Category : Backup

5 New Tech Tested Products for Your Business

Ever wondered what the best in tech products are at this very moment? The experts at Network World weigh in and give us a little glimpse of the newest innovations on the market.

Vidder PrecisionAccess – By rendering applications invisible to unauthorized users PrecisionAccess does a fantastic job at preventing application hacking. Even with stolen credentials hackers can’t access protected applications with unauthorized devices.precision-vpn_clip_image002

VeloCloud SD-WAN – VeloCloud provides a hybrid WAN solution that works with MPLS private links as well as ATT-U-Verse with cable or any broadband DSL links. One tech pro reported an increase from almost zero network visibility to nearly 100% network visibility. A great tool for IT management across multiple locations without staff needing to be onsite at all times. Facilitates communication and network visibility.  velocloudlogo

Cisco Identity Services Engine (ISE) – With so many features that help with managing user-facing ports and devices, whats not to love about Cisco ISE. One huge factor reported by tech pros is the integration of TACACS within Cisco ISE, making it easy to run Cisco ISE as a Radius server or TACACS server for network devices. In addition to this, Cisco ISE significantly improves management of devices especially restricting machines from devices and sites they are not permitted to visit.Cisco_ISE

 

 

 

 

 

 

 

 

Intermedia SecuriSync – For backup and file sharing SecuriSync is the way to go. As a two-in-one tool for consolidated file backup and management of continuous file backups, Intermedia SecuriSync makes relevant files easier to access as they are all stored in a secured shared folder. If you have team members spread across different locations, this tool is very helpful in making sure the data is always backed up and kept secure. One platform with a master source keeps project collaboration as safe as it can be.securisync-logo-247x300

OpenSpan Transformation Platform – OpenSpan collects all employee desktop activities both productive and nonproductive, including time away from the computer. This platform allows businesses to evaluate from employee activities how employees work best and what can be improved upon in order to drive down operational costs and maximize revenue. Providing data about employee activities takes away the need for manual employee logs. Lack of employee logs that need to be analyzed by supervisors for key performance indicators (KPIs), such as call volumes, proves to be a huge time saver. OpenSpan Transformation Platform takes working smarter to a higher level.

yKVWo9CQ_400x400


If you would like to educate yourself in more detail about the information presented in this blog post please visit: Fave Raves: 29 tech pros share their favorite IT products 

Storage and Backup Products that Save the Day

Nasuni Cloud Storage – Leveraging the cloud as a primary storage component, Nasumi Cloud NAS combines local storage controllers and cloud storage to provide global access to data with local performance. The only file system of its kind that can scale from hundreds to hundreds of billions of objects without any degradation of performance. If your company is having trouble taking on highly data-intensive projects because of limited storage capacity that is costly to upgrade, NAS is the right solution.pic

DataCore’s SANsymphony-V – This software-defined storage option maximizes IT infrastructure performance by virtualizing storage hardware in a universally compatible format. The SANsymphony-V software runs on standard x86 servers, providing one set of common storage services across all storage devices even allowing communication between unlike storage devices. Customers and IT techs rave about the increase in performance and especially the 75% reduction in storage costs. “[It] meets our replication needs — replicates all critical data between two data centers. Also provides rich SAN capability.”says David Blaisdell, assistant IT director at the New London, NH, college.

Intermedia SecuriSync – Backup and File sharing with Intermedia SecuriSync is made easier by providing real-time backup and point-in-time restore for PCs and Macs. When data is the core of your business, you need to be able to retrieve and analyze data without delay. SecuriSync provides both consolidated file management and continuous backup of documents, while securing access to sensitive data. Going beyond read-only access, employees can edit documents from mobile devices without having to worry about version control. Real time backups give users the comfort of being able to easily restore corrupted files.

CloudBerry Managed Backup – This flexible and cost effective solution allows the user to choose the storage providers as well as provides remote management capabilities. For small to mid-sized businesses this is the perfect option. Cloudberry provides all of the benefits of cloud based storage, scalability, reliability and security but at a size attainable for small businesses. Backups are made both easier and less costly.


If you would like to educate yourself in more detail about the information presented in this blog post please visit: Go-to storage and disaster recovery products

 

Ransomware

 

Ransomware Malware Ransomware is the devilish and extremely debilitating program designed to lock and encrypt files in order to extort money from consumers, business owners, and even government officials. It seems that no one is safe in the fight against ransomware. Most ransomware programs are targeted at the most popular operating system, Windows. Ransomware programs can and will target other systems such as Android applications, Mac OS X and possibly even smart TVs in the near future. Not only is this an unsettling forecast for consumers, but also a call to action for preventative measures to protect your most important data files.

What can be done? Most users have learned the hard way that it is better to back up sensitive data to an external hard drive. However, this type of malware is tuned in to this. When a ransomware program infiltrates a computer, it infects all accessible drives and shared networks, encrypting all files found. This makes for a very irritating discovery of locked data across the board.

Rather than rely on the external hard drive method for backups, it is suggested that consumers adopt a new best practice. Ensure at least three copies of sensitive data are made, and stored in two different formats. At least one of these copies should be stored off-site or offline. This way if ransomware locks files away consumers are not forced into a sticky situation of deciding whether to risk paying for the data retrieval or losing the data forever.

What to do when faced with ransomware? Not much can be done once ransomware has attacked. Most security researchers advise not paying for files to be unlocked, as there is no guarantee that the hackers will provide the deception key once paid. Security vendors also worry about the implications for fueling the fire. The more consumers give in and pay for the safe return of their data, the further encouraged ransomware criminals become to continue this practice of extortion.

If I haven’t said it enough already, I will say it again. Prevention is key. Know how ransomware reaches your computer. Be especially careful of email attachments, word documents with macro code, and malicious advertisements. Always keep the software on your computer up to date. It is especially important to ensure that OS, browsers such as Flash Player, Adobe Reader, and Java are always updated when available. Unless you have verified the senders, never enable the execution of macros in documents. Finally and most importantly, perform daily activities from a limited user account rather than an administrative one. And always, always, utilize a well running and up to date antivirus program.

If you would like to educate yourself in more detail about material presented in this blog post please visit:

http://www.pcworld.com/article/3041001/security/five-things-you-need-to-know-about-ransomware.html

Database Administration Challenges – DBMS Technology – Database Management | BVA INC. emPowering Your IT

Screen Shot 2014-08-26 at 5.24.43 PMToday, all enterprises depend on DBMS technology to store their critical business data. Databases support mission- critical data for banks, hospitals, airlines, defense agencies, schools, retailers, and other industries. Every new database that an organization deploys puts pressure on IT to ensure its availability, integration, security, reliability, and quality. Managing databases with fewer people has always been a challenge, but with databases scaling to terabytes and petabytes, these challenges have grown more acute. Being able to find the correct people via staffing is crucial in keeping your databases within control and manageable. Some of the other challendges that most organizations are experieincing are as followed:

  • Delivering improved performance
  • Lack of staff resources
  • Data integration issues
  • High data volume growth

Googledrive vs Skydrive – Cloud Storage

There are A LOT of cloud storage options available today. How do you pick the one that is right for you? I have tested a variety and have come the conclusion, at least for me that Skydrive and Google Drive are the best on the market.

Skydrive offers your 7GB free storage, where Google drive offers you 5GB. Now Skydrive is a Microsoft application that can link to your Windows Live account which links to your many of your Microsoft apps. Google drive links to your gmail account and integrates well with linking everything to that account.

Skydrive: free space is 7gb, file size limit is 2gb, there are various premium pricing available

Google Drive: 5GB free space, 10GB file size limit, Premium pricing is $60/year for 100GB.

Bottom line, they are both great, just depends on the amount of data you plan to use. Each allows you the capability to share your data with other users.

Using Windows to Back Up and Restore Exchange Data

Microsoft Exchange Server 2013 comes equiped with a plug-in so users can back up and restore your Exchange databases. For all of the tips, tricks, and how-to’s please visit Microsoft’s link here. This plug-in allows users to enable Windows Server Backup to create the Exchange-aware VSS backups. Do you still have Exchange 2010? Not to worry, they will explain the steps for the 2010 version as well.

Symantec Introduces Backup Exec 3600 Appliance

Symantec has recently release a backup exec appliance called the Symantec Backup Exec 3600 Appliance.  Here are some specifications.

  • It is an all-in-one solution pre-packaged with Backup Exec 2010
  • Includes 5.5 TB of useable disk space.
  • Unlimited software licensing to protect 5.5 TB of disk storage.
  • You can protect an unlimited number of servers and applications both physical and virtual.
  • Web based management console.
  • It includes RAID 5 data drives, mirrored SSDs for the OS, redundant power supplies and battery backup on the RAID controller.

I have yet to first hand see this product in action but it does sound like a pretty neat little box. This appears to me to be a more enterprise level backup solution as the price tag MSRP is around $25,000 dollars, but it packs quite a punch for such a small device.

I tried to demo this but Symantec will not actually send you a demo product. I probably wouldn’t either for the cost of one of the devices.

Form Factor 1U
CPU Quad Intel Xeon 2.4 Ghz CPU
Memory 16GB DDR RAM
OS Windows 2008 R2 Embedded
Security OS Hardened At Factory with Symantec Critical System Protection
Data Storage 2 X 40GB SSD Disks for OS (RAID 1)
4 X 2 TB SATA Disks (RAID 5)
5.5TB of Useable Deduplication Storage Capacity
Disk Management Onboard Hardware RAID 5 controller
I/O One 1Gb Ethernet port (1 additional port dedicated for Appliance Management)
Other I/O Ports One FE management network port / Two USB 2.0 ports

Personal Cloud: WD My Book Live

Backup, backup, backup. Most of us rely on our computing technology for our work, home, and play to keep our data easily accessible. We’ve all experienced it, we’re working and all of a sudden our computer crashes, the hard drive goes bad, or the files we need becomes corrupted and guess what? There’s no backup! What do to now besides cry? We at BVA believe keeping a backup, whether daily or weekly is very important because you never know when something will go wrong. There are all kinds of backup solutions out there for businesses, from tape, disk, or even in the cloud. But not only do businesses need to keep backing up their files, but we as individuals with our personal data should keep backups. I backup my hard drive daily so that I always have the ability to back and grab a file, maybe I changed something and realized I need the original, or the disk I had a file on goes bad and I need to grab a different copy. I just found this new hard drive from Western Digital called My Book Live – WD 2go. This is Western Digital personal cloud storage device that gives you your own cloud hard drive so you can access your data where ever you are. Usually when we talk about cloud storage we generally refer to a service you purchase from some company and they store your data somewhere at their datacenter. With this new Western Digital device you can have your own personal 3TB of storage. The device rest on your personal network and you can access it anywhere. The WD 2go has fee-free remote access to your My Book Live to your computer. Another cool feature are the apps you can install on your smartphone or tablet that will give you access to your files stored on your My Book Live as well. So wherever you go, your files are just a click away.

Unlimited Backup!

Backup’s are extremely critical for individuals and organizations to have in place. One solution I’ve found to be not only extremely cheap and affordable for any user, but also extremely safe and reliable is known as BackBlaze, a $4 dollar per month service that provides unlimited storage, end to end encryption, and integrates seamlessly with both mac and window’s based environments. Not only is this solution a great for anyone, it’s also extremely easy to use and setup, accessible anywhere through their easy to use website, and automatically keep’s itself in sync providing you reports of job success’s and failure’s.

Features Include:

  • Unlimited Storage
  • External Drive Support
  • Military-Grade Encryption
  • Continuous Backup
  • Automatically Finds Files
  • Automatic Throttle
  • Locate Computer
  • Free Web Restore
  • Restore to USB Hard Drive
  • Restore to Flash Drive
  • File versioning
  • 11 Languages

Enough Security

A long time ago I set up a home router/firewall for a friend of my wife. I set up an antivirus program and local firewalling. I have not heard anything about this in years.

Last night my wife passed on a message. The friend, now widowed, has moved in with relatives. She took her computer with her and successfully hooked it up to an existing home network for Internet access. Her question for me: “I brought all my stuff with me – do I have enough security?”

I had to stop and think for a moment to even recall what she had back then. I have absolutely no knowledge of what she has now. The Internet connection is pre-existing, so she probably did not connect up her router/firewall appliance. That leaves whatever antivirus she currently has and any local firewall settings, in addition to whatever security is already in place in the local router.

Thinking about this, I’d suspect that her current security is probably about the same as her former security – something I have not examined in years. I have no idea if her antivirus is current, or has been updated, or even if it was disabled or removed as inconvenient. So let’s think about what should be in place for “enough security”. Bear in mind that this is for a home user – put the principles are not that different. In most cases it’s just a matter of degree.

1.) Physical Security – Is the computer physically protected? In danger form flooded toilets or sinks, in a stable location that won’t cause it to fall if a pet gets too close, and not readily visible to passing thieves? Is the electrical power source protected by a surge suppressor, and is there an uninterruptible power supply (UPS)?

2.) Intrusion Prevention – Does she have a current antivirus program? Is she firewalled, at the Internet connection or her local computer or both? Does she have any kind of malware protection or cleaning tools? Are any hard drives encrypted, and does she need that? If the network connection includes Wireless, is the WiFi connection secured and encrypted? How well?

3.) Disaster Recovery – Is her data being backed up in some fashion, in case something does happen to her computer? Does she have recovery media for her operating system and her applications? Is there any kind of warranty support on her computer?

Every system and setup will be a little different, and the owner’s needs may vary a bit, but these are the questions I would keep in mind if I wanted to know if my system is secure enough.