Welcome!

@CloudExpo Authors: Elizabeth White, Darren Anstee, Kevin Benedict, Liz McMillan, Scott Allen

Related Topics: @CloudExpo, Java IoT, Microservices Expo, Open Source Cloud, Containers Expo Blog, Cloud Security

@CloudExpo: Article

Leveraging Cloud and Virtualization for Disaster Recovery

Enterprise Cloud News

With cloud computing, more users and an increase in data bring with it the challenges associated with disaster recovery and business continuity. All distributed systems have to be checked and the data points must all be monitored. In working with these more complex data centers, many administrators are turning to the cloud and virtualization to help them create a more robust DR plan, according to an article on DataCenterKnowledge.com.

A well-planned out cloud and virtualization solution can truly help any organization create a more agile environment. There are inherent benefits to working with specific types of cloud models and virtualization platforms. A large part of IT is creativity - that's why using new types of technologies can help reduce management costs and keep an environment running longer.

One way to prepare for disaster is using cloud for replication. Site-to-site replication has become easier with the utilization of both private and public cloud technologies. With better storage systems and more control over the WAN, organizations are able to better replicate their environments. This can be entire virtual machines, specific databases or just data points.

Cloud computing has made disaster recovery much more financially feasible for more organizations because the inherent flexibility of the cloud means you can dictate exactly how much downtime your organization can tolerate and where the costs break even. With that, companies who are trying to stay financially conscious are able to design a solution that fits both - the data center and the budget.

Majority of Organizations Use Unsanctioned Cloud Apps: Survey
Businesses plan to incorporate more cloud applications into the work environment to increase productivity, but an equally high percentage of employees admit to using unsanctioned apps, according to a recent survey.

Cloud adoption is on the rise, but according to the results of a survey conducted by OneLogin, there are a lot of clueless end users out there, according to an article on TalkinCloud.com. While 78 percent of organizations surveyed said they planned to increase the number of cloud apps they have in 2013, 71 percent admitted to using unsanctioned apps.

According to OneLogin, the survey demonstrated that 2013 will be the tipping point for cloud adoption. The company, in collaboration with security consultancy flyingpenguin, surveyed 200 IT and business professionals within organizations of all sizes and across various industries. The results were interesting, but perhaps not entirely surprising.

"It is no secret that cloud apps need solutions added to improve their security, yet to see 20 percent of app users admit a breach by ex-employees is still a surprisingly high result," said Davi Ottenheimer, president of flyingpenguin. "The real story behind the 80 percent already using cloud apps is that 70 percent admit apps came without company approval. In 2013, organizations will need solutions flexible enough to support the 60 percent with more than four apps already in use, and scalable enough to keep up with the 35 percent who plan to add at least four new apps this year."

Is the Cloud Safe Enough to Lock Up Law Enforcement Data?
Law enforcement agencies are looking for just the facts when it comes to cloud computing and its reliability in police technology.

Like many professions, law enforcement executives have particular concerns about using cloud technology, ranging from the risk that unauthorized persons could steal sensitive information to concerns about the costs of technology migration, according to an article on GCN.com.

A report, "Mitigating Risks in the Application of Cloud Computing in Law Enforcement," aims to help law enforcement officials weigh the pros and cons of moving to cloud computing. The report found that the major worries of the law enforcement community about moving to the cloud included cloud reliability and availability, performance requirements, costs of migration, and the recovery of data.

In a survey, most law enforcement officials said they were especially concerned about whether cloud computing was appropriate for mission-critical applications such as computer-aided dispatch, records management, criminal justice information and intelligence systems. And of all these areas, unauthorized access to sensitive information is the community's biggest concern, according to the survey.

Commercial cloud providers have made significant strides in protecting data from being hacked or stolen. A 2010 Aberdeen Group study that states, "compared to premise Web security solutions, users of cloud-based solutions had 58 percent fewer malware incidents over the last 12 months ... and 45 percent fewer incidents of data loss or data exposure."

Moreover, cloud providers have adopted data encryption technology, redundant data storage, two-factor authentication and federated identity and privilege management specifications, the report notes. Cloud providers are also well aware of the need to offer high availability services, the report states, and do so by building-in redundancy for data centers normally used for these services.

More Stories By Patrick Burke

Patrick Burke is a writer and editor based in the greater New York area and occasionally blogs for Rackspace Hosting.

Comments (0)

Share your thoughts on this story.

Add your comment
You must be signed in to add a comment. Sign-in | Register

In accordance with our Comment Policy, we encourage comments that are on topic, relevant and to-the-point. We will remove comments that include profanity, personal attacks, racial slurs, threats of violence, or other inappropriate material that violates our Terms and Conditions, and will block users who make repeated violations. We ask all readers to expect diversity of opinion and to treat one another with dignity and respect.


@CloudExpo Stories
Data is an unusual currency; it is not restricted by the same transactional limitations as money or people. In fact, the more that you leverage your data across multiple business use cases, the more valuable it becomes to the organization. And the same can be said about the organization’s analytics. In his session at 19th Cloud Expo, Bill Schmarzo, CTO for the Big Data Practice at EMC, will introduce a methodology for capturing, enriching and sharing data (and analytics) across the organizati...
SYS-CON Events announced today that Bsquare has been named “Silver Sponsor” of SYS-CON's @ThingsExpo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. For more than two decades, Bsquare has helped its customers extract business value from a broad array of physical assets by making them intelligent, connecting them, and using the data they generate to optimize business processes.
SYS-CON Events has announced today that Roger Strukhoff has been named conference chair of Cloud Expo and @ThingsExpo 2016 Silicon Valley. The 19th Cloud Expo and 6th @ThingsExpo will take place on November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. "The Internet of Things brings trillions of dollars of opportunity to developers and enterprise IT, no matter how you measure it," stated Roger Strukhoff. "More importantly, it leverages the power of devices and the Interne...
We’ve been doing it for years, decades for some. How many websites have you created accounts on? Your bank, your credit card companies, social media sites, hotels and travel sites, online shopping sites, and that’s just the start. We do it often without even thinking about it, quickly entering our personal information, our data, in a plethora of systems. Sometimes we’re not even aware of the information we are providing. It could be very personal information (think of the security questions you ...
19th Cloud Expo, taking place November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA, will feature technical sessions from a rock star conference faculty and the leading industry players in the world. Cloud computing is now being embraced by a majority of enterprises of all sizes. Yesterday's debate about public vs. private has transformed into the reality of hybrid cloud: a recent survey shows that 74% of enterprises have a hybrid cloud strategy. Meanwhile, 94% of enterpri...
In this strange new world where more and more power is drawn from business technology, companies are effectively straddling two paths on the road to innovation and transformation into digital enterprises. The first path is the heritage trail – with “legacy” technology forming the background. Here, extant technologies are transformed by core IT teams to provide more API-driven approaches. Legacy systems can restrict companies that are transitioning into digital enterprises. To truly become a lea...
According to Forrester Research, every business will become either a digital predator or digital prey by 2020. To avoid demise, organizations must rapidly create new sources of value in their end-to-end customer experiences. True digital predators also must break down information and process silos and extend digital transformation initiatives to empower employees with the digital resources needed to win, serve, and retain customers.
Businesses are struggling to manage the information flow and interactions between all of these new devices and things jumping on their network, and the apps and IT systems they control. The data businesses gather is only helpful if they can do something with it. In his session at @ThingsExpo, Chris Witeck, Principal Technology Strategist at Citrix, will discuss how different the impact of IoT will be for large businesses, expanding how IoT will allow large organizations to make their legacy ap...
In his keynote at 18th Cloud Expo, Andrew Keys, Co-Founder of ConsenSys Enterprise, provided an overview of the evolution of the Internet and the Database and the future of their combination – the Blockchain. Andrew Keys is Co-Founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life sett...
Cloud computing is being adopted in one form or another by 94% of enterprises today. Tens of billions of new devices are being connected to The Internet of Things. And Big Data is driving this bus. An exponential increase is expected in the amount of information being processed, managed, analyzed, and acted upon by enterprise IT. This amazing is not part of some distant future - it is happening today. One report shows a 650% increase in enterprise data by 2020. Other estimates are even higher....
SYS-CON Events announced today that SoftLayer, an IBM Company, has been named “Gold Sponsor” of SYS-CON's 18th Cloud Expo, which will take place on June 7-9, 2016, at the Javits Center in New York, New York. SoftLayer, an IBM Company, provides cloud infrastructure as a service from a growing number of data centers and network points of presence around the world. SoftLayer’s customers range from Web startups to global enterprises.
Internet of @ThingsExpo, taking place November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA, is co-located with 19th Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world. The Internet of Things (IoT) is the most profound change in personal and enterprise IT since the creation of the Worldwide Web more than 20 years ago. All major researchers estimate there will be tens of billions devices - comp...
One of biggest questions about Big Data is “How do we harness all that information for business use quickly and effectively?” Geographic Information Systems (GIS) or spatial technology is about more than making maps, but adding critical context and meaning to data of all types, coming from all different channels – even sensors. In his session at @ThingsExpo, William (Bill) Meehan, director of utility solutions for Esri, will take a closer look at the current state of spatial technology and ar...
SYS-CON Events announced today that Tintri Inc., a leading producer of VM-aware storage (VAS) for virtualization and cloud environments, will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Tintri VM-aware storage is the simplest for virtualized applications and cloud. Organizations including GE, Toyota, United Healthcare, NASA and 6 of the Fortune 15 have said “No to LUNs.” With Tintri they mana...
Fifty billion connected devices and still no winning protocols standards. HTTP, WebSockets, MQTT, and CoAP seem to be leading in the IoT protocol race at the moment but many more protocols are getting introduced on a regular basis. Each protocol has its pros and cons depending on the nature of the communications. Does there really need to be only one protocol to rule them all? Of course not. In his session at @ThingsExpo, Chris Matthieu, co-founder and CTO of Octoblu, walk you through how Oct...
The vision of a connected smart home is becoming reality with the application of integrated wireless technologies in devices and appliances. The use of standardized and TCP/IP networked wireless technologies in line-powered and battery operated sensors and controls has led to the adoption of radios in the 2.4GHz band, including Wi-Fi, BT/BLE and 802.15.4 applied ZigBee and Thread. This is driving the need for robust wireless coexistence for multiple radios to ensure throughput performance and th...
SYS-CON Events announced today that Secure Channels will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. The bedrock of Secure Channels Technology is a uniquely modified and enhanced process based on superencipherment. Superencipherment is the process of encrypting an already encrypted message one or more times, either using the same or a different algorithm.
What are the new priorities for the connected business? First: businesses need to think differently about the types of connections they will need to make – these span well beyond the traditional app to app into more modern forms of integration including SaaS integrations, mobile integrations, APIs, device integration and Big Data integration. It’s important these are unified together vs. doing them all piecemeal. Second, these types of connections need to be simple to design, adapt and configure...
Creating replica copies to tolerate a certain number of failures is easy, but very expensive at cloud-scale. Conventional RAID has lower overhead, but it is limited in the number of failures it can tolerate. And the management is like herding cats (overseeing capacity, rebuilds, migrations, and degraded performance). Download Slide Deck: ▸ Here In his general session at 18th Cloud Expo, Scott Cleland, Senior Director of Product Marketing for the HGST Cloud Infrastructure Business Unit, discusse...
“We're a global managed hosting provider. Our core customer set is a U.S.-based customer that is looking to go global,” explained Adam Rogers, Managing Director at ANEXIA, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.