October 2015
This Month at Code42
EXCLUSIVE NEWS + RESOURCES
Humans are the weakest link in your network
Hackers know that the easiest way to circumvent your protective measures is through your employees. While ransomware has no cure, an enterprise can neutralize the impact of the infection. How does Code42 CrashPlan allow you to avoid paying the hacker's ransom?
Protect against data leaks using the Code42 API
Did you know there is a prototype data leak/loss prevention and detection (DLP) security solution available through the Code42 API? The Code42 API Python script monitors and protects the CrashPlan archives of selected users in your Code42 environment against unauthorized or suspicious restore activity. Read this support documentation to learn the purposes, limitations and principles of the script; how to configure, install and implement the script; and how to interpret its output.
RELEASE NOTES
POLICY
NOTIFICATIONS
Code42 secures $85 million investment to continue expansion in endpoint data protection, security, forensics and analytics
Code42 is excited to announce that it has secured $85 million in Series B funding. "We protect the most important information for the world's largest enterprises. This funding enables us to grow even faster in endpoint backup and accelerates our efforts to build analytics and actionable intelligence on top of the historical archive of end-user data," said Joe Payne, president and CEO at Code42.
The history of the web's greediest villain: ransomware
They say history repeats itself, and there's no exception when it comes to ransomware. Becoming infected with ransomware—be it CryptoLocker, CryptoWall, CTB-Locker, TorrentLocker, or one of their many variants—can feel like the digital equivalent of getting mugged. Do you know the origins of ransomware?
Endpoint data control is critical for legal hold + eDiscovery
The right tools can make collection of custodial data faster and simpler—with no nagging questions about discovery integrity or data spoliation. Code42 endpoint data protection and security supports legal hold capabilities. In this IDC analyst report, read how enterprises can combine endpoint data protection and eDiscovery on a single platform and review the risks and challenges associated with data stored beyond the reach of IT departments, risk managers and corporate attorneys.
API cool tools: Advanced REST Client extension for Google Chrome
Code42 Systems Engineer Amir Kader shares why the Advanced REST Client extension for Google Chrome is useful, and how to use it in conjunction with the Code42 API Documentation Viewer. The Documentation Viewer outlines what is required to invoke a resource and what should be returned—but it doesn't show you real data. In this post, you will learn how to use this extension to test resources that are documented, and see the output in a readable format.
"CrashPlan gives us complete visibility into backup activities and status for all DKSH users, and has cut the number of backup and restore-related service tickets significantly."-Sven Maushake, General Manager of Global IT Infrastructure for DKSH
Technology companies come and go, but Bit by Bit backs its service with 30 years of experience helping businesses achieve their goals with reliable IT solutions and support. We were established in 1987 as a database application development and networking company, and since then we’ve evolved into a full-service IT firm and leader in delivering powerful and cost-effective technology solutions. visit our site at www.bitxbit.com
Wednesday, October 28, 2015
Stay secure - October news from Code42
Wednesday, October 14, 2015
Bit by Bit: your trusted disaster recovery provider
Information technology is essential to the continuation of critical business functions. So it stands to reason that protecting your organization's data and IT infrastructure in the event of a natural or man-made disaster is a top business priority. All organizations, regardless of size, should have a disaster recovery plan.
Statistics show that on average, over 40% of businesses that do not have disaster recovery plan go out of business after a major loss like a fire, a break-in, a storm or sabotage. With statistics like this in mind, disaster recovery planning should be a top priority for SMBs. A disaster recovery and business continuity plan will bring about the following advantages:
Achieve peace of mind. Get rid of any worries related to the catastrophic loss of your computer data. We provide complete backup protection of your critical business information.
Restore faith in your backups. We ensure your data and systems are continually backed up, automated and always up-to-date.
Count on a speedy recovery. If a disaster occurs, rest assured your business will be up and running immediately.
Protect more than just data. Our solution defends against your entire system, including anti-virus software and other security measures
Let Bit by Bit help your IT department with its disaster recovery procedures, ensuring that you can keep critical services running regardless of power outage, hurricane or human error. Give us a call today at 866-391-1566.
Wednesday, October 7, 2015
The Top Cloud Computing Trends of 2015
A 2015 survey conducted by RightScale, one
of the leading cloud computing managers in the world, shed some light on the
latest trends in cloud computing. While cloud storage is still in its early
childhood, the revolutionary data storage solution has taken the tech industry
by storm. From rapid adoption to hybrid strategies, here are the top cloud
computing trends of the year.
Hybridization
While the vast majority of workplaces have
seen the many benefits of cloud computing, most are reluctant to entrust
everything to the cloud just yet. The RightScale survey found that 82 percent
of enterprises now have a hybridized strategy that involves both the cloud and
traditional means of storage. That number was up significantly from 74 percent
in 2014. While experts continue to speculate on this reluctance to fully adopt
cloud computing, many professionals and enterprises alike are drawn by the
apparent permanency of having traditional storage as a backup.
Public vs. Private
It seems that adopters prefer different
forms of the cloud for different things. An impressive 88 percent of
enterprises utilize the public cloud, while 63 percent use the private cloud.
Enterprises clearly favor the public cloud, while organizations tend to prefer
the private cloud for workloads. These figures are telling as to the future
applications of cloud computing and its impact on the world of enterprise.
While the public cloud is clearly in the
lead when it comes to overall adoption, larger scale enterprises show a defined
preference for the private cloud. Some virtualized environments that have been
redesigned may be labeled as private clouds, partially explaining the trend.
Nonetheless, the public cloud is expected to grow significantly over a short
period of time. 27 percent of enterprises expect to have more than 1,000 Vms in
the public cloud within the next year. Experts suggest that as time progresses,
enterprises may begin to divide cloud usage equally between public and private
clouds for maximum workload efficiency.
Applications
While workplaces are becoming more and
more reliant on the cloud, much of the workload is still left to traditional
software. 68 percent of all enterprises run one-fifth or less of their
applications in the cloud. Surprisingly, 55 percent of enterprises admit to
keeping a large percentage of their application portfolios off the cloud. While
these enterprises utilize cloud-friendly infrastructures, they are not even
coming close to utilizing the cloud fully across workloads.
While the low rate of cloud application
usage may seem like a negative to cloud development, experts suggest that this
could actually lead to more growth in the long run. There is still plenty of
space in the cloud for more applications, and as offerings in the IaaS field
continue to grow, adopters may be drawn in by the vast array of possibilities
for applications in the cloud.
DevOps and Docker
The survey found that DevOps adoptions
rose to 66 percent overall, with a 71 percent enterprise adoption increase.
These promising figures show that DevOps truly is the software development
method of the future with a focus on communication and clarity. Docker adoption
is also on the rise with as many as 13 percent of organizations utilizing the development
platform and another 35 percent acknowledging plans for future use.
AWS and Azure
Thus far, AWS has dominated the cloud
computing scene with an impressive adoption rate of 57 percent across all
enterprises. Azure IaaS comes in at a distant second with a 12 percent adoption
rate, but experts warn against labeling the platform at second rate. Azure's
adoption rate doubled from 6 percent in 2014, making it a viable competitor for
AWS. By 2018, it is estimated that 59 percent of all cloud workloads will be
through Software-as-a-Service applications, marking a huge increase from 41
percent in 2013. This growing market promises to host plenty of competition
both for developed platforms like AWS and steadily growing ones like Azure.
Increased Spending
Goldman Sach reports that overall spending
on cloud computing is expected to grow 30 percent annually between 2013 and
2018. This growth rate is remarkable considering the overall IT industry's
projected growth rate of 5 percent. Such figures make it obvious that the IT
world is ready for more cloud computing solutions and will become increasingly
dependent on cloud development platforms for storage and workload performance.
As the cloud computing industry continues
to grow, enterprises are treated to an ever expanding market of applications
and platforms to use. Not only is cloud computing running workloads more
efficiently than ever, but enterprises are utilizing the cloud in its various
forms more in 2015 than they ever have before.
Contact Bit by Bit for more information: 877.860.5831
Contact Bit by Bit for more information: 877.860.5831
Subscribe to:
Posts (Atom)
-
Bit by bit helps client networks run smooth and secure.. visit our website at www.bitxbit.com/texas 877.860.5831
-
What is SOC-as-a-Service? By Robert Blake Having a Security Operations Center (SOC) in-house is expensive for the average business. Large ...
-
In an era dominated by technology and interconnectedness, the importance of cybersecurity cannot be overstated. With the ever-evolving lands...