Recovering from disaster: Develop, test, and assess

(c)iStock.com/natasaadzic

Disaster recovery (DR) forms a critical part of a comprehensive business continuity plan and can often be the difference between the success and failure of an organisation. After all, disasters do happen — whether that’s a DDoS attack, data breach, network failure, human error, or by a natural event like a flood.

While the importance of having such a strategy is well recognised, how many organisations actually have the right plan in place? Not many, according to the 2014

By Stuart Nielsen-Marsh, 17 October 2016, 0 comments. Categories: Data & Analytics, Data Management, Disaster Recovery, Security.

More apps are being stored in the cloud – but are we putting too much faith there?

(c)iStock.com/mushakesa

While two thirds of organisations polled by cloud storage and data protection provider CTERA Networks deploys more than a quarter of its applications in the cloud, protecting them is a different story altogether.

The findings appear in a report entitled ‘Game of Clouds’ – no prizes for guessing the theme – which makes the research concept clear.

“The emergence and tremendous growth of cloud computing in the enterprise is taking IT environments to uncharted...

By James Bourne, 12 October 2016, 0 comments. Categories: Applications, Migration, Security, Storage.

How cloud and IoT services are driving deployment of public key infrastructures

(c)iStock.com/cherezoff

A new study from Thales and the Ponemon Institute has found that, for more than three in five businesses polled, cloud-based services were the biggest trend driving the deployment of applications using public key infrastructures (PKI).

PKI refers to the ability for users and organisations to send secure data over networks; as defined by TechTarget, it “supports the distribution and identification of public encryption...

By James Bourne, 11 October 2016, 0 comments. Categories: Applications, Data Management, Security, Vulnerabilities.

The hidden dangers of legacy technology – and how to resolve them

(c)iStock.com/TiSanti

Every business has that one legacy system they can’t seem to let go of. You know you’ve got one - a relic hidden away in some dusty server room. But are you aware of the damage these outdated systems can, will and may already be having on your organisation?

The damage inflicted by legacy technology can range from minor systems issues through to major events that could put your organisation out of business – and it’s important to know the hidden dangers.

Increased downtime...

By Ed Jones, 10 October 2016, 0 comments. Categories: Compliance, Data & Analytics, Data Management, Security.

Test, test, then test again: Analysing the latest cloud DR strategies

(c)iStock.com/XtockImages

In September, we hosted a roundtable with fifteen business leaders to discuss and debate the findings from our The State of IT Disaster Recovery Amongst UK Businesses survey.  The debate was chaired by Chris Francis, techUK board member. Customers Wavex and Bluestone also participated in the discussion as did our partner Zerto and industry influencers Ray Bricknell from Behind...

By Monica Brink, 05 October 2016, 0 comments. Categories: Data & Analytics, Data Management, Disaster Recovery, Security.

How Great Western Railway is getting its compliance on the right track

(c)iStock.com/JoeDunckley

Great Western Railway (GWR) has enlisted the help of CoreStream to provide a new system for its compliance and regulations.

Like many organisations, ensuring compliance is vital – but for GWR it may count more than others. The railway operator is governed by a franchise agreement which includes more than a thousand obligations – and failing to comply with them can result not only in fines, but also disqualification from future franchise bids.

As a result, the company...

By James Bourne, 28 September 2016, 0 comments. Categories: Compliance, Data & Analytics, Data Management, Security.

Skyhigh Networks grabs $40 million in series D funding in profitability push

(c)iStock.com/miki1991

Cloud security services provider Skyhigh Networks has secured $40 million (£30.9m) in a series D funding round which will aim to steer the California-based firm “through to profitability.”

The round was led by Thomset Ventures, with Sequoia Capital and Greylock Partners also contributing. Total venture capital to Skyhigh, launched only in February 2013, is now at $105.5m.

Skyhigh’s proposition is through being a leading ‘cloud access security broker’...

By James Bourne, 26 September 2016, 0 comments. Categories: Economy, M&A, Security.

Cloud usage in healthcare on the up, new research argues

(c)iStock.com/deepblue4you

More than half of respondents in a survey from cloud migration services provider SADA Systems say cloud-based apps are improving patient satisfaction and leading to better treatment.

The survey, which polled more than 300 North American IT professionals, found Microsoft was the primary cloud infrastructure platform for healthcare organisations, cited by 42% of respondents. Google (29%) and Amazon (27%) trailed behind. In terms of mobile device management, Microsoft (55% of...

By James Bourne, 23 September 2016, 0 comments. Categories: Adoption, Applications, Industry, Security, Software.

Research argues overconfidence in disaster recovery is ‘common and costly’

(c)iStock.com/roberthyrons

A new UK study from cloud disaster recovery provider iland has found that 95% of respondents have faced an outage or data loss in the past year – with 87% of that number saying it triggered a failover.

The survey, conducted by Opinion Matters and which specifically polled 250 UK decision makers responsible for their company’s IT disaster recovery plans, also found that of the 87% who had executed a failover, while 82% said they were confident it would be successful, 55%...

By James Bourne, 22 September 2016, 0 comments. Categories: Data Loss, Data Management, Disaster Recovery, Security.

Netskope research shows how cloud malware and ransomware remain issues

(c)iStock.com/DundStock

According to the latest research from cloud security provider Netskope, almost 44% of malware found in cloud apps have delivered ransomware, while almost 56% of malware-infected files in cloud apps are shared publicly.

The study, which appears in the company’s latest Netskope Cloud Report, found that the number of cloud apps keep going up in enterprises; 824 on average, up from 777 during the last quarter. Microsoft continues to beat Google as the most popular cloud app, with...

By James Bourne, 08 September 2016, 0 comments. Categories: Data & Analytics, Data Loss, Data Management, Security, Vulnerabilities.