Do we still need VM-specific backup tools? [video]

This is one of the big questions in 2016 (and each of the past few years as well). 

Have the “traditional” unified data protection solutions caught up in reliability and agility to the degree that the need for “point products” that only protect VMs are no longer necessary? To help answer the question, I've recorded a short video:

Topics: Data Protection VMware Information and Risk Management Jason Buffington Video openstack Hyper-V Server Virtualization VM-backup-recovery

Cloud-Powered Data Protection — Definitions and Clarifications

We continue to see a great amount of interest in combining “data protection” and “the cloud” – but also a great deal of confusion, in that there isn’t such thing as “the cloud.”

Topics: Data Protection Information and Risk Management SaaS IaaS disaster recovery BaaS cloud-backup cloud storage DRaaS software-as-a-service (SaaS) Backup-as-a-Service (BaaS)

What I Want to Talk About at VMworld 2015

In 2015, the question is no longer “Can I get a reliable backup of a VM?” 

With vStorage APIs for data protection (VADP) now being mature since 5.5, through 5.8 and up and coming in 6.0, shame on any backup solution that cannot reliably back up VMs using host-based APIs. Shame on vendors who only back up VMware and not Hyper-V with parity--but that is for a different blog, after VMworld.

Today, here are the questions that folks should be asking on the topic of “How agile can my restore of those VMs be?

Topics: Data Protection Information and Risk Management VMworld Virtualization

Vendors Need to Rethink Their Channel Programs

In recent ESG research on data protection personas, methods, and channels, ESG looked at ‘who’ is affecting data protection, including IT operations, DBAs, vAdmins, file/storage admins, non-technical stakeholders, and channel partners.

While data protection has historically been very channel-driven, or at least channel-accelerated, recent data shows that there are disconnects between how IT decision makers use channel partners and how vendors hope that channel partners are being used (e.g., pre-sales advocates of their products/services). 

Topics: channel Data Protection Information and Risk Management channel partners channel partner

What’s New in Data Protection from IBM Interconnect 2015

Every time that I take a close look at IBM’s data protection portfolio, veiled under its storage solutions umbrella, I am happily surprised by the technology—and my guess is that you would be too.

Topics: IBM Data Protection Information and Risk Management

Yet Another Proof Point for Network and Endpoint Security Integration

As I’ve mentioned many times in my blog, there is a lot of evidence suggesting a trend toward the amalgamation of endpoint and network security.

Here’s another recent data point that supports this further. ESG recently published a new research report titled Network Security Trends in the Era of Cloud and Mobile Computing. The report is based upon a survey of security professionals working at enterprise organizations (i.e., more than 1,000 employees). ESG asked them: “Is your organization engaged in any type of project to integrate anti-malware and analytics technologies on networks and endpoints?” Nearly one-quarter (22%) said, “yes, extensively,” while another 39% responded, “yes, somewhat.”

Topics: Information Security End-User Computing IT Infrastructure network Networking Information and Risk Management endpoint Security and Privacy

Time to Embrace or Terminate National Cybersecurity Awareness Month (NCSAM)

Most people know that October is National Breast Cancer Awareness Month. Far fewer people know that October is also American Archives Month, National Book Month, and Pastors Appreciation Month.

Topics: Information and Risk Management Security and Privacy

How to Protect an EVO RAIL (video series)

VMware’s EVO RAIL is an architecture for a hyper-converged, software-defined data center in a single appliance form-factor … to be delivered by various hardware partners. But how do you protect that all-in-one solution?

Topics: EMC EVO IT Infrastructure Data Protection JBuff VMware Private Cloud Infrastructure Information and Risk Management HP Dell

Proofpoint Report Exposes Details about Cybercrime Division-of-Labor and Malware Architecture

One of the more vapid cybersecurity cliché statements goes something like this: “Hacking is no longer about alienated teenagers spending countless hours in the basement on their PCs. Rather, it is now the domain of organized crime and nation states.” While this is certainly true, it is also blatantly obvious. It is also nothing more than a meaningless platitude with no details about why this is true, how hackers operate differently than teenagers, or what the implications are.

If you want to understand these issues, I strongly suggest that you read a new threat report, Analysis of a Cybercrime Infrastructure, published this week by Proofpoint. The report follows the tactics and techniques used by a Russian organized crime group as it launched an attack on US- and European-based users aimed at stealing online banking credentials.

Topics: End-User Computing Information and Risk Management Security and Privacy

Leading Enterprise Organizations Have Established a Dedicated Network Security Group

When an enterprise organization wanted to buy network security equipment a few years ago, there was a pretty clear division of labor. The security team defined the requirements and the networking team purchased and operated equipment. In other words, the lines were divided. The security team could describe what was needed but didn’t dare tell the networking team what to buy or get involved with day-to-day care and feeding related to “networking” matters.

This “us-and-them” mentality appears to be legacy behavior. According to ESG research on network security trends, 47% of enterprise organizations now claim that they have a dedicated group in charge of all aspects of network security. Additionally, network security is done cooperatively by networking and security teams at 26% of organizations today but these firms insist that they are in the process of creating a dedicated network security group to supplant their current division of labor.

Topics: IBM Network Security Check Point Palo Alto Networks Fortinet Cisco IT Infrastructure Networking Information and Risk Management Juniper Sourcefire FireEye HP McAfee Security and Privacy Security