17 Jun 2016

15 Alarming IT Facts About Disaster Recovery

Is your company prepared for when disaster strikes? Whether you are running a company or the IT department, it’s imperative that you are prepared for the worst – and ensure your business-critical data and applications are secure at all times. The term “disaster” often makes us think of hurricanes and tornados – events that are life changing. But in reality, computer viruses, transformer malfunction or building collapse are also “disasters” because any of these events could negatively impact business continuity and your company’s bottom line.  Check out these alarming stats below to see the impact a disaster can have on a business.

Impact on Business Continuity

  • 20% of businesses experience a failure (fire, flood, power outage, natural disaster, etc.) in any given year, and 80% of those businesses will go under in just over a year, according to the Bureau of Labor.1
  • 60% of companies that lose their data will shut down within 6 months.2
  • Only 35% of SMBs have a comprehensive disaster recovery plan in place, Gartner estimates.3

Financial Impact

  • US businesses lose over 12 billion per year because of data loss.4
  • The cost of losing critical applications has been estimated by experts at more than $5,000 per minute.5
  • Network downtime costs 80% of small and medium-sized businesses at least $20,000 per hour.6

Frequency

  • 52% of businesses experience multiple backup failures every year.7
  • Every week 140,000 hard drives crash in the US.8
  • 79% of companies surveyed by Axcient have had a major IT failure in the past 2 years.9

Causes

  • Natural Disasters account for only 1% of all data loss while hardware failure, human error, security breaches or viruses account for the majority.10
  • Hurricanes are the most destructive force causing power failure, flooding, customer loss, and the closure of many businesses.11
  • According to an analyst firm in IDC, about 70% of all successful attacks on computer networks were carried out by employees and insiders.12

Cloud

  • 25% of companies rely on cloud storage as part of their Disaster Recovery Plan.13
  • 59% of organizations keep backups in only one location, typically a single, physical site.14
  • 20% of cloud storage users are able to recover from a site disaster in 4 hours or less. Only 9% of non-cloud storage users can say the same.15

Delivering a broad and deep spectrum of technology to businesses around the globe, TheNOCMan, Inc remains at the forefront of the global technology marketplace, bringing the latest products and services to market and finding new ways to bring value to its customers.

1. Datacenterknowledge.com   2. PCMag.com  3. IOSafe.com   4. BeyondTechnology.com  5. DRBenchmark.org  6. TechRadar.com  7.StorageNewsletter.com  8. Intermedia.net  9. Axcient.com  10. BeyondTechnology.com  11. IOSafe   12. BusinessWorld-USA.com         13. TwinStrata.com   14. StorageNewsletter.com  15. TwinStrata.com

Share this
19 Jan 2016

2016 Predictions For Datacenter Networking

No analyst is allowed to get past January 1st without posting their list of predictions for the new year, so I have no choice but to jump into that pool. 2015 was an interesting year for networking, and 2016 will most likely continue that trend. We’ll see a year where the stalwarts like Cisco Systems CSCO +0.00%,Juniper Networks JNPR +0.00% and Alcatel-Lucent Enterprise will see additional challenges from non-traditionals. We’ll see new networking strategies emerging. And we’ll see consolidation as competition heats up. Below are the 2016 Predictions For Datacenter Networking…

datacenter 2016 predictions

New competition. While networking has been fairly staid in the past twenty years, the vendor mix is shifting a bit. While shipments are up, the revenue is down, reflecting the reality of tighter competition among both the primary vendors as well as the secondary vendors (and new entrants). Non-traditionals likeHewlett-Packard HPE +0.00% Enterprise are picking up steam, and even Huawei might be able to break into North America, the largest market, in 2016. Change will happen at the switch level long before it gets to the core. Expect to see competition continue to be tight as vendors battle for share of a market in transition. Does this mean that investors should short stock and customers should start ripping out equipment? Absolutely not. But it does mean the purchases should be scrutinized and negotiations should be more thorough as there may be more options than ever before.

Software-Defined Networking (SDN). OK, I’ll take the bullet here. If you asked me about SDN in 2014, I’d have told you that 2015 would be the year of SDN, but I would have forgotten the asterisk. 2015 was the year that everyone talked about SDN, but current networking infrastructure really is preventing the shift from happening quickly. So while the market is headed in that direction, it is taking a little longer than most had expected—but it is still happening. 2016 will see more SDN adoption, but the real action is going to be in pockets, mostly around new emerging workloads like Big Data, private cloud and IoT that benefit from different network architectures. Expect to see continued discussion ramping up on SDN, some possible new entrants to the market and more customers taking it seriously—even if they aren’t starting deployments just yet.

Network Function Virtualization (NFV). Expect to see more traction here (over SDN). Because this is being pushed by carriers and they will be the primary customers, the acceptance is further ahead and deployments are beginning to happen. The proof of concepts (POCs) are typically being driven by actual customer environments which means once the concepts are proven out, commitments will be made. While NFV is the smaller opportunity for changing network trajectories, it will win the race and see more deployment action in 2016.

Litigation. Cisco Systems successfully defended its patents against Arista Network’s infringement in 2015, and it is probably a safe bet that others will take to the courts in 2016 as well. While the market is not generally known for litigation, the dynamics of a more competitive market will probably bring us additional litigation in 2016—especially against a backdrop of changing infrastructure and new technology. When new technologies come to market or are beginning to be productized, lawsuits typically follow. This is not necessarily a bad thing as establishing patent ownership can help remove uncertainty for customers on the fence about buying into new technologies.

Changing structures. Because of the changes we are seeing in network traffic—more East-West, server-to-server traffic and less North-South server-to-core traffic—we will probably see more people adopting leaf/spine topologies. Some of the new networking products (like VMware VMW -6.12%’s NSX) lend themselves well to this type of decentralized architecture. But don’t expect that to crush the traditional core-centric network topology. Instead this will happen more along the edges and with the deployment of new workloads like Big Data. Over time we expect leaf/spine to take a greater role in the network, but for 2016 it will be seen more in pockets—but the trend is clear.

Open networking. Just as open source has played an important role in the development of the internet and now cloud computing, open source has an important part to play in networking. Splitting up the traditional “black box” into hardware and software gives customers a little more flexibility, but most importantly it will give them more control. As 2016 brings more complexity, look for customers to investigate more open networking solutions as a way to try to insert the right services into the right places in order to make all of this stuff actually work.

Consolidation. No, not network consolidation (that is happening regardless), this is vendor consolidation. In 2015 we’ve seen acquisitions (Hewlett-Packard Enterprise and Aruba) and partnerships (Cisco Systems and Ericsson) as the market streamlines. We anticipate that 2016 will bring additional consolidation as larger players with deep pockets and smaller startups with interesting technology do their mating dance. Consolidation can have some positive benefits as the new technologies get more stable financial support from the acquirers. We don’t expect to see major players combining; the Cisco Systems/Apple model is probably the smarter route as there are already too many large tech mergers clouding the IT waters.

After a relatively interesting 2015, it feels like 2016 could bring even more changes to networking. Companies like Alcatel-Lucent, Cisco Systems, Dell, Huawei, Hewlett-Packard Enterprise, Juniper Networks and even VMware should have plenty to say in 2016, so fasten your seat belts as it should be an interesting ride.

Share this
06 Jan 2016

Gartner’s Top 10 Strategic Technology Trends 2016

1. The Device Mesh

A variety of other trends have led to an increased number of sensors embedded in many technologies and devices that we use personally and professionally. They become smarter as they gather more data on our daily patterns. Gartner predicts that these sensors, which tend to work in silos today will increasingly work in concert, leading to even greater insights about our daily patterns.

2. Ambient User Experience

Gartner refers to these devices and sensors’ ability to gather more contextual data as described above as AMbient UX. The challenge will be with application design, anticipating this level of device synchronicity and collaboration, for lack of better framing. Gartner posits that the devices and sensors will become so smart that they will be able to organize our lives without our even noticing that they are doing so.

3. 3D-printing Materials

Though not a new trend, 3D-printing has caught its stride now that companies like Tesla are using it to build engine parts, and SpaceX is using it to create rocket parts. Better applications of the technology to biological material and food will follow, according to Gartner.

4. Information of Everything

According to Gartner, by 2020, 25 billion devices will be generating data about almost every topic imaginable. This is equal parts opportunity and challenge.  There will be a plethora of data, but making sense of it will be the trick. Those companies that harness the power of this tidal wave of information will leapfrog competitors in the process.

5. Advanced Machine Learning

To an increasing extent, technologies will be able to not only collect information, but learn based upon it. In the process, much of the initial analysis that has typically required a human can be done by machines, elevating the analysis in the process. People will need to engage at a higher level as a result.

6. Autonomous Agents and Things

The potential for robots to continue to master and surpass humans in their ability to undertake human tasks will increase rapidly. Perhaps the most prominent example is the autonomous driving car, which leverage learnings from autonomous vehicles that have been used within controlled environments for years. Masdar City in the United Arab Emirates is one such prominent controlled environments. Movingi beyond controlled environments into non-controlled environments, including the airspace that drones occupy will require further advances – advances that Gartner foresees coming soon.

7. Adaptive Security Architecture

A majority of CIOs list security as their top priority, especially with an increased number of companies that have experienced breaches. Historical norms have been to play defense, but Gartner predicts that more tools will be available to go on the offensive, leveraging predictive modeling, for example, allowing apps to protect themselves. Gartner emphasizes that companies must build security into all business processes, end-to-end. Having it as an afterthought is tantamount to inviting issues.

8. Advanced Customer Architecture

Gartner notes that companies are pushing the envelope on making technology mimic human brains. Prominent examples of this in action include Facebook’s Deepface facial recognition technology.

9. Mesh App and Service Architecture

More apps are being built to be plugged together, and the value of the combination is much greater than the sum of the parts.  As Lyft has integrated with comparable offerings in other countries, its ability to expand its offering for traditional customers traveling abroad and the reverse has meant faster growth with minimal cost implications.

10. Internet of Things Architecture and Platforms

Gartner indicates that the providers of Internet of Things platforms are fragmented today, and would benefit greatly from cobbling together a better ecosystem where data is shared more broadly. This issue will persist through 2018, and IT departments will likely procure more one-off solutions as opposed to integrated webs of solutions that would serve them better. As IT leaders clamor for a better way, the change will come, says Gartner.

Share this
14 Oct 2015

Managed Services Event @ Trump Doral!

Looking forward to the event hosted at the Trump Doral today regarding Managed Services.

 

mspopp

Discover What Really Works in Managed Services

Event Registration 9:30AM – 10:00AM

Trends in Managed Services 10:00AM – 10:45AM A vendor neutral presentation from CompTIA, a leading voice for the IT industry. Presenter Terry Hedden, recently selected a Top 50 Channel Influencer, will share:

  • What makes the managed services industry run
  • Big trends in mobility, security & cloud
  • Managed services primer: questions your customers are asking

Top 10 Challenges That MSPs Face Today 10:45AM – 11:30AM
AVG Business provides an overview of the top 10 challenges MSP’s face and how to overcome them to take full advantage of the managed services growth opportunity. AVG Business provides an overview of the critical products and services. Learn about:

  • AVG Business Managed Workplace® 9.2 – how to provide security & control of the entire IT infrastructure with unmatched ease
  • CloudCare™ 3.3 – direct, real-time management of all AVG security services from a simple, single screen dashboard
  • Secure single sign-on (SSO) – a seamless way to have secure single source login that gives you the ability to service & deploy apps to all customers in one portal
  • Saving time and building service revenue with the most comprehensive, scalable RMM platform

Break 11:30AM – 11:45AM

Case Study In Managed Services Success 11:45AM – 12:15PM Together we are Better – The Life of an MSP Leveraging Tigerpaw & AVG Business Managed Workplace®

  • Find out how to drive efficiency and lowering costs by leveraging integrated PSA and RMM Tools that provide sales & marketing functionality, mobile capabilities and inventory management.

Lunch 12:15PM – 12:45PM

Secrets to Creating a Sales Lead Machine 12:45PM – 1:30PM Marketopia, a trusted and respected provider of outsourced marketing and training solutions for the IT industry, reveals the most innovative and powerful marketing and sales solutions being used by MSPs and resellers today. Presenter Terry Hedden, recently selected a Top 50 Channel Influencer, will share best practices for:

  • Marketing strategy management & the key to reducing your cost per lead
  • Creating marketing materials that give you a competitive advantage
  • eMarketing activities that drive sales from existing clients & attract new ones
  • The role of traditional marketing activities in your lead generation program

SSO – A New Revenue Opportunity 1:30PM – 2:00PM Learn how adding this solution to your portfolio will reduce service tickets for password resets, better secure your clients, provide you with a sound mobile management solution and a strong, profitable recurring revenue stream.

The Death of Traditional Disaster Recovery 2:00PM – 2:30PM Businesses of all sizes are creating incredible amounts of irreplaceable data and depend on the availability of their systems to keep their business up and running. There are no exceptions. Disaster recovery (DR) is no longer an “optional” service. This is where Disaster Recovery as a Service (or DRaaS) comes in. DRaaS enables MSPs to equip their clients with enterprise-grade disaster recovery, even for those that historically have lacked the budget and in-house resources to maintain recovery operations on their own. In this session, you will learn from Ken Shaw, founder and CEO of Infrascale, about the 5 proven ways you can capitalize on DRaaS to deliver affordable, simple, and secure application failover when disaster strikes. Join us and to learn:

  • Why traditional disaster recovery isn’t cutting it
  • Why the Disaster Recovery as a Service (DRaaS) market is exploding
  • The 5 proven ways to capitalize on the DRaaS revolution

Together we are Better – The Life of an MSP Leveraging Tigerpaw & AVG Managed Workplace 2:30PM – 3:00PM Find out how to drive efficiency and lowering costs by leveraging integrated PSA and RMM Tools that provide sales & marketing functionality, mobile capabilities and inventory management.

Live Product Demos & Cocktail hour with PAC 3:00PM – 4:00PM Includes demo of Premium Remote Control, a powerful technology empowering users to remotely support their clients. This feature is provided in Managed Workplace and CloudCare at no extra cost.

 

Share this
09 Oct 2015

7 Risks of Dropbox to Your Corporate Data

Introduction

We live in a world where information equals power. With the influx of online file-sharing solutions, distributing information has become easier than ever. As a result, it’s now easier for information to fall into the wrong hands intentionally or unintentionally.

Bring-your-own-device (BYOD) policies and an increasingly mobile workforce are putting new pressures on IT and changing the requirements for how workers want (and need) to access corporate data.

With over 200 million users, Dropbox has become the predominant leader for mobile file access. Unfortunately, what works for family pictures does not work with corporate files. In most cases, Dropbox quick to install, easy-to-use, consumer services present unacceptable security, legal and business risk in a business environment.

Here are 7 Risks of Dropbox to Your Corporate Data.

Data Theft

Most of the problems with Dropbox emanate from a lack of oversight. Business owners are not privy to when an instance of Dropbox is installed, and are unable to control which employee devices can or cannot sync with a corporate PC. Use of Dropbox can open the door to company data being synced (without approval) across personal devices. These personal devices, which accompany employees on public transit, at coffee shops, and with friends, exponentially increase the chance of data being stolen or shared with the wrong parties.

Data Loss

– Lacking visibility over the movement of files or file versions across end-points, Dropbox can improperly backup (or not backup at all) files that were modified on an employee’s device. If an end-point is compromised or lost, this lack of visibility can result in the inability to restore the most current version of a file or any version for that matter.

Corrupted Data

– In a study by CERN, the European Organization of Nuclear Research, silent data corruption was observed in 1 out of every 1500 files. While many businesses trust their cloud solution providers to make sure that stored data maintains its integrity year after year, most consumer file sync services, including Dropbox, do not implement data integrity assurance systems to ensure that any bit-rot or corrupted data is replaced with a redundant copy of the original.

Law Suits

Dropbox gives carte blanche power to employees over the ability to permanently delete and share files. This can result in the permanent loss of critical business documents as well as the sharing of confidential information that can break privacy agreements in place with clients and third-parties.

Compliance violations

Many compliance policies require that files be held for a specific duration and only be accessed by certain people; in these cases, it is imperative to employ strict control over how long files are kept and who can access them. Since Dropbox has loose (or non-existent) file retention and file access controls, businesses that use Dropbox are risking a compliance violation.

Loss of accountability

Without detailed reports and alerts over system-level activity, Dropbox can result in a loss of accountability over changes to user accounts, organizations, passwords, and other entities. If a malicious admin gains access to the system, hundreds of hours of configuration time can be undone if no alerting system is in place to notify other admins of these changes.

Loss of file access

Dropbox does not track which users and machines touched a file and at which times. This can be a big problems if you’re trying to determine the events leading up to a file’s creation, modification, or deletion.

boxdropped

Conclusion

Dropbox poses many challenges to businesses that care about control and visibility over company data. Allowing employees to utilize Dropbox can lead to massive data leaks and security breaches.

Many companies have formal policies or discourage employees from using their own accounts. But while blacklisting Dropbox may curtail the security risks in the short term, employees will ultimately find ways to get around company firewalls.

The best way for business to handle this is to deploy a company-approved application that will allow IT to control the data, yet grants employees the access and functionality they feel they need to be productive.

If you would like more information on
TheNOCMan Cloud File Sync, please contact us at:
Phone: +1 561-501-1NOC (1662)
Email: sales@thenocman.com
Share this

© 2016 THENOCMAN, Inc. Powered by WHMCS.

Click Me