This week Opalesque Radio featured an interview with Bob Guilbert, managing director here at Eze Castle Integration, on addressing operational challenges facing hedge funds with cloud solutions.
The 9:30-minute podcast covers a range of topics. You can listen to the full podcast HERE, just jump to the sub-features that interest you most below.
Are you like one of the millions of people pondering the answer to ‘what is hypervisor-based replication and how will it change my disaster recovery approach’? I know I was.
So, let me help you with that!
Our technology experts here at Eze Castle Integration spent some time in the lab testing and evaluating hypervisor-based replication and recently incorporated it into our Eze Disaster Recovery 2.0 offering. We think it delivers excellent benefits, but let’s start with the basics.
What is hypervisor-based replication?
TechTarget defines hypervisor-based replication as “a technology that automatically creates and maintains replicas of virtual hard disks or entire virtual machines (depending on the platform that is being used).” Analyst firm IDC goes on to say that this replication approach “protects virtual machines (VMs) at the virtual machine disk format file level rather than at the LUN or storage volume level, thus replication can be done without the management and TCO challenges associated with array-based replication.”
Last month our friends at eSentire published a Cloud Security Checklist to provide hedge funds and alternative investment firms a guide when evaluating a cloud provider such as Eze Castle Integration. The Checklist asked the question, “How can you know if your Cloud Service Provider has your best risk management interests in mind?”
Since here at Eze Castle Integration we are big proponents of secure cloud computing, we thought we’d be the first cloud service provider (that we know of!) to complete eSentire’s checklist.
1.0 Physical Security: Does the cloud provider have a rigorous physical access protocol?
Yes, yes and yes. Eze Castle has detailed Access Control and Premise Access policies that extend from physical to virtual environments. Following are some of the key physical access control protocols we have in place:
24x7x365 manned lobby with visual verification of identity
Two-phase authentication of visitors (card and biometric)
Secured access at all entry points, including doors and elevator banks
Monitored security cameras as well as door, motion and camera sensors
Visitor logs closely monitored and escorts required at all times
Key-locked cages and cabinets at all data center facilities
Public cloud tools and free file sharing services are wholly owned and managed by third-party providers. Because infrastructure costs are spread across all users who are employing the service, each individual client is able to operate at a low cost. Public cloud tools are typically larger in scale than private enterprise clouds, which provide users with seamless, on-demand scalability.
These factors may seem to support the belief that public clouds and free file sharing services would suffice for a business’s basic infrastructure and file sharing needs. However, upon closer examination, it is clear that there are a number of areas in which these tools fall drastically short of meeting the crucial business needs of investment management firms.
Today there is no excuse for a hedge fund not to have a disaster recovery plan in place. Both investors and regulators have raised their expectations and want to be sure that appropriate safeguards are in place.
Private cloud solutions are ideally suited to meet a hedge fund’s requirements for backup storage and disaster recovery (DR) solutions. Additionally, the growing acceptance of cloud-based services has driven down the costs substantially, making these solutions highly economical for funds of all sizes.
While business continuity planning (BCP) focuses on the people and processes needed to keep a hedge fund or investment firm in business – such as selecting a backup work site for staffers in an emergency – DR solutions emphasize the technology necessary to support a firm’s operations. In both areas, firms need to understand their operational processes and specific risk landscapes.
Happy 5th of July!
We interrupt this holiday week to talk about how cloud services are expanding disaster recovery options for users of Storage Area Networks (SAN that is).
A traditional SAN-to-SAN disaster recovery scenario may rely on host-based replication technology transmitting data and applications between two mirror SAN environments. While this works for some firms, cloud technology presents a viable, cost-effective alternative where data and applications from a firm’s production SAN are replicated to a cloud environment for disaster recovery.
At the end of last year, we predicted that cloud computing would remain a hot technology trend in 2012 – particularly on the security front. As more and more firms move to this platform, we continue to see the technology and processes within the cloud evolve to support the growing needs of its users.
Following are five key cloud computing trends to look for in 2012:
1. Education will remain important.
The industry came a long way in 2011 in terms of learning about the cloud – what it is, how it works and more. But believe it or not, there is more to be learned. In 2012, we expect conversations to go to a deeper level and focus on topics such as cloud security, operational best practices within the cloud and cloud technology specifics.