Part 3: #Virtualization Makes #DR Easier, Except When it Makes it Harder

Computer ports

By Ram Shanmugam, Sr. Director of Product Management Part 1 of this blog series described the things that change and don’t change when recovering hybrid environments (part physical, part virtual). Part 2 of this series talked about application tiering and data movement, two things that don’t change even when the environment is hybrid. In today’s Part 3, I’m going to get on my soapbox about the three main challenges of recovering hybrid environments. The 3 Challenges are: The need to recreate a multi-layer, multi-platform hybrid stack for each and every mission-critical application. The need to do point #1 above within a certain recovery time objective (RTO). The need to spend the capex … Read more

Part 2: #Virtualization Makes #DR Easier, Except When It Makes It Harder

1ZZZ_4093

By Ram Shanmugam, Sr. Director of Product Management So let’s talk about application tiering first. Virtualization does not change the need to perform a business impact analysis that helps you understand the cost of downtime application by application. At the end of this process, you should have a list of applications prioritized by the size of their impact to revenue or to costs (some applications, if down for too long, can actually start incurring penalties for your company). Following best practices, you would then assign a recovery time objective (RTO) and recovery point objective (RPO) to each of these applications. So far so good, right? Next, you need to move your data over to your s … Read more

@SunGardAS Experts Give Sneak Peek Into Their #VMworld Plans

Janel Ryan

The countdown to VMworld 2012 is underway, and before the event opens and the frenetic pace of one of the largest shows of the year begins, our experts at SunGard who are attending are weighing in with their thoughts on what this year’s event will offer. SunGard’s team will be meeting customers and partners at booth #2322 to discuss SunGard solutions, such as recovering hybrid environments, and sitting in on a number of breakout sessions across many VMworld tracks. Read what our experts have to say about the technologies that are capturing their attention, and what they’re looking forward to most. And with so much to learn from both the business and the technology perspectives, the dizzy … Read more

@SunGardAS Exhibits #ACloudSoSolid at #VMworld 2012

Win an iPad3!

  In less than a week we’ll be hopping a plane from our corporate headquarters in Philly, and heading to “The City by the Bay” for VMworld 2012 at the Moscone Convention Center, August 26-30.  This year we will be a Bronze Sponsor and will be holding down the fort in booth #2322. During the expo, stop by our booth to meet with our cloud specialists and learn more about: A Cloud So Solid, our flexible, secure, cloud computing offerings for production hosting and recovery as well as our unmatched consulting services. Follow and tag your tweets with #ACloudSoSolid for the latest details and to get the play-by-play from the show floor. We have a number of exciting things happening this … Read more

#Virtualization Makes #DR Easier, Except When it Makes it Harder

Virtualization

By Ram Shanmugam, Sr. Director of Product Management Unless you’ve been living under a rock for the last half-decade, you know that virtualization is changing the landscape of IT and data centers.  In terms of financial impact, virtualization untethers applications from physical servers, creating valuable savings. In terms of disaster recovery impact, virtualization makes recovering applications easier – MUCH easier. It’s as easy as copying a file to a computer and running it.  Here’s the kicker: the world is not 100% virtualized yet. Data centers are becoming increasingly virtualized, but most data centers today are still some part physical and some part virtual. That is to say, they are “h … Read more

Be Sure #BYOD Doesn’t Spell Bring Your Own Disaster

BYOD

By JP Blaho The increased availability of powerful ultrabooks, smartphones, and tablets is blurring work and home life for many users. And most users don’t want to maintain two sets of contacts, calendars, and files, or lug around two devices when one would do. Many companies are adopting a Bring Your Own Device (BYOD) approach where workers can use their own devices to access company resources such as email, files, applications, and databases. To put the BYOD movement into perspective, consider that a recent industry study found that 44 percent of firms had a BYOD policy in place in early 2012, and that number increased to 94 percent in 2013. There are several reasons for this rapid e … Read more

What You Didn’t Think About When Implementing a Telework #DR Strategy

Workforce Recovery

By Ron LaPedis Will work from home work when you need it most? Telework is getting more popular every year — based on current trends, with no growth acceleration, regular telecommuters will total 4.9 million by 2016, a 69% increase from the current level but well below other forecasts.[1] In fact, the US government’s Telework Enhancement Act of 2010 mandates that every department head identifies who is eligible, partially for emergency readiness, but also to reduce energy use and increase employee retention. Teleworking has a few basic requirements: A secure place to work A secure computing platform Sufficient and secure data bandwidth Access to appropriate voice ser … Read more

Enterprise-level Security at a Small Business Budget

Cloud Security

By JP Blaho As companies embrace the fact that every business is a contender on the Internet, and every company is subject to the same types of vulnerabilities and attacks, they must all realize their network security postures must be advanced and robust.  This means that a company of six employees must have network security protections which mirror those of an organization of 6,000 employees.  As cost-prohibitive as it sounds, there are ways that non-enterprise-level businesses can implement a security strategy that is comprehensive and effective in protecting themselves from attack just as successfully as enterprise customers. One such solution is called Unified Threat Management ( … Read more