noisy industry and a crowded marketplace, where all vendors sound the same and marketing materials are nearly indistinguishable from vendor to vendor. Directly because of thi...
With global organizations depending on the sharing of sensitive information to support everything from financial transactions to patient care records, many believe they are relying on secure methods to exchange data with trusted partners. However, there is often a significant and alarming gap betwe...
Most of us are probably familiar with safe deposit boxes -- you know, the secure storage areas that banks and post offices provide to keep things like jewelry and important documents secure. Even if you've never rented one yourself, chances are you're probably familiar with the concept: a safe place...