B2B Tech Talk with Ingram Micro
B2B Tech Talk with Ingram Micro

Episode · 1 week ago

Keeping data safe through business continuity and disaster recovery

ABOUT THIS EPISODE

To ensure the longevity of your business, your data must be protected. That’s why business continuity and disaster recovery have become such a hot topic. 

Shelby Skrhak speaks with Cheryl Rang , Executive Director of Advanced Solutions at Ingram Micro , and Gus Iannello , Technical Account Manager, and Danny Marmol, Senior Technical Marketing Engineer, both with Ingram Micro’s Data Center Tech Force, about: 

- The importance of business continuity and disaster recovery

- Security aspects of data

- Business continuity and disaster recovery strategies

- Growing opportunities for resellers 

Email the Data Center Tech Force or visit Ingram Micro’s Penetration Test Assessment for more information. 

To join the discussion, follow us on Twitter @IngramTechSol #B2BTechTalk 

Listen to this episode and more like it by subscribing to B2B Tech Talk on Spotify , Apple Podcasts , or Stitcher . Or, tune in on our website. 

You're listening to be tob tech talk with Ingram Micro, the place to learn about new technology and technological advances before they become mainstream. This podcast is sponsored by Ingram micros imagine next. It's not about the destination, it's about going someplace you never thought possible. Go to imagine next DOT Ingram microcom to find out war. Let's get into it. Welcome to me to be tech talk with Ingram micro. I'm your host. She'll be Scaryhawk, and our guest today our Cheryl Ring, executive director of data center solutions at Ingram Micro, yll Saanello and Danty Marmal from Ingram's data center tech force team, Ryl Gus and Danny, thanks for joining me. Absolutely. Thank you for having us. Well. Great. So today we are going to talk about disaster recovery and business continuity and the really the importance of keeping data safe. So Sheryl took kick things off. Could you set the scene for us? I made. Basically, why is disaster recovery and business continuity a really important topic right now? Yeah, absolutely, and it's amazing because it organizations today our face with such massive data growth, and it can be both our gold mine. You know for how you can use the data to make money off of it, but it can also be a bit of our Kryptonite, depending on how prepared we are to deal with it when things might not go you know exactly how you thought. So we're seeing increasingly complex data center environments and the need to be up and running twenty four by seven is becoming the new norm, and protecting our data from outages such as natural disasters, corruption or malicious attacks can be crucial to longevity of every business that we deal with. I actually just read an article recently that talked about how business continuity planning is one of the biggest challenges that our partners are facing today because of the complexity and differences of each of their environments, for not only their clients but for their own organizations as well. So I don't know, I think with the recent pandemic it's only going to make disaster recovery and business continuity planning shoot to the forefront...

...of each of those meetings that they're having. Yeah, absolutely, it's something that you don't want to think about, you know, worstcase scenario, but a lot of those worst case scenarios have happened and so you know, looking at those continuity plans is important exactly. Danny, can you talk about the key areas of disaster recovery, business continuity and and I guess explaining that and then why it's an important part of keeping data safe? Yes, of course, business continuity and disaster recover refer to the process and the solutions that allow companies to protect and re establish access to their business critical applications, their data and their it resources as quickly as possible after an outage or disruption. Generally, we measure BCD are with recovery time objectives, which are Ourtos, which is how long it takes to bring your applications back online, and recovery point objectives are pos, which measure how much data loss in organization can tolerate at the recovery event. Back in the day it was measured in days and weeks and now most companies are looking to be as close to zero as possible in their Ur pos and Urtos. So, just as a follow up to that, I mean and so the recovery time. It was typically yea two to three days and and that has shrunk drastically. Or are we talking, you know, a major, major disaster could be putting a business out of the commission for a week or two, and now that has dru dramatically shrunk. Yes, ma'am, that is true. Well, guess what about the security part of this? Well, you know, from a security perspective, is sheryl mentioned, data is really is really growing very quickly, and that's mostly do because technology continues to take more and more of a prominent role and that really only driving business forward, but really everything in modern life now, and...

...that's going to influence and continue to influence this date of growth at an exponential rate. And something else that share a pointing out is that, alongside of the State of growth, we've really seen some changes in terms of, you know, the quote Unquote Data Center, and what I mean by that is that it environments are becoming increasingly more complex, really because organizations have on masks start to embrace hybrid or multi cloud infrastructure. So really the problem here is that not only is day of growing, it's starting to scan or sprawl across this this new infrastructure, and a lot of challenges that it are facing now are due to these new vulnerabilities that are really forcing these it admints to redefine and rethink their approach to BECD are, because not only, you know, do they need to make sure that data is protected, but they have to make sure it's available across all these these different elements of their infrastructure and standing pointed out and much more quicker, or much more I guess you'd say, a shrunken time window, like Danny was saying. So that responsibility even extends to a lot of vendor hosted solutions that customers are utilizing. You know, for example like off three hundred and sixty five, and we see a lot of customers embracing these these SASS applications because they offer convenience and they are providing the the absence of a local data center footprint. But those, those still need to be considered and how we keep that data safe and again, available and easily recoverable. Yeah, so there's no easy button. I mean the hybrid infrastructure. That's just, you know, the state we are in, and there's nothing there's nothing wrong with that per se, but it's just, you know, you're saying to keep it in mind and keep an eye on the security aspects of this that as we start to have that sprawl, that the same attention and I guess security is applied across all of these implementations, right. Yeah, absolutely, because you know, your data is data where...

...other you know, regardless of where it exists. So whether it's date of protection or if you have to fall under some sort of compliance standard, that data is not handled any differently. So organizations need to plan for that is the same they would as data that exist within their data center. Got It. Got It well, so, Cheryl, now that we've got the what, then let's talk about the why. So can you tell us about the size of the opportunity in this space for resellers and it what is really making this area such a high priority in the market right now? Oh, yeah, it is huge. I mean, not only are we expecting this market to grow into over twenty six billion by two thousand and twenty five, but with the massive amount of data that's being produced and the location and organization of that data becoming complex and kind of unknown, we know that this is a huge opportunity for our partners to be able to help their clients think about what they're doing to protect those environments. The good news is that as they become, you know, the champion for this for their clients, they'll realize that having a plan in place will not only create a more secure environment, protecting themselves from security threats like ransomware, but it also gives them an opportunity to build environments and a more scalable, flexible way that can be a lot more cost effective and better use of their own experience for themselves, for their end users, for customers, etc. So they have to be thinking about how they'd build this in because if they don't guarantee someone else will be well. So, guess you mentioned some of the challenges to BCB Aur, BC DR and they've brought on by this hybrid cloud and diverse infrastructures. What are you in the Data Center Tech Force team hearing about what's creating these changes in customer environments and what their needs are in terms of business continuity and disaster recovery? So one of the I guess you call buzz words that you know I hear a lot, especially when talking to partners and customers, is about digital transformation. Right, and when I say digital transformation, and like we've been talking about already, it's that's moving to the cloud, that's moving to service based...

...offerings that promise things like agility and more flexibility in the infrastructure. Right you know, the ability to whether it's move from a cat x to an op x or vice versa, or the ability to leverage things like us. You know, the scalability of the cloud or elasticity. But really what that does is that that has created some gaps now in things like data protection and BCD are strategy, because they're really the adoption of these types of solutions has really sped up, especially over the past few years with everything that has happened. You know, the necessity for this digital transformation became really prominent, especially during the pandemic, in the lockdown, because we needed ways to be able to keep businesses afloat and keep business units and an associates working together and communicating and operating without being able to actually go into the office. And that's really where you saw the rely some things like collaboration tools, your team's zoom, Webex one drive, you know what I have you any of these collaboration platforms that now host data? Well, we're still using them, because things like work from home or work from anywhere are definitely here to stay either. Are Ton of studies being done around how it is now preferred by, you know, a lot of working people to be able to have that option. So we're going to be using these collaboration tools and what these are now our data silos. So again really kind of goes back to what we were already talking about as part of the digital transformation hybrid infrastructure, is that we need to be able to really protect these workloads the same way that we would are on prem workloads. And not only do we need to be able to protect them, but one of the things that, you know, I talked to it folks about is the you know, they really like the experience that these hosted or Sass or collaboration tool type interfaces or offerings provide. So they're looking for that...

...same type of experience with their data protection solutions. So we have customers that are definitely not looking for you know, intensive or resource and sense of excuse me, or on Prem Solutions. I'll be that are all components exist within the data center. They want to be able to kind of capitalize on that same type of experience when it comes to even protecting data, not just the collaboration tools or cloud baseball gloats. Yeah, well, it's interesting to hear you say you know the data sellt silos that are being created, because we know those can be vulnerable to to ransomware. Things that that aren't top of mind sometimes kind of fall to the to the wayside, if you will. But we hear a lot about ransomware and as these threats really evolve, what strategies should organizations really implement within their business continuity and disaster recovery strategy to make sure that their data is safe if they get hit with ransomware? And I'm going to ask both guests and Dandy this question. Guess, Lemia, go to you first. Sure. Well, I think the first thing that every organization needs to realize that it's no longer a matter of if, but when. I believe it's by two thousand and thirty two. Every eleven seconds a business will be hit with ransomware. So once you do you change your mindset to that you're going to be continuously on a defensive posture, than that really will dictate them what you're going to be doing from a data protection standpoint. So for me, I always say it's better to recover than have to pay any type of ransom or pay any third party to recover your data. But you know, in the past or even still we, you know, a lot of customers are still relying on the idea, well, we back everything up so we're protected, and unfortunately that's that's no longer the case because obviously ransomware is getting more sophisticated. It's attacking backupsets, it's going in and encrypting...

...or deleting your backup data so that you can't recover and it's not, in some cases, just good enough to say well, you know, we pay for manner services or we have, you know, technology providers that are backing up or data for us, because they're targeted just the same. So, you know, that's why we like to advise partners on utilizing solutions that are especially from a data protection standpoint, taking a more proactive approach to ransomware, whether it's integrating with things like a mutable storage, leveraging ai or machine learning to help, you know, look for any anomalies in the backup flow to see if, you know, anyone's trying to get in and edit that backup data, or even, you know, basic things like, you know, to factor authentication for your backup interfaces so that really you're locking down every step of the way, so that your backup data is safe. That so that when that ransomware attack does happen and takes down maybe you know, a few BMS, some crypts, some data, you're not having to pay any any type of ransom or or any any financial penalty to forget that data back. And just for listeners who may not be as familiar, what do you mean by a mutual storage? Yeah, so immutable storage is essentially a function that locks down your backup data from any outside processes being able to impact it. So that's you know, when ransom where gets in. What some of these ransomware attacks try to do is find your backup data, you know, whether looking for like a file extension, what have you, encrypt that data, delete it, edit it so that you can't recover from it. So what immutable storage does, and there are vendors that will integrate with, you know, third party storage providers, so your HPE's IBM, what have you, or they actually have it built into their own set of appliances. Essentially, what they're doing is they're not allowing any outside processes to attack that data, even in the absence of maybe a backup server or would have you. So...

...essentially it's guaranteeing the integrity of your backup data so that when you do have to recover, you are you're able to do so and there's there's no compromise there, right, Danny, have us here. Well, a lot of the things that have I've been hearing kind of revolver on zero trust, right, and that subject keeps coming up and up more and more nowadays. And to blow that down, it's a basic principle of trusting no person or no one or Norman, no device mentality within your or your environment. Basically that reduces your tax surface by constantly authenticating everyone at every turn and restricting some of the visibilities of what's visible to them within your environment. Right. So, normally that that would be a good way to lock your environment down with, you know, all the immutable storage that you can do and just kind of as the multi factor authentication, as gust mentioned. Got It. Got It well. We've talked about the threats. Let's talk about the solutions now. So, Danny, where do you start? I mean, what are the questions that that you should be asking yourself and what questions should resellers be asking? So normally the starting point would be to ask, Hey, where does my data live? Right? Is it in the data center or is it in the cloud? How and where should we be backing it up? How can we manage the data, their data, and how the your backup software handles ransomware attacks and trying to Crip your backups? As you can see, it's all about data protection, right. So all the questions are going to revolve around how you can protect your data and make it usable for you guys to recover if and when that happened, right, since that's the the topic, right. It's not if it happens, it's when it's going to happen. So Cheryl Win, that Reseller, asks those questions. What's next? I mean how can they identify the right opportunities in their customer base and really...

...drive demand for a new service offering like this? Yeah, absolutely, it's a great question and you know, I've had the pleasure of working with so many of the vendors that play in this space and I'll tell you you know, they have great assessments of their own, each offering their own flavor of BCD. Are Types of assessments and that can be a great way to get your foot in the door. At little or no cost to your clients, and that could be anything from, you know, configuration, health checks, compression estimators, performance and data placement, optimization, consumption utilization or forecasting. I've seen some partners, you know, put their own flavor on those assessments so that it becomes really them leading the conversation and I've seen some go even further than that. So a quick plug for IDN. They have a cyber range down in Cambridge Mass that does actual simulations where you bring in a workshop with you, your customers and you can understand what your plan looks like after a breach. It's kind of that right of the attack moment. Something happens and now what do you do? Do you have that full plan in place? So that also can be pretty shocking when you know how many customers can go into that knowing they don't have that plan or it's not as kind of Crete as they really thought it was. But it also shows that there's a tremendous opportunity to be that valley value add to your partners, to your customers and an advocate with them to walk through some of those scenarios and provide their own value and how they can help customers be more confident in the security around their environments. We we also have acquired a company called cloud logic last year and they do a lot of assessments around those hybrid cloud infrastructures and where they can really optimize some of the placement of where those workloads reside and making sure that it's working together with you and your security spin to make sure that it's a secure environment as well well. Mc Guess, we've been talking about some of the offerings out there. Tell us about the data center of Tech Force and and their role sure. Well, for me, you know, the...

...main goal of the data center tech forces is to help our partners understand what are the latest data center technology trends and we want to be influential in helping them build a practice around these trends. You know, we want to make sure that they're bringing the best solutions to market, you know, not only from a sales standpoint, but to help make sure that they are establishing, you know, that trusted advisor role amongst their customer base so that they have more influence in their customers decisions and really are there go to for not only solutions but but, you know, extending this knowledge that we provide them around technology trends and preparing them for the future. Our team has numerous subject matter experts that support a variety of vendors in the space and we really want to help partners understand where and when to leverage the latest and greatest in terms of emerging technologies. So we're definitely available to consult with end users or we're available to provide further training, whether it's deeper technical discussions with engineers or product positioning opportunity identification with sales reps. and what's great is that we are simply an email or phone call away. So, Danny, aside from engaging your team, what training resources would you point our listeners to on this topic? Ingram has a large list of vendors and and dedicated resources that specialize in helping partners expand their knowledge on various technologies and hold vendor focus trainings frequently to talk about the latest and greatest that are coming down the pipe with new trends that are out there. And you know, webinars are a good way to keep in mind what's coming down the pipe and things of that nature. Well. So guess if our listeners have questions how can they reach out? Sure, yeah, so they can reach out by sending an email to our data center tech force team at data center at Ingram microcom. That's data center at Ingram microcom.

Gust Danny and Ryl, thank you so much for joining me. Thank you for having us. Thank you. We're excited to hear the feedback and looking forward to talking with each of you as you reach out. Excellent. Well, and thank you listeners, for tuning in and subscribing to be to be tech talk with Ingram micro. If you like this episode or have a question, please join the discussion on twitter with the Hashtag be to be tech talk. Until next time, I'm shall be scarehawk. You've been listening to be tob tech talk with Ingram micro. This episode was sponsored by Ingram Micros imagine next. Bb Tech Talk is a joint production with sweetish media and Ingram micro. Ingram micro production handled by Laura Burton and Christine Fan. To not miss an episode, subscribe today on your favorite podcast platform.

In-Stream Audio Search

NEW

Search across all episodes within this podcast

Episodes (395)