All posts by Damien Garvey

Backup, Storage and Hardware Requirements when Considering SaaS

SaaS (software as a Service) is software delivery process that permits to access data from various devices by using web browser and Internet connection. SaaS is changing backup, storage, and hardware requirements. It is the job of software vendors to maintain codes, databases and servers that represent the application.

Hardware
In SaaS model, notable hardware changes occur in server closet. SaaS is given to customers running web browser and operating system to get access to required services. If your workers execute only one task by using web browser, IT is capable to scale back specifications of the computer. It is a bit risky as employees get help from various programs to carry on their job. Most of utilized programs need local resources like advanced graphics, processing power and storage. For instance, users select Autodesk and Adobe to design projects on desktop. Later on these projects are uploaded to cloud to carry on data analysis. What is more critical is massive file size that is troublesome to move even if clients have fast Internet connection.

Storage
It is often noticed that SaaS providers presume that companies are given cloud storage by default. IT professionals are well aware that data storage in the cloud is very practical, but it is not acceptable when companies need to store very sensitive information.

Google Docs and Gmail are the two options to signify how companies can store their information in the cloud. Gmail users believe that their contacts, calendars, and emails are stored in the cloud. On the other hand, Google Docs are synchronized between local drive and Google’s servers; therefore, it is not obvious where the document is actually being saved.

Here question arises, is it possible for SaaS customers to trim down storage on laptops and desktops by using small and fast SSDs? Answer is not definite. If customers are using a product with offline mode, they can save data in cloud as well as locally. Conversely, when office type docs are designed that require only small space, one can get away with a smaller local storage.

Backup
Hosting companies offer backups and maintenance to SaaS customers. What is important for customers is to get an idea of data type for backup and how frequently data will be used.

Backup keeps old data that is still important for the company and used for compliance. Businesses are required to comply and maintain data retention laws. It is highly important for public companies. Due to complicated nature of the compliance law, the industry has attracted a huge number of compliance professionals and lawyers, who are eager to help companies achieve their and are giving their data retention and security goals.

Millions of companies depend on SaaS providers to run applications. However, applications keep data saved in internal databases. Though it has extended the SaaS definition, it demonstrates the tremendous pressure that forces companies to keep sensitive information safe from data breaches.

It could be confusing for workers to move between local backup and online clouds while working on their workstations. Employees must know in detail where the data is present and how to get access to information. That is where the duty of SaaS providers gets started.

Significant Linux Backup Practices Helpful For Administrators

Linux is an operating system that is preferred for reliability, security and steadiness. However, like other operating systems, it has issues concerning data protection due to:

Electrical surge
IT data breaches
Fire
Failure of hardware
Physical theft
For Linux administrator, it is important to have online backup plan to avoid downtime and loss of important data, money and time.

Planning before Backup
Planning is crucial stage to check various sections of strategy in detail. Ask some questions to find out your requirements for backup plan, such as:

What type of data you need to have backup?
What kind of backup will support your system?
Do you need incremental of full data backup?
How often you need to access to stored data?

Automate Tools
There are backup utilities that need to use command line to perform work. SPX is specifically made for Linux that gives opportunity to administrators to check backup jobs and restore systems to virtual environment or hardware within a few minutes. This automation is helpful in executing management tasks when disaster recovery plan is activated.

Backup Storage Needs Investment
If you have an online backup plan, you will need to revise your strategy for storage. Though backup software can compress all files to increase storage space, storage practices require handling copies of files. If Linux box is connected to NAS appliance or hard drive, you can develop solid foundation.

How to Cover Security Challenges?
While selecting data for online backup, you must keep in mind all of the security threats. For data protection, you may need to have lock-in key. Linux provides Seahorse as encryption tool to manage passwords, create Secure Shell keys, and PGP keys to improve security features.

Protection of Backups
It is counter intuitive to keep backups onsite because disaster can ruin years of hard work in a short time. There are two options available for security perspective:

Remove & Transfer
DVDs and tape are inexpensive and removable media that can be used for backup. Save copies of important data by using local backups. It might be a bit difficult to transfer data and swap out media, however, it gives satisfaction as important files are kept offsite.

Network Transfer
Network transfer is one of the easiest ways for offsite backups when you have given access to a distant server. Time required for transferring process depends on backup size, however, the process is fast and just like uploading files. Recovery time is improved through network transfer as there is no need to find and use physical media.

Backups Assessment
It is suggested to check backup plans and strategies on regular basis in order to avoid catastrophe. Automation is perfect to skip monotonous processes. If there is information that is worthy to save on a tape, disc or server, it definitely needs to be checked up time and again.

Things to Consider While Re-purposing Workstations

You might be interested to re-purpose your workstations from time to time to get more RAM, up to date CPU, and more storage capacity. Is it logical to replace a few years old workstation even if it is working without hardware problems? Most of customers do not know exactly when they should re-purpose workstation. Here are some guidelines to check what type of computers can be used in a company and how to boost up performance.

Servers
In order to perform particular jobs, servers are usually configured with various components. NAS requires enough space for storage, whereas database server requires more RAM. These are tailored to perform particular tasks, therefore, it is complicated to re-purpose workstations.

If you have changed old SQL database server and selected new model for high performance, old database server can be used for finance or marketing department by making some minor changes. Storage and RAM are the two upgrades that are based on simple procedure, but can improve performance level.

Less valuable upgrades are related to RAID card and CPU. A few servers may have system for CPU upgrade; however, most of them need new motherboards, which means to upgrade PSU and RAM as well. If you need to boost up performance, instead of upgrading the motherboard, buy new system to meet your needs.

It is simple to install new RAID card; however, old servers do not offer sufficient cooling to keep this hot-running RAID cool. It is important to match RAID card with hard drives to get required performance. Many customers prefer to re-purpose server without changing hardware. They get required results by using software (like FreeNAS).

Workstations:
Just like servers, workstations need to configure to carry on various tasks. Case capacity of workstations gives great benefit when these are selected for re-purposing. Unlike rack server, it is much easier to improve performance of components in tower case. Increasing storage capacity through controller cards is much faster.

If you are interested to have more storage (for mechanical drives), make certain that there is enough cool air through the case. Usually heat is unnoticed as it is difficult to measure, but it damages computer hardware more frequently. Sensors are used in a lot of workstation boards to check level of heat.

Laptops
Nowadays, laptops are used as preferable system to work in most departments. Laptops do not offer re-purposing like desktops due to various reasons. First of all, laptops cannot work just like desktop computers. These are good to be used for designing PowerPoint slides, web browsing and email. You might be able to upgrade the laptop’s RAM and hard drive, otherwise, laptops are not easy to upgrade.

Conclusion
It is good to evaluate risks as well as benefits associated with re-purposing of computers. If your company has replaced old systems and you need to use them in other departments to save some money, keep in mind that IT experts will need time to arrange old these systems to work. Conversely, a new system can start working as soon as it is deployed. In addition, warranty is a compelling factor which leads to buying new systems, as laptops need frequent repair services.

Data Protection Strategies Important For MSPs

Protection of data is becoming one of the serious issues for MSPs. To provide maximum data protection to small and medium sized companies, service providers need to place security at top of the list. Due to new technologies, systems and devices, important data is vulnerable to serious threats. It is the need of the hour to create policies for the security of data to tackle such threats.

Inform Clients on Security Policies:
Many companies do not advertise managed security services, but it helps in providing information to clients for data protection policies. Select reliable source of publication for latest information. Check Twitter and LinkedIn to get an idea of latest trends. In case your clients are not well informed about your security policies, chances are they can find out from your competitors. As a result, clients will figure out how to get some IT solutions from your competitors.

Train Staff on Trending Security Threats:
New threats are coming into sight daily. To cope with such threats, companies need to educate their staff. Workers must have intimate information about Phishing scams, malicious mails, lateral attacks, and malware that start off through guest access.

Standardize IT Solutions:
To minimize the risk of data breaches, it is necessary to select only standardized technology solutions. A firm that is working with an enterprise-level PSA solutions can get maximum benefit by selecting standardized solutions. For example: access rules, liabilities, and planning for disaster recovery can be established by IT managers by selecting standardized apps. It has the ability to improve exposure, as well as response time whilst offering a medium to check performance level.

Avoid File Sharing Services?
Due to P2P technology, it is common to borrow applications and files. This feature gives way to data breaches. When file sharing services are used, it becomes difficult for users to avoid malicious code that get confidential information, as well as breach copyright ownership. Instead of avoiding such services, MSPs can demonstrate that they are following data protection policies to handle such situations:

– Inform clients what type of risks are linked with P2P and file sharing networks;
– Use firewall and perimeter network defense systems to block programs related to file sharing;
– Keep on observing the network to make certain that unofficial file sharing networks are not running;
– Have some restrictions where staff is permitted to save important data.

Plan for Patch Management:
Microsoft has fixed a particular date of each month for patch management. All recognized flaws are fixed at that particular date so that programs and operating systems work in a safe environment to give productive end results. In May 2015, about 46 vulnerabilities were noted* in Windows Server, Silverlight, SharePoint, Desktop Windows and Adobe’s Flash.

MSPs have thousands of software applications, and each of these software has gateways for intruders. In order to patch up such holes which lead towards data breaches, patch management technology is used to maintain security level. There are many companies that do not consider this tiresome process as important to execute each month. MSPs must have all-inclusive priority based strategies for patch management.

* – http://www.symantec.com/connect/blogs/microsoft-patch-tuesday-may-2015

Tips For Effective Backup & Recovery Testing

When a server cannot work properly due to hard drive failure, companies call recovery service providers to restore the equipment. Downtime creates problems for companies; therefore, they want to get an immediate support. If you are unable to find an appropriate way to handle downtime, the end users’ anger will mount and their trust on your capabilities will erode. There is something more important than simple backup and disaster recovery plan to stop such frustrating situations. In other words, take your time and test your ability to recover your data before you face your clients’ wrath. For an effective cloud backup as well as recovery testing, you must know the answer to all of the relevant questions. These questions help you in getting valid information for testing your strategy.

What are the Reasons to Test?
When a service provider signs an agreement with its client, on time services is considered crucial part of the agreement. To achieve RTOs, it is necessary to perform some testing. Through testing, you will get information on how fast you can recover. When processes related to recovery are already practiced, you do not feel any difficulty while executing them in real time environment. Moreover, testing develops confidence in clients, as they get surety you will recover easily.

What are the Required Equipments and Processes to Test?
Test cloud backup and local backup plan thoroughly. However, it is far from the possibility realm to do everything within a day. You must think about essential equipments that are suitable for this infrastructure. It is a fact, each failure is dissimilar to the other. You must have some priorities while selecting equipments to test.

How to Test?
Check whether it is possible to view functions of backup image through recovery of folder and file, or change the backup into virtual machine to confirm whether it will boot up to function just like actual VM. Procedure of testing is directly proportional to selection of equipment.

Who is Accountable for Recovery Plan and Backup Testing
A well managed cloud backup company will assign one of their employees to check who, when, why, and what of testing; as it is simple to find which clients have been ignored. Do not overlook any client; and make sure all equipments are tested systematically.

When Plan was Tested & When Will Tested in Future?
Getting into detail of disaster recovery plan needs to verify maintenance records and designing spreadsheet to check what, how and when was tested, who had tested and what were the end results. Keeping information of testing record and maintenance process is highly important; therefore, prepare documents cautiously concerning what is tested and what will be the strategy to test in the future.

Do not Procrastinate
Keep in mind that testing your backups should never be done at the time when a disaster strikes. Rather, it should be planned and tested well in advance, preferably as soon as a client signs up, and also periodically there after. The more you have know-how of recovery procedures and environment, the better you will be prepared to assist clients avoid downtime. It should be the foremost preference of a confident service provider to test cloud back and all recovery plans to know about recovery in detail.

Exchange Server Virtualization: A Cost Effective Solution

It is important that each enterprise makes the right decision whether deploying physical or virtual machine. Servers cost add up and if companies do not virtualize the servers, they can not get the full value of the machines. On the other hand, virtualization assists in exchanging and running application on machine by making RAM and CPU available for more investment. As less boxes are used, less time and energy will be required for maintenance.

 

Scale & Performance

Physical hardware parts are linked with exchange process. If you do not have sufficient resources, virtualization can work without affecting on performance ratio. In order to run Mailbox Server, Client Access Server and Exchange server, companies need to scale out mailboxes athwart virtual environment to match physical server performance.

 

Quick Disaster Recovery

In Exchange Server 5.5, clustering endorses availability through designing passive node for slack selection even if the current node fails in operating mailboxes. Clustering is a tricky procedure, which promotes the server role only. Virtual Exchange environment helps in finding a way around clustering complications, improve availability, and disaster recovery by permitting failover of server roles starting from one host to other.

 

Authenticity of Virtual Exchange

When specific applications are used, companies need to get license for virtualization. For instance, if you have concerns with Microsoft affecting your plans to virtualize, do not fret as properly engineered software squeezes such ideas. Having said that, however, there are a few things that should be considered for making virtualization exchange accurate.

 

Significance of Virtualization Tool

It is important to have the right tool before performing a job. Microsoft’s Hyper-V and VMware have capabilities to work according to a given task. While making decision, always check hypervisor which is easy to use for IT people. In addition, select a hypervisor with significant features to match with company’s requirements.

 

Sensible Attitude for Resource Selection

It may be your preference to operate SQL Server, Hadoop and SharePoint, next to Exchange for virtualization. Keep in mind that selection of additional resources directly affects performance.

 

Support Policy of Microsoft

In virtual environment, deploying Exchange is possible through Microsoft’s policies. Companies must have an idea of how Microsoft policies work to understand what is demanded from hypervisor, key components, and supported hardware.

 

Disaster Recovery and Server Virtualization

Virtual servers are available on hard drive of physical server. It is easy to transfer virtual server from one physical server to another. As a result, disaster recovery completes faster. It is an economical and uncomplicated process. When data recovery plan depends just on hardware and needs similar hardware for all physical servers; the end results becomes too expensive. It is the reason, organizations select server virtualization for disaster recovery as recovery process requires enough space on hardware.

 

Organizations that are conscious of their resources and need effective email solution get satisfied because virtual Exchange system deploys without affecting on reliability and performance. Whatever is the type of system, virtualization project which is structured on unsatisfactory basis will suffer in the end. Therefore, implement a precise strategy to avoid uncertainties.

Our Customers

  • ATOS
  • Age UK
  • Alliance Pharma
  • Liverpool Football Club
  • CSC
  • Centrica
  • Citizens Advice
  • City of London
  • Fujitsu
  • Government Offices
  • HCL
  • LK Bennett
  • Lambretta Clothing
  • Leicester City
  • Lloyds Register
  • Logica
  • Meadowvale
  • National Farmers Union
  • Network Rail
  • PKR

Sales question? Need support? Start a chat session with one of our experts!

For support, call the 24-hour hotline:

UK: 0800 999 3600
US: 800-220-7013

Or, if you've been given a screen sharing code:

Existing customer?

Click below to login to our secure enterprise Portal and view the real-time status of your data protection.

Login to Portal