Categories
Cloud Cloud News News

Secura announces cloud-based disaster recovery solution enabled by VMware vCloud Availability

Secura is delighted to announce Cloud DR, a disaster recovery as a service solution which leverages VMware vCloud Availability, one of the latest cloud technology advancements from VMware, a leading innovator in enterprise software.

Secura’s Cloud DR solution offers simple, cost-effective Disaster Recovery as a Service (DRaaS) for VMware-based platforms, as either a bolt-on service to customers of Secura’s Virtual Private Cloud (VPC) or any organizations with VMware infrastructure on its site or in a data center.

Built around VMware vCloud Availability, Cloud DR offers native disaster recovery protection for any VMware workloads with near instant recovery of protected virtual machines at the click of a button.

Cloud DR can be entirely self-provisioned and managed using VMware solutions, VMware vCenter and vSphere Replication, and customers can configure Recovery Point Objective (RPO) and Recovery Time Objective (RTO) settings, access non-disruptive sandbox testing on demand and manage replication, migration and failover.

“We’re really excited to have worked with VMware to offer this innovative cloud-based Disaster Recovery as a Service to customers in the UK,” said Secura CTO, Dan Nichols.

“Our Cloud DR solution makes it simple for businesses of any size to employ native, robust VMware-based disaster recovery services in a cost-effective way that does not require significant upfront investment.”

Secura’s Cloud DR service removes the need to purchase additional hardware or software, connecting any VMware-based platform to robust disaster recovery on Secura’s own VPC infrastructure.

Easy online management, metered storage and usage-based costs make it cost effective and simple to implement enterprise-level disaster recovery.

Also read: Secura Partners with HyTrust to Offer Robust Virtual Machine Level Data Encryption as a Service

“We are committed to delivering innovative solutions to our customers to accelerate their digital transformations,” said Alanzo Blackstock, Director, UKI Partner Organization at VMware.

“The opportunity to work with Secura in the UK on its Cloud DR solution, leveraging the latest VMware vCloud Availability technology, will enable Secura to offer simple, cost-effective cloud-based disaster recovery services that seamlessly support their customers’ environments.”

Categories
Cloud Cloud News Datacenter

Microsoft enables replication of Azure VMs to other regions with new disaster recovery feature

Microsoft has announced a new feature called Azure Site Recovery (ASR) to its Azure Availability Zones. It will allow customers to replicate zone-pinned virtual machines to other regions within a geographic cluster.

The tech giant had introduced Azure AZs last year to provide unique fault-tolerated physical locations within an Azure region with an independent power, network and cooling. An AZ consists of a number of datacenters and houses infrastructure to support highly available and mission critical applications.

Customers can choose to deploy multiple virtual machines across multiple zones within a region for infrastructure-as-a-service (IaaS) applications. These VMs are then physically separated across zones,and a virtual network is created using load balancers at each site.

“On rare occasions, an entire region could become unavailable due to major incidens such as natural disasters. Non-transient, large scale failures may exceed the ability of high availability (HA) features and require full-fledged disaster recovery (DR),” wrote Sujay Talasila, Senior Program Manager,Cloud + Enterprise, in a blog post.

Azure Site Recovery is aimed to complete the resiliency continuum for applications running on Azure VMs. It is a built-in disaster recovery as a service (DRaaS) in Azure that will help enterprises to keep doing their business even in the cases of major IT outages.

By deploying replication, failover, and recovery processing using Azure Site Recovery, enterprises can keep their applications running during planned and unplanned outages.

ASR is a native DRaaS, and Gartner has recognized Microsoft a leader in 2018 Magic Quadrant for DRaaS on the basis of completeness of vision and ability to execute.

Also read: Azure Machine Learning service now generally available

Azure Site Recovery is now generally available in all regions that support Availability Zones.

Categories
Articles Web Security

How to effectively prepare a business to mitigate consequences of an aggressive cyber-attack?

After a series of malicious cybersecurity incidents in 2017 surfaced affecting large companies and private organizations all over the world, cyber – security alerts have become the norm. However, the worst is yet to come. Last week, the United States and Britain issued a joint warning regarding a new wave of cyberattacks, most likely aimed at governments and private organizations, but also on individual homes and offices.

Unfortunately, security incidents happen in all organizations. The only way to improve your company’s resilience, ensuring your customers’ and stakeholders’ confidence, as well as continuing to operate your business as normal, is to invest in incident management processes, such as DraaS. Such solutions help your business mitigate the harmful impacts of cyber – attacks.

Read below how you can prepare to fight possible business disruption caused by an aggressive cyber – attack.

Carrying out cyber security incident threat analysis –  For thousands of people living in the UK, the word – “ransomware” became comprehensible, when they were turned away from NHS hospitals last year, due to the malicious WannaCry attack. There is nothing unusual about this, as only recently businesses and private users around the world can see what cyber – crime means in practice, and what disastrous consequences to business continuity it can bring. One of the main stages for protecting your business from cyber – security incidents can be considered as a very epistemological one, that means, it will involve deep understanding what you might be dealing with and what is the level of threat to your organization.

Providers of Disaster Recovery as a Service help firms to contextualize cybersecurity threats by looking at key business processes and system interdependencies that might be targeted by hackers. It is important to channel all your worries to the investigators at this stage, to help them better tailor their services to your business operations.

Consider shifting the responsibility with service level agreements –  Building your own Disaster Recovery Team might be problematic, especially when you are running a small business. However, research shows, that formal cybersecurity incident teams are invaluable for dealing with disruptive events, as very often they are the only people who have the technical expertise needed to advise on business decisions quickly. It makes sense for small and medium organizations to often fully, or partially shift their responsibilities for creating and managing disaster recovery programs to Disaster Recovery Providers.

Transferring ownership can be done by signing service level agreement, which gives you the guaranty that aspects of the service to which you both agreed to, will be delivered. This essentially means that in the event of a cyber – security incident, an external Recovery Execution Team, not you, will be responsible for one or all of the following: identifying, investigating, taking appropriate action, or overseeing all the recovering processes.

Applying changes – When looking at vulnerabilities in your system, it’s highly likely that security investigators will recommend applying changes to your IT services within your company. Configuring your systems and networks, transferring mission-critical data to safe data centers as well as implementing adequate monitoring processes is crucial for eliminating single points of failure, that are often enough to compromise your infrastructure.

Securing and retaining your data is critical – These days companies run on data, so it is essential you take the proactive approach to properly recover not only your applications and servers, but ensure they are also working, and the data they store is recovered. Disaster Recovery providers can help you to identify data that needs to be protected, as well as where it is stored, and how it can be recovered, without the need to rely on outdated data deduplication.

Depending on your business objectives you might either choose replication services that create a fully working, ready – to – use, copy of your environment (this is especially important for companies with strict RTO ) or traditional back-up and vaulting methods, which are recommended for platforms that can afford being down between 4- 12 hours.

Continuous Review of your state of readiness –  Once you have realistic scenarios based on the conducted threat analysis, you might want to see if the changes you have applied to protect your infrastructure and data work properly. A good testing method usually involves initiating a fictional, yet very probable attack internally, and verifying how well you ( or your security provider)  can respond to it. This stage might also involve undergoing recovery exercises, that could prepare you even better for an actual disaster.

 

Guest Author: Matthew Walker-Jones

Specializing in content covering topics including data driven marketing, online data protection, data recovery and cyber security. With a passion for all things data, Matthew is constantly staying up to date with the latest news on data security information.

Categories
Cloud Cloud News Hosted Cloud Apps Hosting Innovation New Products News Technology

Newly Launched CloudSigma 2.0 Features Private Patching, SSD Storage System & Advanced CPU Options

Infrastructure-as-a-Service provider CloudSigma today launched CloudSigma 2.0, a next-generation public cloud that enables high-performance hybrid environments.

Some of the salient features of ClodSigma 2.0 are:

CloudSigma 2.0 is a true benchmark in IaaS capability. We have eliminated contention and bottlenecks, created a new level of interoperability and hybrid cloud integration, and broadened the user’s ability to customize their service, all while maintaining our open and transparent model. – Robert Jenkins, CEO and co-founder, CloudSigma.
  • Direct private patch capability: CloudSigma 2.0 has a  transparent private patching capability that allows customers to connect their own infrastructure directly to the vLANS within CloudSigma’s public cloud, all exposed via the same subnet. This significantly improves data portability and security.

    CloudSigma 2.0’s private patching avoids the need for inefficient VPNs and allows for a totally private IP-only solution at full line speed and with low latency.

  • Disaster-Recovery-as-a-Service (DRaaS): The new private patching capability streamlines data portability to enable a full-fledged DRaaS strategy, thereby giving customers instant access to and recovery of their data in the event of an outage or disaster.

    Customers can hence  run one environment both inside and outside of CloudSigma’s cloud without the overhead of maintaining two differentiated platforms.

    Also, since customers are no longer required to send their sensitive data over a public IP, CloudSigma 2.0’s private connectivity mitigates data security concerns like cyber-attacks, data leakage and malicious hacking.

  • All-SSD, high-performance storage: Incorporating an all solid-state drive (SSD) storage, CloudSigma 2.0 eliminates the input/output (I/O) bottlenecks and CPU wait time to provide high levels of speed and stability.

    It also boosts VM-to-VM connectivity speeds using next generation virtual networking technologies.

  • Advanced CPU options for better application performance: CloudSigma 2.0 places no restrictions on VM size, offers all resources including CPU and RAM on a utility basis, incorporates advanced CPU options with full-exposure of CPU instruction sets to VMs, and offers the ability to control visibility and emulation of non-uniform memory access (NUMA) as well as hypervisor timer settings.

As per the official press release, many customers like  iStreamPlanet, Cinecert and Tracky who’re already hosting environments with CloudSigma 2.0 have een at least a 30 percent general performance improvement in terms of scalability, compute power and resource utilization.

CloudSigma 2.0’s pricing has an unbundled, pay-as-you-go approach.

“CloudSigma has always been focused on driving innovation as a founding principle, and that’s why we took our IaaS offering to the next level as soon as we had the opportunity,” said Robert Jenkins, CEO and co-founder, CloudSigma.

“CloudSigma 2.0 is a true benchmark in IaaS capability. We have eliminated contention and bottlenecks, created a new level of interoperability and hybrid cloud integration, and broadened the user’s ability to customize their service, all while maintaining our open and transparent model. These improvements are allowing us to further improve our SLAs, and we’re confident we can deliver on them,” he added.

For more information, click here.