<img alt="" src="https://secure.leadforensics.com/100666.png?trk_user=100666&amp;trk_tit=jsdisabled&amp;trk_ref=jsdisabled&amp;trk_loc=jsdisabled" height="0px" width="0px" style="display:none;">
SALES & SUPPORT 844.600.0075

How to Protect Against Meltdown and Spectre Vulnerabilities

As many of you have read or heard in the news recently, the Meltdown and Spectre vulnerabilities are a large concern for many organizations and Technology Managers. The issue is not specific to any one vendor and takes advantage of techniques commonly used in most of the modern processor architectures. This means that a large range of products are affected, from desktops and laptops to servers and storage, even smartphones. You should note, and as Intel reports in their FAQ, researchers have only demonstrated a proof of concept.  Here are some suggestions that you and/or your organization can take to help mitigate the risks from the Meltdown and Spectre Vulnerabilities:

Read More

CloudSAFE leverages ZERODOWN™ Software to provide Cloud Migration Services to AWS, Azure and CloudSAFE Hosted Private Cloud

PRWEB July 14, 2017: Migrating to the public cloud can be a significant challenge for organizations with existing infrastructure. Moving data and applications from legacy systems can take months and cause slowdown and service interruption. CloudSAFE has teamed up with ZeroNines to offer organizations a secure, uninterrupted migration to the cloud. Leveraging the power of ZERODOWN™ Software Always Available™ technology, organizations can realize their cloud strategies with no interruption to applications. No longer is cloud adoption and infrastructure migration a long and cumbersome process.

Read More

Petya (NotPetya): Yet another reminder - YOU NEED BACKUP!

Another global cyber attack is all over the news today. I'm sure you've heard or read about it. Petya, or NotPetya as security researchers are calling it, is wreaking havoc around the world. And, this ransomware is worse than WannaCry from last month. According to David Kennedy, former NSA analyst and cybersecurity entrepreneur, as quoted on Forbes.com (read the article), "the ransomware finds passwords on the infected computer to move to other systems. It does that by extracting passwords from memory or from the local filesystem, he explained."

Read More

DR Planning - 7 Additional Ingredents you Might Want to Include

An article printed in CIO magazine last summer entitled “8 ingredients of an effective disaster recovery plan” by Jennifer Lonoff Schiff (Jul 5, 2016) discussed important DR components with several IT executives and disaster recovery experts who shared advice on how to create a DR plan.  Based on our experience at CloudSAFE, you may also wish to consider these additional ingredients for your overall DR plan.

Read More

When Recovery Goes Wrong – What Do You Do Now?

Many seasoned system administrators have found them themselves in tough places when trying to recover system images and data. You know the feeling; it is awful – everyone wondering when the system is going to be “normal” again, persistent help desk calls wanting to know what to tell customers, living in the ops pressure cooker of everyone trying to help you and, oh yes, those recovery objectives that management is holding you to deliver. There are many scenarios that can sabotage even the best plans for consistent system and data recovery – system upgrades that go awry and leave one in no-man’s land; merger of apps and data under one storage management umbrella resulting from that new company you’re merging into your enterprise; moving storage management to a public cloud provider and losing control of configuration management of data changes; changing security permissions on files and watching the process goes south on you; etc. Yes, it’s easy to view the world from a deep hole during these trying times.

Read More

Surprise! You’re Probably not as Protected as you Thought!

Recently, we have seen several instances when IT failed both customer and business expectations, the most visible being Delta’s IT outage that occurred on August 8, 2016. The business impact to both the customer and business was detailed on the front page of most business newspapers. As an IT leader, this is NOT the place you want to see the negative results of your IT strategy and investments reviewed and scrutinized.

Read More

Aras Corp completes a smooth transition to CloudSAFE® IT

“Cloud vs. On-Premises is hotly debated within corporate environments everywhere, but CloudSAFE made the decision easy for Aras”, said Mark Beaulieu, CIO and VP of Technical Services at Aras Corp. “Our IT environment was at capacity and unable to service the increasing demands of our business. It was very difficult to forecast CAPEX and OPEX requirements for an IT refresh due to our rapid growth. I was spending too much of my time trying to keep things running smoothly for our organization.”

Read More

About this Blog


How can you leverage The Cloud? How will you get there? What will protect you from disaster? Your cloud journey can start anywhere and evolve. CloudSAFE can help you no matter where you start or where you want to go.

Everyone says you need to be in The Cloud. But why? And how? CloudSAFE can help you determine what that means to your company and the best way to get there. The Cloud can be a powerful tool. It provides flexibility, security, capacity and it’s cost effective, enabling you to avoid capital investment. But the question remains, what is right for your company? Contrary to popular opinion, The Cloud is not one size fits all. CloudSAFE has a broad range of solutions and services focused on IT Business Continuity and Infrastructure as a Service.

CloudSAFE believes The Cloud is not “One Size Fits All”. Follow us on our blog and see what else we believe in, and be sure to share your feedback with us.

Subscribe to Email Updates

Recent Posts