Category Archives: Information Technology

5 factors to consider taking decision on an enterprise backup and recovery solution

Disaster recovery

Human failure, human error, software corruption, theft, computer viruses and hardware destruction are the primary cause for the data loss. In order to safeguard your data you need to have a disaster recovery plan for your environment. A major part of that disaster recovery plan is protecting your data. A good backup  is much more than mere data protection: Backup must manage data, not just protect it.

Servers, systems, and data are the lifeblood of your business. There are often hundreds of servers or sub-components that can fail, and many ways that both environmental and human factors can trigger such failures.  It is impossible to predict in which manner the next failure might occur.  However, it can be surprisingly straightforward to implement appropriate protections that will limit the occurrences and the impact of the inevitable failures.

Some of the statistics are as follows:

  • The consequences of data loss are dire; here is a sampling of just a few statistics related to the impact of data loss on business:
  • 93% of companies that lost their data center for 10 days or more due to a disaster, filed for bankruptcy within one year of the disaster(National Archives & Records Administration in Washington)
  • 77% of those companies who do test their tape backups found backup failures. (Boston Computing Network, Data Loss Statistics)
  • 50% of all tape backups fail to restore. (Gartner)
  • 25% of all PC users suffer from data loss each year (Gartner)

Here are some of the insights for you to review the backup and recovery solutions.

  1. Anatomy of a backup solution

The first thing that’s needed to make sure backups are completed is an integrated management and monitoring system designed with a simple, single-pane of glass dashboard so that you can tell the status of your backups and your vaulting (disaster recovery) operations at a glance.  Operating systems and applications must be integrated with the solution. Bare-metal recovery, disasters, and compliance must be considered. The top three areas with respect to data protection that cause the most wasted time include making sure that all backups are completed, squeezing out that last bit of performance and dealing with the agile data center.

  1. Importance of RPO & RTO

RPO (The amount of work that can be lost and will need to be redone in the event of data loss) and RTO (The amount of time it will take before employees can start working after a data loss event). One thing that many people take for granted is the fact that your RPO and RTO should be measured against all of your IT assets (such as laptops, workstations, etc) distributed throughout your company– not just those within your data center.  It’s wonderful to talk about lowering your RPO and RTO, but if you haven’t included all of the IT assets, then you’re just kidding yourself in terms of what your overall protection levels are.

  1. Power of BareMetal Recovery

Disk-to-disk backup systems with “bare metal” capability provide much faster backups and reduce the backup time window enough that all critical information can be protected. Bare metal technology takes a full snapshot of the operating system and all applications and allows them to be fully restored to a new, “bare metal” server in a matter of one or two hours, instead of several days.

More sophisticated systems provide this bare metal capability across multiple operating systems, so organizations that are running Windows, Linux, and other OS’s can continue to use a single, integrated backup solution. Regardless of the operating environment, it’s critical to remember that everything needs protection—not just user data.

 

  1. Instant Recovery

A more recent advance in data protection is virtualization failover, which is more often termed by a derivation of the term “instant recovery.” There are two forms of virtualization failover: on-host and off-host virtualization failover. In on-host virtualization failover, a backup is executed as a virtual machine entirely using the resources associated with the server and storage upon which the backup software executes. Off-host virtualization failover is similar, except the backup is executed as a virtual machine using primarily the resources of a second server (not the server upon which the backup software executes.)

Most vendors support off-host virtualization failover; few vendors support on-host virtualization failover – Unitrends is the only company currently supporting both

  1. Recovery testing and assurance

77% of those companies who do test their tape backups found backup failures (Boston Computing Network, Data Loss Statistics).The basic concept recovery assurance is about the continuous verification of RPO and RTO for crucial system, applications and business services. Just like backup alone is worthless without the ability to recover data, disaster recover (DR) implementations are marginalized without the ability to guarantee, or assure, that DR will take place successfully when needed. Combining backup, recovery and replication with disaster recovery assurance ensure end-to-end data protection and compliance at significantly lower cost than existing approaches.

In the case of DR – it is also worthless unless you absolutely – positively know that you can recover from a disaster – within the SLAs you have established. Disaster recovery assurance provides IT execs with 100% ironclad assurance recovery will occur within stated RPOs and RTO

99 CAN DO’s of Microsoft SharePoint

99 CAN DOs of SharePoint
99 CAN DOs of SharePoint

Vision of a SharePoint Implementation Decision maker

“We wanted one work-force platform to pull our global company closer together, enable complex collaboration, automate business processes, provide BI, and facilitate innovation,”

Nancy Blankenship, Vice President of IT at First Data.

Value Proposition to organizations

Organize, Discover, Build & Manage

SharePoint Benefits

Manage Cost

Manage Risk

Manage Time

100 CAN DO’s of Microsoft SharePoint

  1. Automation of the workflow process
  2. Can get your employees on board to discuss their views & valuable feedbacks
  3. Develop your corporate website
  4. Social collaboration through internal site like uploading personal information, news headlines and insights
  5. Setting up the internal communication unit to filter the right information
  6. No need to send large attachments to congest emails as these can be easily downloaded from the site
  7. Different Departments can be engaged in to make sure that the solution is answered to all queries
  8. Custom applications can be created catering specific needs
  9. Departments can have libraries where docs are stored and people can access those information as quickly as possible
  10. Partner extranet, contract management and human resource self-service processes can initiate
  11. Supports manager resource review and product explorer
  12. The solution delivers an IT command center and innovation-management tools
  13. Works as a global-learning university
  14. Works as an opportunity management and product development processes
  15. Gives access to advanced tools like Microsoft Office PerformancePoint Server 2007, business intelligence software and SQL Server 2008 R2 Reporting Services.
  16. Facilitate complex collaboration
  17. Facilitate internal business intelligence reporting
  18. Shared service application platform
  19. Adhere Compliance
  20. Creating dynamic sites
  21. Community building
  22. Mobile Access
  23. Blogs
  24. Yammer
  25. Role Based Security Rights
  26. Multilingual SharePoint tools
  27. Improves corporate identity
  28. Single entry point
  29. Connecting Microsoft Dynamics CRM system with SharePoint adds another opportunity to improve company-wide productivity.
  30. Can surface Line-of-Business (LOB) data through SharePoint 2013
  31. Functionality included transformation of records, notifications, approvals and on demand archiving.
  32. Capability to avoid redundancy of multiple documents with the same information and multiple data entry.
  33. Audit readiness can be significantly improved. Use of technology to manage, store and search for records and their related content.   Retention requirements will be proven and related content to samples will be available on demand for a period of 10 years.
  34. Contract Management Business App is available for SharePoint
  35. Optimization of the strategic processes  like Contract Lifecycle Management (CLM) practices
  36. SharePoint dashboards on self-service basis
  37. SharePoint with LOB connection: Provides a positive user experience with reduced amount of data entry, more accurate data results throughout the processes and a faster return on investment (ROI)
  38. SharePoint Designer: A free, client-side customization and configuration tool for SharePoint. With SharePoint Designer, you can create data-rich Web pages, build powerful workflow-enabled solutions, and design the look and feel of your site. The sites you create can range from small project management team sites to dashboard-driven portal solutions for large enterprises.
  39. Office Web apps: Web-based, online, cross-browser compatible versions of Excel, Word, PowerPoint and OneNote. These integrate directly into SharePoint’s document management functionality.
  40. Project Server: An extension to SharePoint providing integration with Microsoft Project and other features such as Enterprise Content Management, business intelligence, enterprise search, personal sites and Newsfeed.
  41. Excel Services: A server technology included in SharePoint 2010 and SharePoint 2007 that enables users to load, calculate, and display excel 2010 workbooks on SharePoint Server 2010
  42. Team foundation server: A free download of core SharePoint functionality, without all of the Server functionality Microsoft Office Access, Visio, Excel & InfoPath Forms services
  43. Power Pivot: It extends the capabilities of the PivotTable data summarization and cross-tabulation feature with new features such as expanded data capacity, advanced calculations, ability to import data from multiple sources, and the ability to publish the workbooks as interactive web applications.
  44. Performance Point Server – business intelligence software: PerformancePoint Server also provided a planning and budgeting component directly integrated with Excel.
  45. Audience Targeting
  46. Governance Tools
  47. Enterprise Wikis
  48. Organization Hierarchy Browser
  49. Managed Metadata
  50. OS Search integration
  51. Extranet Portal
  52. Used to provide password-protected, web-facing access to people outside an organization
  53. Information from any part of the organization can be surfaced inside useful contexts, providing information that can improve effectiveness.
  54. App Catalog
  55. PowerView
  56. A new visualization experience, easy to use dash boarding tool that allows self-service business intelligence.
  57. Business Continuity Services
  58. Access Services
  59. Helps you to create deskstop databases. Has easy to use tools for quickly creating the browser based database application that help you to run your business.
  60. Visio Services
  61. Enables you to load, display, and interact programmatically with Visio .vsdx, .vsdm files and Visio Web Drawings (.vdw)
  62. eDiscovery
  63. Topic Pages
  64. Cross Site Publishing
  65. Language Translation
  66. Custom design for internet
  67. Custom Development
  68. Multiple Domains
  69. Discovery & Risk Assessment
  70. Audit and contol management ( ACM) automates discovery and risk assessment for business critical excel and Access database
  71. Distributed Cache Services
  72. Shredded Storage
  73. Translation services
  74. Minimal download
  75. New Navigation Framework
  76. Information Management policies
  77. Granular Control
  78. Secure Delegation
  79. Request Management
  80. Systems Status Notifications
  81. Cross device experience
  82. Integrated cross platform Data portability made easy
  83. Site Mail boxes
  84. Drill Down
  85. Browser Editing
  86. Socialized Insight
  87. Structured view of request details
  88. Cross servers & applications
  89. PowerShell & central administration
  90. Simplified & remote
  91. Cross Premise synchronization
  92. Windows server 2012 Active Directory
  93. Data Safety Services
  94. Secure Updates
  95. Developer App Model fully compatible with Office 365
  96. No licenses required for external users
  97. Free External users for online SKUs
  98. One Drive for Business Folder Sync: A desktop program that you can use to sync an offline version of a team site or OneDrive for Business library to a folder on your computer.
  99. SharePoint Work Space: A desktop program that you can use to take SharePoint site content offline and collaborate on the content with others while you are disconnected from the network.

 

Network infrastructure security management solution – A holistic approach in Network Security

Network Infrastructure Security Management Solution can continuously provide network visualisation and identify critical attack risk. It provide security network and risk team with a firm understanding of Where the investment is needed, and Where greatest cyber attack risks lie. This understanding enable organizations to allocate resources and take prioritized actions

<div style=”margin-bottom:5px”> <strong> <a href=”https://www.slideshare.net/TwinkleSebastian/network-infrastructure-security-management-solution-a-holistic-approach-in-network-security&#8221; title=”Network infrastructure security management solution – A holistic approach in Network Security” target=”_blank”>Network infrastructure security management solution – A holistic approach in Network Security</a> </strong> from <strong><a href=”http://www.slideshare.net/TwinkleSebastian&#8221; target=”_blank”>Twinkle Sebastian</a></strong> </div>

 

4 reasons to Implement Managed File Transfer solution in Orgnaisation

Managed file transfer 1

Managed File transfer (MFT) is an integral part of the bank’s operational framework. The solution is essential for banks and financial institutions to protect sensitive data and meet compliance regulations. File transfers requirement ranges from sending files within the organization, interacting with the vendors, other stakeholders, uploading data to the website and sending critical reports to Central bank. There are cases where manual file transfer proved to be  inefficient which can lead to potential data loss, sending the wrong files and time consumption during the transit and the least, not sure about the delivery and accuracy of the send files Below are the listed reasons for the IT decision makers to evaluate in implementing a managed file transfer system in banks.

  1. Use of easily available file sharing system like dropbox

IPSwitch data protection survey reveals that 53% of the respondents admit to sending sensitive files over unsecured email. Employees tend to use the system which is convenient to them. In the case of file transfer file sharing, systems like Dropbox, Microsoft OneDrive, Google Drive, Apple iCloud and Amazon Cloud Drive and other systems are widely used.  According to a recent survey of 1300 business users, one in five are using Dropbox to transfer corporate files, effectively circumventing any safeguards their IT departments have put in place with respect to file transfers.  The reasons  for such shortcuts are generally  due to growing file sizes and pressure to get job done quickly. Managed file transfer can centralize the entire system of file transfer that enable features like control of the file, LDAP authentication, robust password policies, rules for IP / user lockout and many more.

  1. Poor visibility of the file over the file transfer system

The Gramm-Leach Bliley Act (GLBA), Sarbanes-Oxley 404 and 409 (SOX), and the Dodd-Frank Wall Street Reform and Consumer Protection Act all require banks to have clearly outlined internal procedures that define how the integrity and security of private data will be maintained, including when data files are in transit. Every file transfer needs to be visible in order to understand what  document was sent, where was it sent, was it received, and when and how did it get there? And right now, this very minute, what is the real-time status?  Essentially a tool to monitor, manage and audit transfer trial of files across the enterprise will enable in time saving and opportunity cost.

  1. IT team is not getting larger

IT department has the responsibility of file transfer where it carries operational risks such as control access, ensure accuracy, reduce complexity and manage costs. According to a recent Aberdeen study, the volume of file transfers is increasing, on a yearly average, by 11%.; the size of files by 7% , and the number of users transferring files by 6-9%. All while IT hiring goes up by a paltry 2%. The average is all across the industries.  As the operations expanded, the number of file transfers completed each day had grown by a multiple of 100 on a YOY basis. IT pros views the manual approach to the file transfer similar to sitting in traffic. The company is growing and so are the business partners. The file transfer must keep up with the increasing demands around volume, performance, reliability and security.

  1. Tool to respond to security incidents

4 out of every 100 file transfer results in error exceptions or problems.  Security and compliance incidence in file transfers increased about 4% YOY. Do you have right tools to respond if your file transfer system interrupts during the peak data volumes? Does the file transfer system respond to events in real time? 65% of the Managed file transfer purchase has cited productivity as the primary reason to nod for the solution where MFT has tools to respond to events in real time and features like Encryption and anti-virus support are critical for managed file transfer system. Above all managed file transfer provide visibility of the file during transportation and rest to IT.