Becoming a publicly traded company has a profound impact on the way a business operates. The technology that is in place, and how it is deployed, can also come under close scrutiny. That was certainly the case for one of Daymark’s life science clients whose pending IPO put a spotlight on network security and data protection. In this blog, Steve Caprio, Daymark Cloud Consultant, answers some questions on the security journey of this enterprise.Read More
As a Daymark Senior Data Protection Consultant, I genuinely get excited when I can learn about new features and approaches that help keep our clients’ data efficiently backed up, recoverable and secure. So, I was excited when Veritas nominated me to attend their 2017 Data Protection Interlock, an invitation-only global technical training event.Read More
Cybercriminals continue to use phishing attacks on individuals within enterprises. With increased sophistication and multiple attack vectors, businesses must be vigilant at every step of the way to prevent infiltration. Let me share a recent example-
Today I received an email from a recruiter. It’s not out of the ordinary for recruiters to ping us with resumes hoping that we will see a fit for their candidate. This one was well written, had a company logo, and a picture of the sender. Including pictures is a growing trend with recruitersRead More
To date, we’ve looked at making a compelling financial case for an investment in software and making the business case for a new disk array. In this last blog, I’ll talk about making an increasingly frequent IT decision, seeking the expertise of an IT Managed Service Provider.Read More
Data protection. Storage professionals have been worrying about securing, backing up, and restoring data pretty much since computers came into use. And just when you think you’ve got it figured out, there’s a new wrinkle – a new regulation, a new data source, a shorter backup window, and endless new technologies to manage it all. Here are answers to some of the most frequent questions our customers ask in the never-ending battle to protect data and manage data growth:
Q. What’s the most common missing element in an enterprise’s data protection strategy?
A. Two things come to mind – First, an active and consistent review of backup success, as indicated by the ability to perform an effective and timely restore. And second, a lack of policy based backup that mirrors the enterprises’ document retention requirements.
Oracle backups have always been a challenge to manage and support given the disparate administration groups typically involved. If you are a database administrator (DBA), you need the flexibility to efficiently create backups and run restores for development cycles and upgrades. Backup administrators need to balance the backup schedule with resources and prioritized data.Read More
It happens all the time – a customer has a problem that’s tough to solve. I was recently asked how to best protect a virtual environment – stretched between two data centers. The customer wanted all administration through vCenter with instant recovery and the ability to meet stringent RPOs and RTOs. And the catch – they wanted the backed up data to be stored on a different vendor’s array utilizing a different protocol - NFS instead of Fibre Channel (FC) block storage.Read More
Is that light you see at the end of the proverbial tunnel, or is it the headlight of an oncoming train?
The future of your professional career just might depend on your ability to successfully lead your company to the cloud. So many things to consider…
Yes, the cloud offers many advantages to your business including agility and high levels of fault tolerance, but in and of itself, the cloud does not release you from backing up your data in order to protect yourself from user error, data corruption, or data loss.
Just like provisioning new applications or scaling current applications, you need to consider every angle when protecting your data that lives in cloud.
By Bruce Hall, Director of Managed Services
Have you heard about SOC 2 and SOC 3 validation? If you’re storing data in the cloud (or considering it) it’s a business imperative. We’ve recently completed a Service Organization Control 2 (SOC 2) and Control 3 (SOC 3) validation process. While we’re proud of our achievement, it’s important to explain what this means for our customers. When researching an enterprise cloud or managed service solution, it’s essential to not only check for compliance with SOC 2 and SOC 3, but also to review the actual report. Prospective service providers should be more than willing to share their report.
By Ned Fairweather, Senior Consultant/Data Protection Practice Lead
Whether you’re already using Symantec NetBackup or you’re considering it as a backup solution, we think NetBackup 7.5 is worth a close look. Daymark has deployed NetBackup 7.5 in several customer environments. Our technical consultants have found the product to be stable with dramatically increased backup speeds, but that’s not all. Here are 7 feature enhancements we think are worth checking out: