Data Protection

Are you a reseller or solutions provider looking to provide a cloud backup solution. Maybe you already have a solution in place and are demanding more performance, better management, more resilience. Have you looked at DataFortress?

DataFortress is a multi-tenanted solution that can be white-labelled. Data is secured and transmitted with AES 256bit encryption and is FIPS compliant. The DataFortress service is now available in a variety of new deployment offerings. Depending on the size of the backup requirement, available hardware, your technical expertise and the recovery objectives of the end user.

Fully Managed
Fully managed solution in the DataFortress Cloud for fast and easy deployment. Fully managed will also be most appropriate if you are just starting out. This service uses the DataFortress UK Mirrored Datacentres, no hardware or setup required.

Self Hosted
If you have you own hardware and are looking to run your own platform. Requires duplicate server setup to offer a mirrored solution. Alternatively you can mirror using the DataFortress Mirror Datacentre service.

Hybrid
If your end user requires LAN based backups for speed of backup and recovery, the DataFortress storage platform can be installed on premise with your end user. The data can be mirrored back to either your Self Hosted platform or the DataFortress Mirror Datacentre.

End User Hosted
Larger End users with TBs of backup data can opt for a full solution to be installed within their network. Corporate policy may prevent data being transmitted to a public cloud on the Internet.

Register today for a trial www.bluesolutions.co.uk/datafortresstrial

 

For Resellers and Solution Providers looking to spread their wings with sticky services, Cloud Backup has to be a logical place to start if you haven't already. The sales process won't differ that much from selling tin and a licence but once the order is signed you will remain closer to your customer for the duration of the contract. Your customer can sleep peacefully at night knowing their data is securely backed up offsite and mirrored in case of a disaster. Whilst you have a  guaranteed revenue stream coming in each month. As you add more customers you benefit from the aggregated purchasing of the storage. More options are now available with partners being able to choose from fully hosted and managed cloud backup solutions to hybrid cloud models with either you or your end user hosting a storage platform. This can obviously reduce costs utilising existing hardware and provide faster data recovery for large files.

DataFortress is a multi-tenanted solution that can be white-labelled. Data is secured and transmitted with AES 256bit encryption and is FIPS compliant. The DataFortress service is now available in a variety of new deployment offerings. Depending on the size of the backup requirement, available hardware, your technical expertise and the recovery objectives of the end user. Fully Managed, Self Hosted, Hyrbrid, End user hosted and mirror service are now all available.

StorageCraftStorageCraft have relaxed their requirements for Managed Service Providers on the MSP programme.

  • Minimum contract term has been reduced from two years to one year
  • Minimum monthly spend has been reduced from £135+vat to £100+Vat
  • Consumption billing for the first three months, you only pay for what you use

StorageCraft continue to be the leader on disk based backups using snapshot technology to image an entire system. As a Microsoft certified VSS partner you can be assured of the highest quality solution. Clearly a reason many providers choose to white label the StorageCraft agent technology.

When you’re speaking to customers, what password advice are you sharing? What software are you recommending to keep devices and content secure?

Our colleague Tom Colvin from Conseal Security wrote a blog post a few months back called How Random. He suggests that humans are quite ‘random’ in their thought processes and actions – complicated perhaps. By contrast computers are well, not ‘random’. It stands to reason then that humans should be able to generate passwords that are harder to crack, but actually it is easier to guess a human password than a machine-generated password.

When choosing passwords, humans it would seem have a habit of gravitating towards dictionary based words, which are more guessable – especially when the most common starting letter in English language is ‘T’ which is invariably followed by a vowel. In fact, Tom’s blog post suggests that for an 8-character password chosen from an "alphabet" of 94 characters, you'll most likely guess the password within 218 attempts. By contrast, an 8-character random computer-generated password is 23 thousand million times harder to guess.

Read Tom’s full post here - it’s full of other useful facts and stats. Now, I know this is an old routine, but feel free to share any horror stories – are you still seeing password post-it notes on PC screens? When you’re speaking to customers, what password advice are you sharing?  What software are you recommending to keep devices and content secure? Are you investigating device security as a potential managed service line?

Trend Micro has released another attention-grabbing video tutorial on mobile and smartphone security in the workplace.

Some of the scenarios it demos are really very frightening (from a corporate perspective) and if I ran a company, no matter what the size, it’d probably have me tapping out an email straight away to our head of IT about tightening the control on staff use of mobile devices. However, the real issue is bigger than just control.

I think companies should be asking themselves how they can secure their business from threatening access via devices, rather than how they can control the devices themselves.

Devices are often owned by the employees, not the company, but the majority of those devices will have “guest” internet and LAN access. This means that the organisation is legally unable to secure & control those devices, because a company cannot enforce security and control software upon devices which it does not own. Yet, its data could be at great risk and if devices are compromised, the scenario demonstrated in the video above will become a reality.

...continue reading

The Infographic (pictured right) is created by one of our vendor partners, Trend Micro. It suggests (putting it bluntly) that employees can take much of the blame for data protection breaches. 78 per cent of organisations have suffered from at least one data breach over the past two-years, but only 8 per cent cited external attacks as the main reason. Loss of laptops and other mobile devices is the biggest failing. It looks like us employees could be responsible!

BYOD

Bring Your Own Device (BYOD) is rather under rated on this Infographic. It only makes number 10 on the riskiest employee practices list. However, I think the risk could be much higher, especially in SMBs. Using the right software, large businesses, which have their own “fleets of IT” can control device access, website access, data encryption, applications, and in the event of device loss, remotely wipe data too. SMBs by contrast rarely provide staff with devices for work use, but still need to protect (but probably don’t) corporate data held or accessed (intentionally or by accident) using an employee’s own device.

Legislation will only increase

Personally, I don’t think individuals are all entirely to blame. They may lose the devices or cause the data breach, but SMB owners also need to take data protection more seriously. For one thing, legislation in this area will only increase. It is interesting that the research behind the infographic suggests only 43 per cent of organisations protect sensitive information with data protection technology. I should imagine in SMBs that figure is much lower.

Consultancy first, product sell second

The Infographic really highlights some sweeping trends, but for me the biggest point on data protection is that every company is different; every company operates with different levels of protection sophistication. The biggest opportunities for resellers right now – with support from consultancy-led distributors and vendors - is to sell consultancy services to end-user customers. Consultancy first, product sell second. Resellers should now be working with business owners to provide security audits, to really understand how their businesses operate and then to help them find the security holes. In many cases, owners simply don’t realise they have a security hole!