Wednesday, February 10, 2010

VAULT400 has a new look!

We decided to "clean up" our blog a little bit. Hope you like the new look.

Friday, November 13, 2009

Risk Mitigation with VAULT400

One of the first steps in Risk Mitigation is understanding and admitting to yourself that you have a risk. VAULT400 has been an excellent risk mitigation tool for us. It addresses both online backup, disaster recovery and the day to day needs of recovery and piece of data from any point in time.

Another benefit is the broad range of platforms they address. Since VAULT400 is also an IBM iSeries business partner, they understand all of the special nuances associated with that platform. Since R&K is a reseller and user of the iSeries, that is of special benefit to us and our clients.

in reference to: http://www.rippe.com/RK_Risk_Mitigation.htm (view on Google Sidewiki)

Thursday, July 23, 2009

Quick VAULT400 - FACTS - read on.......

Management: With tape, each location must be managed locally by your staff because it requires manual intervention to load, eject and take tapes off-site. With VAULT400, you can centrally manage the solution from one location. Recoveries: With tape, you must recall tapes from off-site storage before recoveries can begin. With VAULT400, you go to our central management console, identify the date you want to restore from and click the safeset, meaning recoveries are much faster. Security: Do you encrypt your backups tapes? Many businesses skip this step because it adds time to backup windows. With VAULT400 you can encrypt backups without the overhead associated with tape encryption. Your data is secure and your backup windows are met. Data Validity: Do you "verify after write"? Like encryption, many businesses skip this step because it adds time to backup windows, ultimately leaving you to discover any issues when you needed to recover. With VAULT400 error checking is part of the backup process and does not add time to backup windows. Total Savings: While total savings includes tangible savings over tape, it does not include the risk of lost data. How much would it cost your organization if you lost a tape? Would you lose customers, incur regulatory fines, or lawsuits? Our Quick VAULT400 Facts - and Best ROI for Your Business
---------

Friday, July 17, 2009

Case Study - JensonUSA Rolls with VAULT400

Bike seller Jenson USA rolls with electronic vaulting backup/DR solution from UCG. A new Case Study can be found our our VAULT400 website under In The News. Online brick-n-mortar retailer choosing the best of the available components for the IBM System i. Check out the story at ITJungle as well. ------------------------------------------

Wednesday, July 15, 2009

85% of US Organizations Hit By One or More Data Breaches within the last 12 months

I just read a press release on Data protection that was pretty powerful. It comes from the Ponemon Institute's fourth annual study of encryption usage in the enterprise. The study surveyed 997 IT and security practitioners. Some key findings are listed here and you can see the report at: Encryption Reports. There are two reports listed (1) US 2009 Annual Study, and (2) UK 2009 Annual Study. the following is from the report:
  • Data protection is an important part of an organization’s risk management efforts. Fifty-eight percent report that data protection is a very important part of risk management and 22 percent say it is an important part.
  • Encryption of data on mobile data-bearing devices used by employees is very important or important. More than 59 percent of respondents say it is very important or important to encrypt employees’ mobile devices - a sign that organizations recognize that valuable data is more mobile than ever.
  • More than 70% have fully executed or just launched data encryption strategy in their organization. Once again data encryption strategies are being implemented across a majority of the respondent participants. The majority of organizations, 78 percent, have some type of encryption strategy, up from 74 percent in 2008 and from 66 percent in 2007.
  • Data Breaches continue to be a huge problem: Eighty-five percent of organizations surveyed had had at least 1 data breach in the last 12 months, demonstrating that there is no let up in breaches as this is consistent with 84 percent sited in the 2008 report. Companies suffering more than 5 data breaches rose to 22 percent in 2009 up from 13 percent in 2008.
  • Encryption is mostly used to mitigate data breaches and comply with privacy and data protection regulations. In addition, there was an increase in the percentage of respondents who reported that encryption is also important to preserving brand and reputation.
Here at VAULT400 we encrypt EVERYTHING. Just another advantage of using VAULT400. Now, just time to implement!

Tuesday, June 23, 2009

HA - Five Minute Role Swap

Demystifying the high availability role swap

There are many System i users who still believe a role swap between primary and back-up systems is a tricky operation that takes time when time is in short supply. Well, it isn't tricky and a role swap can be completed within 20 minutes with award-winning *noMAX. Listen to Raymond Hammell, Senior Technical Specialist with Maximum Availability, demystify the role swap process. During these FREE webcasts, Raymond will outline all the ingredients of a simple and successful roll over (with a live five minute example) and you'll learn about the latest network options to move users over to the target system. You'll see first hand what occurs to ensure that the data, application, and programs are exactly as they should be when a role swap is complete. Choose which date will fit best on your calendar:

  • Tuesday 14 July (11 am EST)
  • Thursday 16 July (2 pm EST)
Brought to you by UCG, VAULT400 and *noMAX REGISTER for the Webinar ----------------------------------------------------------------------------------------------