PROOF DRaaS Delivers – UNITRENDS 2019 Survey Findings

For the fifth year in a row, Unitrends conducted a survey on the state of data backup, recovery, DRaaS, and the increasing use of the cloud for data protection. More than 400 respondents from organizations of all sizes and industries took part.
The results highlight that data loss and downtime continue to plague organizations of all sizes. At the same time the cloud is playing an increasing role in data protection with a majority of organizations now using the cloud as a critical part of their data protection strategy. Cloud-based technologies such
as archiving, DRaaS, and direct-to-cloud back up of PCs and servers are becoming mainstream.
This report examines in detail the findings about Disaster Recovery-as-a-Service. We will examine use
patterns, recovery rates, and user satisfaction of DRaaS technology. Most importantly, we found a direct relationship between the use of DRaaS, very fast recoveries, and reduced downtime.
But first, why are organizations adopting DRaaS?


via DRaaS_Survey_Results.pdf

Business Continuity Services | IBM

Recent global cyber attacks are a clear and present reminder of the critical importance of a proactive, integrated plan for cyber resilience. IBM delivers business continuity and disaster recovery services that can support your business across environments — public cloud, private cloud and on-premises, traditional data center environments.

Web Page InsiderThreat-LI

via Business Continuity Services | IBM

IBM Events – Agenda: AWS After Hours with IBM

Join IBM Security on Tuesday, June 25th for a very special evening of interactive experiences and networking at our Cambridge location. Gain insights on how to transform your security operations by previewing a cyber simulation at our IBM X-Force Command Center, followed by an immersive, Financial Fraud demonstration in our IBM Watson Experience Center.


via IBM Events – Agenda: AWS After Hours with IBM

QRadar “Super” User Group – Chicago – Security

The IBM Security team would like to invite you to our upcoming user group meeting being held in Chicago June 4-5.  This QRadar user group training event will provide sessions on popular topics such as product road map, architecture, tuning best practices, data ingestion, use case creation, etc.  Speakers are QRadar specialists, flown in for their specific skills related to the technology.

Event Image

via QRadar “Super” User Group – Chicago – Security

IBM Think 2019 | February 12 – 15, San Francisco

Join us at IBM’s flagship business and technology conference

Get hands-on experience with the latest technology. Extend your professional network into one of the world’s most celebrated communities of technologists and thought leaders. And have some fun while you’re at it.

Think registration opens September 17.

See the benefits of attending

via IBM Think 2019 | February 12 – 15, San Francisco

A CISO’s Guide to Obtaining Budget: Never Waste a Good Crisis (or Data Breach)


Unlike most resource allocation decisions within the enterprise, decisions involving security projects are often influenced by external events, namely data breaches encountered by other organizations in one’s own sector or industry.

via A CISO’s Guide to Obtaining Budget: Never Waste a Good Crisis (or Data Breach)

Most Organizations ‘Don’t Know What They Do Know’ When Assessing Application Security Risk

Ponemon Institute Study: Most Organizations ‘Don’t Know What They Do Know’ When Assessing Application Security Risk487552-630x330

It’s becoming virtually impossible to escape mobile apps. As a consumer, every time you go shopping, attend a major event, post content to social media or listen to the radio, you’re encouraged to download new, customized applications from content providers. Similarly, customer demand for new or updated functionality has shortened software release cycles and led to an explosion of software-based games, fitness applications and quickly evolving versions of popular social media content.

via Most Organizations ‘Don’t Know What They Do Know’ When Assessing Application Security Risk