They Call It Stormy Monday
|
|
- Gerard Harrington
- 5 years ago
- Views:
Transcription
1 ANALYST BRIEF They Call It Stormy Monday MOVE TO THE CLOUD REQUIRES FULL LIFE CYCLE MANAGEMENT Author Rob Ayoub Overview The revelation on September 17, 2013 that the cloud storage company Nirvanix would shut down within two weeks brought into the spotlight the potential pitfalls of cloud- based services. While the long- term effects of the closure have yet to be determined, immediate focus has been on backup and transition strategies for cloud services. Unfortunately, this is just one component of the product life cycle that has been disregarded as organizations shift customer relationship management systems, content, and other applications to the cloud. The reality of the cloud services market is that companies will fail, services will change, and innovation will occur that could undermine an entire organization s cloud strategy. Organizations must plan beyond the initial move to the cloud and must develop roadmaps and contingency planning that not only evaluate worst- case disaster scenarios, but also consider the implications of switching cloud providers in the event that a superior service emerges.
2 NSS Labs Findings Cloud storage prices continue to decline, and this is intensifying competition between large and small providers. Large public cloud providers such as Amazon, Google, and Microsoft have the resources to use storage and other cloud components as loss leaders in order to drive new business, leaving smaller cloud vendors in a difficult predicament. Up to this point, many organizations have evaluated the move to the cloud on the basis of cost savings but have ignored the costs surrounding switching vendors or disaster recovery. The hidden costs of moving functions to the cloud are significantly greater than simply storing data in the cloud. Customers increasingly are more reliant on the cloud provider s user interface and business logic for their operations, which makes planning for disaster recovery more difficult. Many other cloud vendors are using the failure of Nirvanix to promote their own services, promoting backup and additional features. NSS Labs Recommendations Critically assess the health of the provider, the risk to the business, and the disaster recovery options for each function to be outsourced to the cloud. Incorporate contingency planning for cloud- based services into disaster recovery plans. Evaluate risk to the organization s business as if service level agreements (SLAs) do not exist, since they will have little to no relevance should the service provider go out of business. Investigate alternate service providers and set up pilot programs to evaluate new technologies. 2
3 Table of Contents Overview... 1 NSS Labs Findings... 2 NSS Labs Recommendations... 2 Analysis... 4 The Cloud Is A Bullet, Just Not A Silver One... 4 Outsourcing Will Fail... 4 Innovation Will Occur... 5 Business Requirements Will Change... 5 Competition Will Drive Price And Technology Improvements... 5 Additional Total Cost of Ownership (TCO) Considerations... 6 Reading List... 7 Contact Information
4 Analysis The abrupt shutdown of Nirvanix left customers scrambling to secure their data and select an alternate provider. That an outsourced provider has failed is not news; if anything, the failure of Nirvanix illustrates that cloud providers are just as likely to fail as any other business. Media focus has been on the lack of options customers face as well as on the surprise that a company with large customers could fail both IBM and Dell had agreements with Nirvanix. The idea that any business is immune from failure is a fallacy, but sensible risk and disaster planning could have mitigated the damages. The Nirvanix closure draws attention to the failure of most organizations to carefully consider service alternatives when relying on the cloud for data storage and the hosting of applications. The Cloud Is A Bullet, Just Not A Silver One Public cloud infrastructure is a burgeoning market; industry sources indicate that the public cloud market is growing at an annual rate of well over 30 percent. Total market size is in excess of USD $6 billion for infrastructure as a service (IaaS), platform as a service (PaaS), and hosted software components alone, excluding services that have exponentially greater revenue potential. The advantages of using the public cloud are well documented, but many organizations have brushed aside the proper risk management that is essential to consider when moving services to the cloud. The general market attitude appears to be that large vendors, such as Amazon and Microsoft, can not go out of business; however, as the Nirvanix closure shows, even companies of moderate financial strength can quickly and unexpectedly shut their doors (Nirvanix received USD $70 million in funding with USD $25 million coming in May 2012). In addition to the risk factors associated with using a single cloud provider, there are several other compelling reasons why organizations should consider multiple providers for any outsourced service. In a world where business agility is crucial and where lack of innovation has caused the decline or demise of many companies (for example, Blackberry) it is critical that organizations considering cloud- based services continually monitor the overall market for new technologies and services that will propel their businesses forward. Outsourcing Will Fail Although outsourcing failures usually are not publicized, primarily because of the fear of negative publicity, they nevertheless do occur. Where large outsourcing failures are part of the public record, their damaging effects are evident. In 2004, for example, Electronic Data Systems (EDS) wrote down USD $559 million after delays and problems associated with a contract with the US Navy. 1 More recently, companies such as Netflix, 2 Reddit, and others 3 have suffered outages affecting their entire businesses for hours at a time, in spite of their reliance on the Amazon platform. Ultimately, an organization must be responsible for its own brand and no outsourced provider amazon- outage- shows- any- company- can- fail/ /amazon- cloud- outage- impacts- reddit- airbnb- flipboard/ 4
5 should be expected to protect that brand more than the organization itself. When outsourcing fails, be it a corporate function, or be it cloud- based infrastructure, the organization will suffer the consequences. Innovation Will Occur Another important consideration when outsourcing services is to predict the likelihood of a new technology or hosted service emerging that might significantly improve the service offering. Organizations should have proper methodology in place to evaluate new services along with a plan to transfer data should it become necessary to detach from a service provider. Consistent evaluation and benchmarking of new services against the current service will allow organizations to better understand the hosted service and can show any signs of trouble early. Business Requirements Will Change It is important to evaluate the current service, not only to stay abreast of competitors, but also because business requirements will change over time. Consider, for example, the evolution of web content hosting: an organization that relies on a third- party provider may begin by hosting exclusively with static storage, but as the business expands, its web site may require a more dynamic platform, for which assorted specialized vendors exist. Throughout its evolution, the organization should consider not only current provider options but also the options of insourcing or of changing providers. Competition Will Drive Price And Technology Improvements Just as end user business will evolve, so will the service providers. For example, within the current market, storage appears to be the loss leader for the largest cloud providers. Amazon and Microsoft both offer storage for pennies per gigabyte. Many smaller cloud providers have difficulties competing against such offers; thus, in order to stay competitive, smaller providers will have to specialize by, for example, tailoring their service offerings to specific verticals. Organizations should continually consider multiple options based on their current needs. 5
6 Additional Total Cost of Ownership (TCO) Considerations Organizations that currently have cloud- based services or that are considering outsourcing any component of their IT infrastructure must consider the additional costs associated with making appropriate preparations for potential failures. Figure 1 catalogs the factors that add to the TCO of any cloud component (be it infrastructure or a hosted service) and that therefore must be considered during evaluation of such services. Of themselves, these may not be time- consuming, but together they can significantly increase the cost of the cloud deployment. In the case of Nirvanix, organizations with a secondary provider in place would have been much more prepared for the shutdown, but also would already have been aware of the additional costs. For many organizations, there will be information technology (IT) components that can be outsourced for cost savings or improvements in efficiency. Ultimately, however, there are mission critical components that simply should remain in house. Task Frequency Additional Costs Audit existing outsourced services and assign criticality Quarterly to semi- annually Medium Benchmark current outsourced providers Quarterly Medium Develop risk scoring for outsourced providers Meet with business leaders to keep abreast of changing needs Monitor for independent cloud deployments within the organization Quarterly Quarterly Weekly Medium Low Low Pilot new/backup services Monthly quarterly Medium to high Plan for a total data and service transition Test annually, reviewed quarterly Medium to high Train business leaders on available services and options for expansion Quarterly to annually Low Figure 1 Additional Tasks That Increase Total Cost of Ownership 6
7 Reading List The Enterprise Security Landscape Is Changing. NSS Labs security- landscape- changing Is Cloud Security Best Fit For Your Organization? NSS Labs security- best- fit- your- organization 7
8 Contact Information NSS Labs, Inc. 206 Wild Basin Rd Building A, Suite 200 Austin, TX USA +1 (512) This analyst brief was produced as part of NSS Labs independent testing information services. Leading products were tested at no cost to the vendor, and NSS Labs received no vendor funding to produce this analyst brief NSS Labs, Inc. All rights reserved. No part of this publication may be reproduced, photocopied, stored on a retrieval system, or transmitted without the express written consent of the authors. Please note that access to or use of this report is conditioned on the following: 1. The information in this report is subject to change by NSS Labs without notice. 2. The information in this report is believed by NSS Labs to be accurate and reliable at the time of publication, but is not guaranteed. All use of and reliance on this report are at the reader s sole risk. NSS Labs is not liable or responsible for any damages, losses, or expenses arising from any error or omission in this report. 3. NO WARRANTIES, EXPRESS OR IMPLIED ARE GIVEN BY NSS LABS. ALL IMPLIED WARRANTIES, INCLUDING IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, AND NON- INFRINGEMENT ARE DISCLAIMED AND EXCLUDED BY NSS LABS. IN NO EVENT SHALL NSS LABS BE LIABLE FOR ANY CONSEQUENTIAL, INCIDENTAL OR INDIRECT DAMAGES, OR FOR ANY LOSS OF PROFIT, REVENUE, DATA, COMPUTER PROGRAMS, OR OTHER ASSETS, EVEN IF ADVISED OF THE POSSIBILITY THEREOF. 4. This report does not constitute an endorsement, recommendation, or guarantee of any of the products (hardware or software) tested or the hardware and software used in testing the products. The testing does not guarantee that there are no errors or defects in the products or that the products will meet the reader s expectations, requirements, needs, or specifications, or that they will operate without interruption. 5. This report does not imply any endorsement, sponsorship, affiliation, or verification by or with any organizations mentioned in this report. 6. All trademarks, service marks, and trade names used in this report are the trademarks, service marks, and trade names of their respective owners. 8
Maturing VARs Offer New Outsourcing Option
ANALYST BRIEF Maturing VARs Offer New Outsourcing Option VALUE- ADDED RESELLERS SHIFT TO OFFERING MANAGED SECURITY SERVICES Author Rob Ayoub Overview Security equipment vendors have found managed security
More informationNEXT GENERATION FIREWALL. Tested Products. Environment. SonicWall Security Value Map (SVM) JULY 11, 2017 Author Thomas Skybakmoen
NEXT GENERATION FIREWALL SonicWall Security Value Map (SVM) JULY 11, 2017 Author Thomas Skybakmoen Tested Products NGFW Group Test: SonicWall NSA 6600 SonicOS Enhanced 6.2.5.10-70n Dynamic signature database
More informationBREACH DETECTION SYSTEMS COMPARATIVE ANALYSIS
BREACH DETECTION SYSTEMS COMPARATIVE ANALYSIS Security Thomas Skybakmoen, Jason Pappalexis Tested Products AhnLab MDS Fidelis XPS Direct 1000 FireEye Web MPS 4310 and Email MPS 5300 Fortinet FortiSandbox
More informationADVANCED ENDPOINT PROTECTION COMPARATIVE REPORT
ADVANCED ENDPOINT PROTECTION COMPARATIVE REPORT Total Cost of Ownership () MARCH 10, 2017 Authors Jason Brvenik, Thomas Skybakmoen, Morgan Dhanraj Tested Products Carbon Black Cb Protection v7.2.3.3106
More informationCONSUMER EPP COMPARATIVE ANALYSIS
CONSUMER EPP COMPARATIVE ANALYSIS Socially Engineered Malware Randy Abrams, Jayendra Pathak, Mohamed Saher, Ahmed Garhy Tested Vendors AVG, F- Secure, Kaspersky, McAfee, Microsoft, Symantec, Trend Micro
More informationWEB APPLICATION FIREWALL COMPARATIVE ANALYSIS
WEB APPLICATION FIREWALL COMPARATIVE ANALYSIS Performance Author Thomas Skybakmoen Tested Products Barracuda Networks Web Application Firewall 960 Citrix NetScaler AppFirewall MPX 11520 Fortinet FortiWeb
More informationENTERPRISE ENDPOINT COMPARATIVE REPORT
ENTERPRISE ENDPOINT COMPARATIVE REPORT SECURITY STACK: EXPLOITS Authors Randy Abrams, Thomas Skybakmoen Tested Products Bitdefender Endpoint Security v5.3 ESET Endpoint Antivirus v6.1 Fortinet FortiClient
More informationADVANCED ENDPOINT PROTECTION TEST REPORT
ADVANCED ENDPOINT PROTECTION TEST REPORT SentinelOne Endpoint Protection Platform v1.8.3#31 FEBRUARY 14, 2017 Authors Thomas Skybakmoen, Morgan Dhanraj Overview NSS Labs performed an independent test of
More informationNEXT GENERATION FIREWALL COMPARATIVE REPORT
NEXT GENERATION FIREWALL COMPARATIVE REPORT Security Value Map (SVM) Authors Thomas Skybakmoen, Christopher Conrad Tested Products Barracuda Networks F600.E20 v6.1.1-071 Check Point Software Technologies
More informationDATA CENTER IPS COMPARATIVE ANALYSIS
DATA CENTER IPS COMPARATIVE ANALYSIS Performance 2014 Jason Pappalexis, Thomas Skybakmoen Tested Products Fortinet FortiGate 5140B, Juniper SRX 5800, McAfee NS- 9300, Sourcefire 8290-2 Overview Implementation
More informationTHREAT ISOLATION TECHNOLOGY PRODUCT ANALYSIS
THREAT ISOLATION TECHNOLOGY PRODUCT ANALYSIS v1.1.0.3568 2013 Jayendra Pathak, Ken Baylor, Ph.D Overview NSS Labs performed an independent test of the 1.1.0.3568 threat isolation technology. The product
More informationTEST METHODOLOGY. SSL/TLS Performance. v1.0
TEST METHODOLOGY SSL/TLS Performance v1.0 Table of Contents 1 Introduction... 3 1.1 The Need for SSL/TLS Performance Testing... 3 1.2 About This Test Methodology... 3 1.3 Inclusion Criteria... 3 2 SSL/TLS
More informationQuick Start Guide for Administrators and Operators Cyber Advanced Warning System
NSS Labs Quick Start Guide for Administrators and Operators Cyber Advanced Warning System Introduction to the Cyber Advanced Warning System and RiskViewer... 1 Activating Your Account... 2 Adding a New
More informationBREACH DETECTION SYSTEM PRODUCT ANALYSIS
BREACH DETECTION SYSTEM PRODUCT ANALYSIS Sourcefire (Cisco) Advanced Malware Protection 1 v4.5.2 Bhaarath Venkateswaran, Jayendra Pathak, Ahmed Garhy, Ryan Liles 1 Sourcefire is now part of Cisco. Overview
More informationDBAM Systems EP60 Test Executive Summary
Test Executive Summary A Broadband-Testing Report First published February 2007 (V1.0) Published by Broadband-Testing La Calade, 11700 Moux, Aude, France Tel : +33 (0)4 68 43 99 70 Fax : +33 (0)4 68 43
More informationMarket Analysis. Overview 2013 INTRUSION PREVENTION SYSTEMS. Authors: Rob Ayoub, Andrew Braunberg, Jason Pappalexis
Market Analysis 2013 INTRUSION PREVENTION SYSTEMS Authors: Rob Ayoub, Andrew Braunberg, Jason Pappalexis Overview Prior to 2013, the intrusion prevention system (IPS) market was viewed as heading towards
More informationKemp Technologies LM-3600 IPv4 and IPv6 Performance Report
Kemp Technologies LM-3600 IPv4 and IPv6 Performance Report A Broadband-Testing Report By Steve Broadhead, Founder & Director, BB-T First published April 2012 (V1.0) Published by Broadband-Testing A division
More informationUsing Self-Protecting Storage to Lower Backup TCO
Economic Insight Paper Using Self-Protecting Storage to Lower Backup TCO A TCO comparison of NetApp s integrated data protection solution vs. a traditional backup to an external PBBA By John Webster, Sr.
More informationMoving From Reactive to Proactive Storage Management with an On-demand Cloud Solution
Moving From Reactive to Proactive Storage Management with an On-demand Cloud Solution The Ever-Present Storage Management Conundrum In the modern IT landscape, the storage management conundrum is as familiar
More informationBusiness Benefits of Policy Based Data De-Duplication Data Footprint Reduction with Quality of Service (QoS) for Data Protection
Data Footprint Reduction with Quality of Service (QoS) for Data Protection By Greg Schulz Founder and Senior Analyst, the StorageIO Group Author The Green and Virtual Data Center (Auerbach) October 28th,
More informationManagement Update: Storage Management TCO Considerations
IGG-09172003-01 C. Stanley Article 17 September 2003 Management Update: Storage Management TCO Considerations CIOs, asset managers, data center managers and business managers should be aware of the total
More informationDBMS Software Market Forecast, (Executive Summary) Executive Summary
DBMS Software Market Forecast, 2003-2007 (Executive Summary) Executive Summary Publication Date: 4 September 2003 Author Colleen Graham This document has been published to the following Marketplace codes:
More informationHYCU SCOM Management Pack for F5 BIG-IP
HYCU SCOM Management Pack for F5 BIG-IP Product version: 5.3 Product release date: March 2018 Document edition: Second Legal notices Copyright notice 2015-2018 HYCU. All rights reserved. This document
More informationCOMPTIA CLO-001 EXAM QUESTIONS & ANSWERS
COMPTIA CLO-001 EXAM QUESTIONS & ANSWERS Number: CLO-001 Passing Score: 800 Time Limit: 120 min File Version: 39.7 http://www.gratisexam.com/ COMPTIA CLO-001 EXAM QUESTIONS & ANSWERS Exam Name: CompTIA
More informationThe case for cloud-based data backup
IBM Global Technology Services IBM SmartCloud IBM Managed Backupi The case for cloud-based data backup IBM SmartCloud Managed Backup offers significant improvement over traditional data backup methods
More informationCONSUMER AV / EPP COMPARATIVE ANALYSIS
CONSUMER AV / EPP COMPARATIVE ANALYSIS Exploits Evasion Defenses 2012 Randy Abrams, Nathan Taylor Tested Vendors Avast, AVG, Avira, ESET, F- Secure, Kaspersky, McAfee, Microsoft, Norman, Norton, Panda,
More informationOCTOSHAPE SDK AND CLIENT LICENSE AGREEMENT (SCLA)
OCTOSHAPE SDK AND CLIENT LICENSE AGREEMENT (SCLA) This is a License Agreement (the "Agreement") for certain code (the Software ) owned by Akamai Technologies, Inc. ( Akamai ) that is useful in connection
More information2018 Trends in Hosting & Cloud Managed Services
PREVIEW 2018 Trends in Hosting & Cloud Managed Services DEC 2017 Rory Duncan, Research Director, Managed Services & Hosting Penny Jones, Principal Analyst - MTDC & Managed Services Aaron Sherrill, Senior
More informationGain Control Over Your Cloud Use with Cisco Cloud Consumption Professional Services
Solution Overview Gain Control Over Your Cloud Use with Cisco Cloud Consumption Professional Services OPTIMIZE YOUR CLOUD SERVICES TO DRIVE BETTER BUSINESS OUTCOMES Reduce Cloud Business Risks and Costs
More informationFuture of the Data Center
Future of the Data Center Maine Digital Government Summit November 29, 2012 Dan Diltz Vice President, Public Sector 1 Session Description A new data center is the perfect opportunity to start fresh by
More informationA Model for Resilience
A Model for Resilience THREE STEPS TO CREATING A RESILIENT, CHANGE-READY ENTERPRISE Business resilience is the ability to anticipate risk, mitigate the impact and move forward with confidence as you transform
More informationTEST METHODOLOGY. Virtual Firewall. v2.1 MARCH 13, 2017
TEST METHODOLOGY Virtual Firewall MARCH 13, 2017 v2.1 Table of Contents 1 Introduction... 4 1.1 The Need for Virtual Firewalls... 4 1.2 About This Test Methodology... 4 1.3 Inclusion Criteria... 5 2 Product
More informationCognizant Cloud Security Solution
CLOUD SECURITY OVERVIEW Cognizant Cloud Security Solution Transform your security operation to protect your business across public and hybrid cloud environments. December 2017 The advantages of moving
More informationCompany presentation Transition and Transformation
Company presentation Transition and Transformation FORNEBU 7 DECEMBER 2017 CFO HENRIK SCHIBLER EVRY PUBLIC The IBM Partnership offers accelerated transformation of operations, delivering increased flexibility
More informationHigh Availability For Private Clouds
High Availability For Private Clouds Executive Summary When moving from traditional IT to private cloud, there is generally a tradeoff between elasticity and availability, so only applications that do
More informationFinding Pure-Play Midtier ESPs: A Two-Step Process
Research Brief Finding Pure-Play Midtier ESPs: A Two-Step Process Abstract: The pure-play midtier consulting and integration sector can be a competitive option to global integrators. Tier 2 and 3 vendors
More informationData Protection for Virtualized Environments
Technology Insight Paper Data Protection for Virtualized Environments IBM Spectrum Protect Plus Delivers a Modern Approach By Steve Scully, Sr. Analyst February 2018 Modern Data Protection for Virtualized
More informationMySQL CLOUD SERVICE. Propel Innovation and Time-to-Market
MySQL CLOUD SERVICE Propel Innovation and Time-to-Market The #1 open source database in Oracle. Looking to drive digital transformation initiatives and deliver new modern applications? Oracle MySQL Service
More informationORACLE SERVICES FOR APPLICATION MIGRATIONS TO ORACLE HARDWARE INFRASTRUCTURES
ORACLE SERVICES FOR APPLICATION MIGRATIONS TO ORACLE HARDWARE INFRASTRUCTURES SERVICE, SUPPORT AND EXPERT GUIDANCE FOR THE MIGRATION AND IMPLEMENTATION OF YOUR ORACLE APPLICATIONS ON ORACLE INFRASTRUCTURE
More informationSymantec Data Center Transformation
Symantec Data Center Transformation A holistic framework for IT evolution As enterprises become increasingly dependent on information technology, the complexity, cost, and performance of IT environments
More informationSwedish bank overcomes regulatory hurdles and embraces the cloud to foster innovation
Think Cloud Compliance Case Study Swedish bank overcomes regulatory hurdles and embraces the cloud to foster innovation Customer details : Collector Bank - Sweden 329 employees www.collector.se/en Banking
More informationAbstract. Introduction
Four Steps Toward Planning a Successful Email Migration How MessageStats Can Help You Understand and Clean Up Your Source Environment to Simplify Your Move Written by Joel Blaiberg, Dell Software Abstract
More informationIT S NOT ABOUT THE 98 PERCENT YOU CATCH, IT S ABOUT THE 2 PERCENT YOU MISS.
ANALYST BRIEF Cyber Resilience IT S NOT ABOUT THE 98 PERCENT YOU CATCH, IT S ABOUT THE 2 PERCENT YOU MISS. Authors Bob Walder, Chris Morales Overview Where the goal of cyberprevention has been to reduce
More information2017 Trends in Datacenter and Critical Infrastructure
PREVIEW 2017 Trends in Datacenter and Critical Infrastructure DEC 2016 Rhonda Ascierto, Research Director, Datacenter Technologies & Eco-Efficient IT Andy Lawrence, Research Vice President - Datacenter
More informationVirtuozzo Hyperconverged Platform Uses Intel Optane SSDs to Accelerate Performance for Containers and VMs
Solution brief Software-Defined Data Center (SDDC) Hyperconverged Platforms Virtuozzo Hyperconverged Platform Uses Intel Optane SSDs to Accelerate Performance for Containers and VMs Virtuozzo benchmark
More informationHow to Show Grouping in Scatterplots using Statistica
How to Show Grouping in Scatterplots using Statistica Written by Dell Software Introduction A scatterplot shows the relationship between continuous variables. Showing a grouping factor in the plot adds
More informationISO27001:2013 The New Standard Revised Edition
ECSC UNRESTRICTED ISO27001:2013 The New Standard Revised Edition +44 (0) 1274 736223 consulting@ecsc.co.uk www.ecsc.co.uk A Blue Paper from Page 1 of 14 Version 1_00 Date: 27 January 2014 For more information
More informationRelease Information. Revision History. Version: build 018 Release Date: 23 rd November 2011
Version: 02.00.2 build 018 Release Date: 23 rd November 2011 Release Date Version 02.00.2 Build 018 23 rd November 2011 Release Information Release Type: General Availability Supported Cyberoam Versions:
More informationJOHNS HOPKINS ARAMCO HEALTHCARE MYCHART. Terms and Conditions
JOHNS HOPKINS ARAMCO HEALTHCARE MYCHART Terms and Conditions Johns Hopkins Aramco Healthcare MyChart ( JHAH MyChart ) is an Internet application that enables patients and/or their proxies to have secure
More informationNC Education Cloud Feasibility Report
1 NC Education Cloud Feasibility Report 1. Problem Definition and rationale North Carolina districts are generally ill-equipped to manage production server infrastructure. Server infrastructure is most
More informationCompTIA Cloud Essentials Certification Exam Objectives EXAM NUMBER: CLO-001
CompTIA Cloud Essentials Certification Exam Objectives EXAM NUMBER: CLO-001 1 About the Exam The CompTIA Cloud Essentials certification exam is a vendor-neutral technical qualification. The exam is relevant
More informationNORTH CAROLINA NC MRITE. Nominating Category: Enterprise IT Management Initiatives
NORTH CAROLINA MANAGING RISK IN THE INFORMATION TECHNOLOGY ENTERPRISE NC MRITE Nominating Category: Nominator: Ann V. Garrett Chief Security and Risk Officer State of North Carolina Office of Information
More informationSmart Data Center From Hitachi Vantara: Transform to an Agile, Learning Data Center
Smart Data Center From Hitachi Vantara: Transform to an Agile, Learning Data Center Leverage Analytics To Protect and Optimize Your Business Infrastructure SOLUTION PROFILE Managing a data center and the
More informationPRIVATE MOBILE CONNECTION (formerly COMMERCIAL CONNECTIVITY SERVICE (CCS)) CUSTOM APN ATTACHMENT
PRIVATE MOBILE CONNECTION (formerly COMMERCIAL CONNECTIVITY SERVICE (CCS)) CUSTOM APN ATTACHMENT Last Revised: 12/20/17 1. Private Mobile Connection - Custom APN. Pursuant to the terms and conditions of
More informationSUPPORT MATRIX. HYCU OMi Management Pack for Citrix
HYCU OMi Management Pack for Citrix : 2.0 Product release date: October 2017 Document release data: April 2018 Legal notices Copyright notice 2014-2018 HYCU. All rights reserved. This document contains
More informationHealthcare IT Modernization and the Adoption of Hybrid Cloud
Healthcare IT Modernization and the Adoption of Hybrid Cloud An IDC InfoBrief, Sponsored by VMware June 2018 Executive Summary The healthcare industry is facing unprecedented changes brought about by a
More informationHow Architecture Design Can Lower Hyperconverged Infrastructure (HCI) Total Cost of Ownership (TCO)
Economic Insight Paper How Architecture Design Can Lower Hyperconverged Infrastructure (HCI) Total Cost of Ownership (TCO) By Eric Slack, Sr. Analyst December 2017 Enabling you to make the best technology
More informationNetIQ's VoIP Management Products
Products, D. Neil Research Note 10 September 2002 NetIQ's VoIP Management Products NetIQ has announced its Voice over IP management strategy and has a number of pre- and post-implementation products available.
More informationCALSTRS ONLINE AGREEMENT TERMS AND CONDITIONS
CALSTRS ONLINE AGREEMENT TERMS AND CONDITIONS INTRODUCTION: Before the California State Teachers Retirement System (hereinafter "CalSTRS," "We," or "Us") will provide services found at mycalstrs.com (the
More informationThe following Terms and Conditions apply to the use of this Website, as well as all transactions conducted through the site.
The following Terms and Conditions apply to the use of this Website, as well as all transactions conducted through the site. Copyright All content appearing on this Web site is the property of: Osprey
More informationVirtualizing disaster recovery using cloud computing
IBM Global Technology Services Thought Leadership White Paper January 2013 Virtualizing disaster recovery using cloud computing Protect your applications quickly with a resilient cloud 2 Virtualizing disaster
More informationAccelerate Your Enterprise Private Cloud Initiative
Cisco Cloud Comprehensive, enterprise cloud enablement services help you realize a secure, agile, and highly automated infrastructure-as-a-service (IaaS) environment for cost-effective, rapid IT service
More informationVirtual Disaster Recovery
The Essentials Series: Managing Workloads in a Virtual Environment Virtual Disaster Recovery sponsored by by Jaime Halscott Vir tual Disaster Recovery... 1 Virtual Versus Physical Disaster Recovery...
More informationFuture Shifts in Enterprise Architecture Evolution. IPMA Marlyn Zelkowitz, SAP Industry Business Solutions May 22 nd, 2013
Future Shifts in Enterprise Architecture Evolution IPMA Marlyn Zelkowitz, SAP Industry Business Solutions May 22 nd, 2013 Agenda Terminology & Definitions Evolution to Cloud Cloud Adoption Appendix 2013
More informationChoosing the Right Deduplication Solution for Your Organization
Choosing the Right Deduplication Solution for Your Organization Application-based deduplication versus appliance-based deduplication Introduction Due to the significant data growth and extended retention
More informationOPTIMIZATION MAXIMIZING TELECOM AND NETWORK. The current state of enterprise optimization, best practices and considerations for improvement
MAXIMIZING TELECOM AND NETWORK OPTIMIZATION The current state of enterprise optimization, best practices and considerations for improvement AOTMP.com The Next Evolution of Telecom Management OVERVIEW As
More informationPolicies & Medical Disclaimer
Policies & Medical Disclaimer Money Back Guarantee Heather Woodruff Nutrition proudly stands behind its programs. To help you feel comfortable we offer a Money-Back Guarantee* If you are not absolutely
More informationThree Key Considerations for Your Public Cloud Infrastructure Strategy
GOING PUBLIC: Three Key Considerations for Your Public Cloud Infrastructure Strategy Steve Follin ISG WHITE PAPER 2018 Information Services Group, Inc. All Rights Reserved The Market Reality The race to
More informationThe Transition to Networked Storage
The Transition to Networked Storage Jim Metzler Ashton, Metzler & Associates Table of Contents 1.0 Executive Summary... 3 2.0 The Emergence of the Storage Area Network... 3 3.0 The Link Between Business
More informationMidsize Businesses Slowly Warm Up to Storage Services
Research Brief Midsize Businesses Slowly Warm Up to Storage Services Abstract: A recent study reveals only lukewarm demand for new storage services among midsize businesses. Assessment tools and peer references
More informationMDVR for the Blackberry
MDVR for the Blackberry Instructions www.openeye.net OpenEye BlackBerry MDVR Software Manual (Ver1.09) Manual Edition 30156AC SEPTEMBER 2011 2000-2011, OPENEYE All Rights Reserved. No part of this documentation
More informationCisco Start. IT solutions designed to propel your business
Cisco Start IT solutions designed to propel your business Small and medium-sized businesses (SMBs) typically have very limited resources to invest in new technologies. With every IT investment made, they
More informationCloud Transformation: Data center usage models driving Cloud computing innovation. Jake Smith, Advanced Server Technologies Data Center Group Intel
Cloud Transformation: Data center usage models driving Cloud computing innovation. Jake Smith, Advanced Server Technologies Data Center Group Intel Legal Disclaimer Intel may make changes to specifications
More informationFifteen Best Practices for a Successful Data Center Migration
Fifteen Best Practices for a Successful Data Center Migration Published: 6 March 2017 ID: G00324187 Analyst(s): Henrique Cecci Data center migrations are often complex and risky. These best practices will
More informationUnderstanding Virtual System Data Protection
Understanding Virtual System Data Protection Server virtualization is the most important new technology introduced in the data center in the past decade. It has changed the way we think about computing
More informationDeduplication: The hidden truth and what it may be costing you
Deduplication: The hidden truth and what it may be costing you Not all deduplication technologies are created equal. See why choosing the right one can save storage space by up to a factor of 10. By Adrian
More informationNEXT-GENERATION DATACENTER MANAGEMENT
NEXT-GENERATION DATACENTER MANAGEMENT From DCIM to DCSO Sometimes described as the operating or ERP system for the datacenter, datacenter infrastructure management (DCIM) is a technology that helps operators
More informationProtect Your Data At Every Point Possible. Reduce risk while controlling costs with Dell EMC and Intel #1 in data protection 1
Protect Your Data At Every Point Possible Reduce risk while controlling costs with Dell EMC and Intel #1 in data protection 1 Transform IT to protect your data in the digital era As the growth, mobility
More informationAugust Oracle - GoldenGate Statement of Direction
August 2015 Oracle - GoldenGate Statement of Direction Disclaimer This document in any form, software or printed matter, contains proprietary information that is the exclusive property of Oracle. Your
More informationHPE GO4SAP Getting Orchestrated for SAP Automate SAP Basis Management Enterprise-scale end-to-end
HPE GO4SAP Getting Orchestrated for SAP Automate SAP Basis Management Enterprise-scale end-to-end Automate enterprise-scale SAP Basis Management end-to-end SAP helps companies of all sizes and industries
More informationIntegration With the Business Modeler
Decision Framework, J. Duggan Research Note 11 September 2003 Evaluating OOA&D Functionality Criteria Looking at nine criteria will help you evaluate the functionality of object-oriented analysis and design
More informationA PRINCIPLED TECHNOLOGIES TEST REPORT DELL ACTIVE SYSTEM 800 WITH DELL OPENMANAGE POWER CENTER
DELL ACTIVE SYSTEM 800 WITH DELL OPENMANAGE POWER CENTER When building or expanding your data center, you need the ability to control energy resources and costs, and management of circuit density is essential.
More informationin collaboration with
in collaboration with Table of Contents 01 Turn Silos of Data into Operational Intelligence page 04 02 Gain a Competitive Advantage with Cisco and Splunk page 06 03 Improve Insight with IT Operations Analytics
More informationSUPPORT MATRIX. Comtrade OMi Management Pack for Citrix
Comtrade OMi Management Pack for Citrix : 2.0 Product release date: December 2016 Document release date: July 2017 Legal notices Copyright notice 2017 Comtrade Software. All rights reserved. This document
More informationMySonicWall Secure Upgrade Plus
June 2017 This guide describes how to upgrade a SonicWall or competitor appliance in MySonicWall using the Secure Upgrade Plus feature. Topics: About Secure Upgrade Plus Using Secure Upgrade Plus About
More informationSupporting the Cloud Transformation of Agencies across the Public Sector
SOLUTION SERVICES Supporting the Cloud Transformation of Agencies across the Public Sector BRIEF Digital transformation, aging IT infrastructure, the Modernizing Government Technology (MGT) Act, the Datacenter
More informationPredicts 2004: The Future of Windows Server
Strategic Planning, T. Bittman Research Note 19 November 2003 Predicts 2004: The Future of Windows Server In 2004, distributed manageability will emerge as the key to the future of Windows Server, especially
More informationOpen Source Cloud Platforms: OpenStack
Open Source Cloud Platforms: OpenStack This Market Monitor overview report on the OpenStack marketplace provides updated vendor estimates through Q3 2016. OpenStack, the open source cloud project, was
More informationTERMS & CONDITIONS. Complied with GDPR rules and regulation CONDITIONS OF USE PROPRIETARY RIGHTS AND ACCEPTABLE USE OF CONTENT
TERMS & CONDITIONS www.karnevalkings.com (the "Site") is a website and online service owned and operated by the ViisTek Media group of companies (collectively known as "Karnevalkings.com", "we," "group",
More informationWinnebago Industries, Inc. Privacy Policy
Winnebago Industries, Inc. Privacy Policy At Winnebago Industries, we are very sensitive to the privacy concerns of visitors to our websites. Though we do not obtain any personal information that individually
More informationIBM Algo Risk Content on Cloud
Service Description IBM Algo Risk Content on Cloud This Service Description describes the Cloud Service IBM provides to Client. Client means the contracting party and its authorized users and recipients
More informationOverview. Business value
PRODUCT SHEET CA Top Secret for z/vse CA Top Secret for z/vse CA Top Secret for z/vse provides innovative and comprehensive security for business transaction environments which enable your business to
More informationSOLUTION BRIEF RSA ARCHER IT & SECURITY RISK MANAGEMENT
RSA ARCHER IT & SECURITY RISK MANAGEMENT INTRODUCTION Organizations battle growing security challenges by building layer upon layer of defenses: firewalls, antivirus, intrusion prevention systems, intrusion
More informationTerms of Use. Changes. General Use.
Terms of Use THESE TERMS AND CONDITIONS (THE TERMS ) ARE A LEGAL CONTRACT BETWEEN YOU AND SPIN TRANSFER TECHNOLOGIES ( SPIN TRANSFER TECHNOLOGIES, STT, WE OR US ). THE TERMS EXPLAIN HOW YOU ARE PERMITTED
More informationExecutive Brief CHOOSING THE RIGHT MODEL FOR ENTERPRISE BACKUP & RECOVERY. The Executive Guide Q417-CON-10681
Executive Brief CHOOSING THE RIGHT MODEL FOR ENTERPRISE BACKUP & RECOVERY The Executive Guide Q417-CON-10681 Before You Begin Gartner predicts that 62 percent of organizations will deploy applications
More informationTECHNOLOGY BRIEF: CA ERWIN DATA PROFILER. Combining Data Profiling and Data Modeling for Better Data Quality
TECHNOLOGY BRIEF: CA ERWIN DATA PROFILER Combining Data Profiling and Data Modeling for Better Data Quality Table of Contents Executive Summary SECTION 1: CHALLENGE 2 Reducing the Cost and Risk of Data
More informationRouter and Switch Vendor Leadership
Router and Switch Vendor Leadership Service Provider Survey Excerpts 19 December 2017 Michael Howard Executive Director, Research and Analysis, Carrier Networks +1408.583.3351 Michael.Howard@ihsmarkit.com
More informationEfficient Data Center Virtualization Requires All-flash Storage
White Paper Efficient Data Center Virtualization Requires All-flash Storage By Scott Sinclair, Storage Analyst November 2015 This ESG White Paper was commissioned by Pure Storage and is distributed under
More informationEnd User License Agreement
End User License Agreement Kyocera International, Inc. ( Kyocera ) End User License Agreement. CAREFULLY READ THE FOLLOWING TERMS AND CONDITIONS ( AGREEMENT ) BEFORE USING OR OTHERWISE ACCESSING THE SOFTWARE
More informationEvaluator Group Inc. Executive Editor: Randy Kerns
Avoiding an Infrastructure Cost Explosion as You Move to Exchange 2010 Metalogix Archive Manager Evaluator Group Inc. Technology Insight Series Executive Editor: Randy Kerns Version 1: January 2012 Copyright
More information