Helping clients manage their technology for over 30 years.

Got DRaaS and/or managed service DR? Pay attention to BC/DR plan updating anyway

Developing the IT resilience your enterprise needs

Disaster Recovery as a Service is fast becoming a business essential as it’s implemented in more and more enterprise multi-site resilience strategies. Hardly surprising, since DRaaS simplifies recovery operations by combining protection, orchestration, and automation.
Continue reading

Developing the IT resilience your enterprise needs

Developing the IT resilience your enterprise needs

These days, most enterprise systems, applications, and workloads are deemed mission- or business-critical. So, in addition to redundancy and high availability, discussions about business continuity and disaster recovery focus on IT resilience architectures employing multiple geographically-distributed data centers that use live application failover to prevent downtime.
Continue reading

BC/DR planning coherence:
Stepwise toward business resilience

7 security best practices: Preventing ransomware attacks — with...  by Quest

As I mentioned in my last post, 68% of those in organizations committed to a multi-site resilience strategy – e.g., using Disaster Recovery as a Service (DRaaS), shifting IT infrastructure to a managed service provider environment, or deploying hybrid solutions – have confidence that their IT environments will perform as expected during unplanned downtime.
Continue reading

Is your business prepared for unplanned downtime?

7 security best practices: Preventing ransomware attacks — with...  by Quest

Your answer may depend on your job title. In one recent survey, 70% of C-level executives declared their firms “very prepared” – but fewer than half of the IT people at those same companies agreed.

Uh oh.
Continue reading

Facing down cybercriminality:
3 strategies for protecting your business

7 security best practices: Preventing ransomware attacks — with...  by Quest

Those of us devoted to securing enterprises can tell you that cybercriminality will grow significantly as it continues to exploit current information technology trends – widespread adoption of mobile devices and apps, increasing realization of the vast potential of IoT (Internet of Things), and the intensifying digital interconnectedness of nearly everything.
Continue reading

Cybersecurity best practices:
Paying attention to these 10 basics helps prevent ransomware attacks

7 security best practices: Preventing ransomware attacks — with...  by Quest

A commitment to the seven people-focused cybersecurity best practices I reviewed in my last post will thwart many attacks. But don’t forget these 10 key cybersecurity best practices basics:
Continue reading

7 security best practices: Preventing ransomware attacks — with people

7 security best practices: Preventing ransomware attacks — with...  by Quest

If you have taken note of enterprise network security over the years, you’re aware of security best practices basics, which are also applicable to ransomware: layer your security defenses, back up your data, keep your software patched…
Continue reading

Learning from WannaCry

Learning from WannaCry by Quest

If your business has been taken hostage by WannaCry ransomware, get expert help now. If you’ve been spared, please pay attention anyway – because WannaCry broke new and dangerous ground.
Continue reading

The path to a software-defined, self-optimizing network architecture

Enterprise Network by Quest

Your network needs to be ready for a world where malware is pervasive, nearly every enterprise uses cloud services, mobility rules, Internet of Things (IoT) devices number in the dozens of billions, and big data storage measures in dozens of exabytes.

To compete in this world, you need a software-defined network in which… Continue reading

Why an intelligent network edge will serve you better

Enterprise Network by Quest

The immense data traffic demands of always-on businesses, highly mobile customers, and the nearly universal embedding of Internet of Things (IoT) devices means the network edge has never mattered more.

Although attention has long focused on increasingly cloud-filled network cores, note that it’s at the edge where lies… Continue reading