When backing up your virtual, physical or hybrid environment there are a variety of deployment types; agent-based, hypervisor-based, agentless and storage-based. (Download our pros and cons guide to these four types). When it comes to where to store your data however, deployment type does not dictate repository.
You need to pick a storage location based on your business requirements, including compliance mandates and vendor compatability with current product sets. With the cost of bandwidth steadily decreasing while the risk of a local-only storage strategy grows, it's not hard to see why Symantec reported that 93% of IT executives are at least discussing cloud backup services. Below is a high-level list pros and cons for local and cloud storage.
- Access to data. Everyone has some onsite storage presence. Local storage options allow easier access and faster restoration of data.
- Overall faster recovery for full or large datasets. Local LAN speeds and local tape speeds can offer significantly faster restoration for full or large datasets. Ideal for bare metal restore of full image backups.
- Catastrophe takes building out, your backups go with it. If it's your job to manage the company's disaster recovery plan, the potential for this to be a Resume Generating Event (RGE) is significant. Even if you've been taking tape backups home, your job is now dependant on the fidelity of those tapes and the ability to restore them.
- Build as you grow. Means more capital expenses as opposed to operating expense from the cloud side. Say you have 1TB of total data backed up go through an acquisition adding to that 2, 3, 4TB of data... Now you need a backup system to accomodate that change.
- Complex to manage. And complex to extend.
- Data not physically separate from the primary data source. Having your backup solution in your production data center or it's in your production closet creates an obvious issue when a physical event is to blame for an outage.
- Convenient. If you've got connectivity to your cloud provider network, your data is available.
- Highly available data.
- Virtually infinitely scalable. As technology needs expand and contract organizations that build out their own facilities may find themselves with either an over-built or under-built site sooner rather than later. Leveraging a cloud provider allows you to expand and contract services as your business backup needs change.
- Pay as you go. Pay-as-you-go subscription model allows for fixed billing that only changes when you add or remove live systems from the disaster recovery site. This keeps costs constant just like a utility bill avoiding unforeseen spikes or recurring maintenance fees.
- 3rd party maintenance
- Facility management
- Storage infrastructure
- Data center resources
- Easy sharing of data.
- Support for more dataset revisions.
- Slow initial full backup seeding. Say you're doing a backup of a 500GB file server over a WAN to a cloud provider. The speed to completion is going to depend on connection speed.
- Speed dependent on connection to provider. How big a pipe do you have? Perhaps your using a secondary WAN connection for you backups but it's probably not as big as your primary. As your pushing your data from your production facility to your cloud provider you may need your secondary circuit to be larger than your primary to fulfill your backup strategy.
- Increased bandwidth costs. Although the cost of bandwidth continues to drop over time it's still a cost to consider when strategizing how much data you need to store in the cloud.
- Data retrieval. Say you cancel service. How do you get your data? With local storage you take your tapes and if you need to retrieve you reinstall application and go forward. When it comes to cloud storage; Who owns the data? If you cut ties with your cloud provider, do they keep your data indefinitely? Do they delete the data? Be sure to verify the logistics for data retention, data retrieval and cancellation of service before engaging with a cloud provider.
Security is on my mind a lot these days. Fandotech relies on industry experts like Symantec, Cisco Systems, SonicWall, Fortinet and our parent company – Industrial Defender – just to name a few, to make sure we are getting the right solutions to our clients.
Since my days at Cisco Systems where they introduced the SAFE Architecture that outlined the need for defense in layers we have seen that this policy-based discipline applied to IT security is becoming a requirement for every end-point. The industry used to concentrate its security efforts in the large data centers in a defend Fort Knox style of protection. But the fact is that now every Desktop system can get a virus simply by going to a perfectly innocent website and looking up your favorite recipe and, because their security was not good enough, the recipe comes with a sweetener you did not want – a virus.
Symantec has a must-do list of security checks:
- Use IPS (Network Threat Protection). Threats today are web –based. The Intrusion Prevention System (IPS) stops threats before they can infiltrate a machine. IPS stops vulnerability exploits, Drive-by-Downloads and Fake AV installation. Typically provided on a firewall device.
- Optimize any end-point protection settings in use regularly. These settings should be optimized by checking in with the vendors and updating the set points as recommended.
- Keep browser plugins patched. Attacks have moved to the browser. It’s critical that attackers not be able to use Microsoft® Internet Explorer, or Adobe® Reader/Acrobat/Flash vulnerabilities to get on a system. Use each vendor’s auto update or software distribution tools to install patches as soon as they become available.
- Block P2P usage. The simplest method for distributing malware is hidden inside files be shared on peer-to-peer (P2P) networks. Create and enforce a no-P2P policy, including home usage of a company machine. Enforce the policy at the gateway and/or desktop.
- Turn off AutoRun. Stop Conficker/Downadup and other network based worms from jumping from USB keys and network drives without changing company polices on Open Shares. Learn more about preventing a virus from using AutoRun.
The threats keep changing and we have to continue to update and adapt. There are strategies that can help better protect your organization. Request a network security assessment. We’ll review your network posture and daily processes to identify areas of vulnerability.
Two weeks ago Fandotech joined in a panel discussion moderated by the CT-GMIS. Fandotech was invited to be part of a network of service providers that will work together to support a state-wide network of end-users.
What is CT-GMIS? The Connecticut Government Management Information Sciences is part of the International GMIS community with the expressed mission,
… to provide an organizational structure and network with associated activities, which may be used by all State, County, and Local government agencies and educational institutions which are members in order to help them in their information and automation endeavors and with associated projects and problems.”
GMIS provides a forum for exchange of ideas, information and techniques that can be leveraged to serve and benefit the many. Formerly the CEN, Connecticut’s initiative is aptly re-named the Nutmeg Network as the former CEN has had significant additions to include more government functions.
Joined by our colleagues and fellow vendors Comcast, AT&T, Fibertech, Total Communications, Atrion, Sertex, ChimeNet and others, we gathered to discuss available technologies and services that could strengthen Connecticut’s state-wide technology backbone.
What is Fandotech’s value-add to the Nutmeg Network?
Fandotech can attach its Data Centers directly to the Network. Once we’re part of the Nutmeg Network, Fandotech can be an intranet resource for backup, disaster recovery and restoration, business continuance and virtualization services. As part of the network Fandotech would serve as a source of information technology capitalization. Across all industries there just isn’t enough budget for all the services we need to acquire and then maintain over time – Connecticut’s Nutmeg Network members are no exception. Our relationship with the SMB market means we are constantly upgrading and maintaining our enterprise-level infrastructure to serve our clients. These services and products can be economically provided to the GMIS community. Network members do not have to manage R&D initiatives and associated costs. When the SMB market upgrades the Nutmeg Network reaps the benefits!
The value-add flows both ways. Since Fandotech services the highest technology denominator – all clients benefit! We operate an enterprise-level service delivery business. We treat our collective business as an enterprise. SMB benefits from our conversation and concerns securing education, police and fire and other government agencies. SMB and Government agencies and departments alike face similar IT challenges.
- Challenge #1 is funding for today’s technology.
- Challenge #2 is funding the required upgrades two… three… four years out!
- Challenge #3 is guessing how many servers or storage you'll need over the next three years without over buying.
Solution? Acquire a service from Fandotech that will scale, grow or contract, as your business demands change and as technology evolves. Fandotech uses the collective economic leverage and momentum of all our clients to identify security, compliance and change management needs. Such mandates push us to consistently and constantly re-invest in infrastructure, people, training, software, research and development – using pooled capital to benefit everyone.
Surfing the web? Knowing what not to click will protect your email, your device and your company!
Surfing the web for information is an integral part of many business processes. But along with this business necessity comes a responsibility to stay away from free downloads and pop-ups that aren't safe.
Fandotech's general rule for protecting computer systems and environments against viruses, malware and tracking software is "if it's free, it's not for me".
These free, readily available downloads and pop-ups include:
- Free System Cleaners and Tuners
- Free Screen Savers
- Free Games
- Free Music Downloads
- Free Coupons
- Free Tool bars
- Free Surveys
Hackers and scammers will often try to entice with promises of 'free stuff,' but these applications exist only to give someone unauthorized access to your computer, your business data, and your personal information.
The first line of defense is to educate your staff and end-users about the potential risks involved with downloading questionalble applications.
That having been said organizations are getting serious about how they approach their security posture with email security, spam prevention and email virus protection solutions such as:
- Antispam protects your inbox by keeping unwanted messages out. By stopping spam before it enters your network, you’ll save on server storage.
- Antivirus protects against email born viruses. Gateway security can stop infected messages long before they become a problem within your environment.
- Encryption is necessary when sending sensitive personal data and/or financial information via email. An easy-to-use encryption solution will ensure your data is safe end-to-end.
Find out more about our suite of security solutions for business.
Find out what's new on the hardware scene and how to determine what processor is right for you.
Aaron chats about the latest in technology releases and what it means for business.
Tablet and Phone News:
- Surface: Microsoft is making its own hardware – “Surface”. Comparable to the Transformer Prime, Surface will come loaded with Windows 8.
- Nexus 7: Google releases Nexus 7. This new tablet will be in direct completion with the Kindle Fire and Barnes and Noble’s Nook tablet. Nexus 7 runs on the newest processor, Integra 3 giving users a quad core processor in a 7 inch tablet. It comes in two flavors, 8GB and 16 GB. Aaron recommends the 16 GB since you can’t expand the storage on the device. The screen is high definition rendering quality closer to that of the latest iPad.
- Transformer Infinity: New Transformer is due to release. The Transformer Infinity hits stores end of July/beginning of August.
- Galaxy S3: Great phone if you’re looking to upgrade to an Android smartphone. Its 4.3 inch screen is very bright and has excellent contrast, even in the daytime. Coolest differentiating feature? Near field communication. Currently not in the features list for the next iPhone release, this technology is revolutionizing how we pay for things and Google Wallet is leading the charge. How does it work? Subscribe to Google Wallet. Link Google Wallet to a credit or debit card. The App on your phone leverages near field communication technology enabling your Google Wallet to pay for your purchase by swiping your smartphone at the checkout. Wallet is protected by pin code. If your phone is stolen you can have it completely wiped with one phone call or one secure click.
- Windows 8 is coming! Microsoft looks to roll out a completely united application setting interface from the tablet to the server. The phones will follow August/September. The Windows 8 phone will be equipped with Office. Users will be able to completely edit Word, Excel, PowerPoint, Publisher etc. documents on their phone. The implications of this feature for business development professionals are huge! With the right hardware, PowerPoint presentations can be outputted from your phone to a conference room screen. No more lugging laptops to meetings.
- New Android operating system, Jelly Bean, coming soon!
June Hardware Highlights:
- AMD announced that they are surrendering to Intel and are no longer in the enthusiast chip market.
- NVidia release the 600 series; 690 is one of the fastest video cards on the market now, the 680 is nice too and the 670 has been much improved from its previous iteration the 570.
- All Bluetooth devices work with all phones – the question is does the Bluetooth work for you? Aaron sports the Jawbone Era and raves about its ability to help him manage incoming calls from both his personal and professional cell.
- Galaxy S3 is out amidst rumblings of the new iPhone but no word on how large it would be. They’re saying the new form factor is going to be larger to compete with the 4.7 inch screen which seems be the emerging standard. Aaron loves his Galaxy Note but admits it’s pretty large for the average user.
- Thinner laptops are still on the rise but you’ll notice that the Ultrabook title is no longer being used in such a broader sense. The term, having recently been patented, is leaving developers grasping for new ways to talk about these slim laptops.
- The Intel Core i7 is currently the fastest processor in the consumer market. The Corei7 Ultrabook-esque laptop is like having desktop power in a quarter-inch think laptop. Aaron takes a nostalgic hardware detour – how amazing is it to come from “luggables” to a laptop so thin you could lose it under a stack of paper!
Fandotech is proud to announce its acquisition by Industrial Defender! The recent acquisition enables our expansion into the industrial control systems market to deliver comprehensive backup and disaster recovery services. To best serve the niche concerns of the power, chemical, oil, gas and water sectors we have tailored our long-standing Boomerang Recovery Solution set to assist ICS professionals in preserving critical operational data, meeting regulatory challenges, and maximizing staff productivity.
Industrial Defender President and CEO, Brian Ahern chats with Fandotech’s John Boyd about the recent acquisition. Industrial Defender acquired Fandotech to enable the company's new services launch; Survive™. The Survive services provide Onsite and Offsite Backup and Disaster Recovery of critical cyber assets for industrial control systems (ICS) environments to ensure operational continuity.
Operational uptime is an essential component to everyone’s strategy. What capabilities and support do operational professionals need to truly address mounting security, compliance and change management challenges? Reserve your spot for our July 31 webinar that will tackle the 'what', 'why' and 'how' surrounding this timely topic.
Citrix Synergy 2012 San Francisco Trip Report
Just back from Citrix Summit and Synergy in San Francisco (May 7 – 12) and ready to serve! What is Summit? What is Synergy? Is Synergy some mass meeting of borg-like individuals with a common thread of understanding or direction that guides them through the technology selection process? In short; it kind of is...
Summit is the Citrix two-day partner conference. Top Citrix executives gather to discuss how their solutions stack up in a competitive software market as well as review product developments over the past year. The Summit is also the venue where they announce new products, like ShareFile which allows for file sharing for enterprises outside the confines of their data center, or computer rooms for smaller enterprises as well as new acquisitions like Podio which is a new productivity suite for companies under the guise of “social media”. The conference culminates with the introduction of the Citrix strategic vision expanding on the wants and needs of workers and focusing mainly on the capability to work from anywhere, anytime and from any device.
In contrast to Summit, Synergy is Citrix’s three-day customer-focused conference. This is where Citrix customers meet, network and exchange ideas, triumphs and futures. It is truly a “Borg”. Everyone there has one thing on their mind; how can Citrix make my IT life easier – and frankly more exciting – providing the best platform for my customers while giving them the freedom to work from anywhere, using any device?
Just as with Summit, Synergy carries a great message for the Citrix tech future, expanding on the ability to work from anywhere, anytime, from any device. For individuals who use the physical office as a way of seperating their personal and professional life the idea of work being so accessible is not an attractive solution. But think of this – for a Connecticut resident like myself, the Federal Highway Commission states that employees travel an average of 23.5 minutes one-way to work. Citrix’s standpoint is that when you need (or decide you need to) work you simply use a device to access your data, documents, desktops, systems, etc. I can easily leverage devices I use everyday to accomplish my professional to-do list while saving, if not gaining, personal time. My laptop, tablet and Smartphone all have the capability to utilize a piece of software that Citrix has written called the Citrix Receiver. And guess what it does? It allows me to connect from anywhere, at anytime, using any of my devices. So instead of traveling an hour to work, I simply use the Citrix Receiver, get my app, do my work and log off. The transition from not working to working is mere seconds vs. the CT average of 47 minutes to and from work.
If you have two hours to spare (that’s two days of travel time to work) may I suggest you view the keynote from Citrix Synergy 2012 on Citrix TV. Citrix CEO, Mark Templeton, has great energy and a genuine passion for the solutions Citrix is bringing to the marketplace not to mention extraordinary vision about the future of business computing.