Which hosting service is the best fit?

Take a look at hosting providers and the services they offer, and it can feel like a minefield of choices! Here’s our breakdown of the most popular options, cloud and dedicated to hopefully lend a helping hand!

 

Cloud

‘Cloud Hosting’ involves your environment being held on a shared virtual network. This option is very cost effective as you only pay for what you use.

Despite the sharing of hardware, the performance, security and control is still exactly the same as on-premise. Perhaps the biggest benefit of cloud hosting is the ability to scale up and down the resources you need within seconds. This is especially important for companies that regularly change their user numbers or have plans to expand and makes the whole process a lot quicker.

Not only can the costs of outright hardware purchase be saved, the rolling costs of additional office space for cabs, power, cooling and provision of internet connectivity can also be lowered. Often these costs are not factored in when making the choice between on-premise or hosted but can take up quite a chunk of outgoings!

Dependant on the service agreement, the hosting provider could also handle backups, patching, upgrades and general maintenance, removing the pressure from any in-house IT staff allowing more important tasks be dealt with.

 

Dedicated

This option involves the rental or purchase of hardware on which is yours, so no other business will ‘share’ the environment with you. Dedicated hosting is more suited to companies who have a steady capacity demand that is unlikely to change over time, or those with exceptionally high level of security needs.

Unless support is provided as an ‘add on’ service, a downside is still needing an in house IT team to handle patches, upgrades and general support issues. Lead times for any additional resource is also considerably longer than cloud hosting, as extra hardware may need to be ordered.

For high availability and DR environments, the costs can also be very high with double the hardware, software and man hours needed to arrange the setup, maintenance and support.

Support may not be included as part of the service agreement for dedicated environments; not an issue should you still have an in-house IT team, but another cost to think about should you be relying on the data centre provider for this!

 

The Choice is Yours..

There is no ‘one size fits all’ solution for hosted options, as every business has different needs. Netshield can help you, and also provide exactly what you require. For more information about our cloud and dedicated hosting options, contact us today. 

Advertisements

Backup and Recovery…The types you need to know about

What is Back-up and Recovery?

A good back up is crucial in a business environment, a back-up strategy is the most effective and efficient way to protect your vital data. It provides a safeguard against unexpected data loss and application errors; should you lose your original data, you can use the backup to make it available again.

With the rise in cybercrime and malicious viruses and malware plus, the potential of accidental data loss, backing up and storing your data has never been more important. A company should always have a disaster recovery plan to deal with potential disasters, a plan to ensure the continuation of regular functions. By backing-up the effects of a disaster will be minimised and the organisation will be able to either maintain or quickly resume mission-critical functions.

The Different Types of Data Back-ups

Full backup

It is a method of backup where all the files and folders selected will be backed up. When consequent backups are ran, the integrated list of files and will all be backed up. The advantage is data restores are fast and easy to manage as the full list of files and folders are in one backup set. It is also easy to maintain and can be restore in various forms.

However, backups can take some time as each file is backed up repeatedly each time it is ran which can consume a considerable amount of network resources. This method absorbs the most storage capacity compared to incremental and differential backups. The exact same files are stored repeatedly which results in inefficient use of storage.

Mirror Backup

As the name states a mirror of the source being backed up. With this backup a file in the source is deleted and that file is eventually deleted in the mirror backup. This technique is clean and ensures the backup does not contain old and out-of-date files. But, there is a chance that files in the source are deleted accidentally, by distribution or through a virus.

Incremental backup

This is when once the initial full backup is completed consecutive incremental backups runs – it will just save the data that has been changed since the last backup, making it much faster backup than a full backup. The incremental technique is quicker and consumes less network resources. It also provides adequate use of storage space as files are not duplicated unlike the full backup method but, restores can be slower and more complicated.

Cloud Backup –

This is also known as Online Backup and Remote Backup – it is when data is backed up to a service or storage facility connected over the Internet. A form of offsite backup so, if anything happens to the premise like a fire or a natural disaster, the data is safe in a different location. The data is also replicated across different storage devices, usually serviced by multiple internet connections so the system is not at the point of failure and it provides easy backup accessibility with an internet connection. If the service is provided by a good commercial data center, the data will be managed and protected. The downside is it can be more expensive than local backups and the backup and restore times can be dependant on the availability of network bandwidth. Also depending on the service provider the owner of the data may not always be in full control of your files i.e. determine which datacenter the data is stored in or there may be security risks involved such as other people viewing your files especially if it’s not encrypted.

Offsite Backup

This is any backup where the backup storage medium is kept at a different geographic location from the origin is known as an offsite backup. For example, an administrator storing the data onto a tape drive and then take it to another location. Cloud backup is also a form of Offsite backup. It gives a company a peace of mind because if a disaster was to strike at the office like theft, fire, flood, earthquakes, hurricanes and more, there is a backup offsite to recover from. However, it may cost more because usually rotation between several storage devices is required. Another disadvantage is storage devices are not always reliable and often needs to be replaced because the more frequent handling of storage devices, the risk of damaging the delicate hard disk is greater.

For more information on the different types of backup and a discussion of our services please feel free to call us on 0845 603 5552.

Anti-Virus – Do we still need it or is it doomed?

With the advancements in technology the threat landscape is evolving too.

Malicious software is becoming harder to detect and remove – it is also starting to affect a wider range of devices because of the ‘Internet of Things’. There has been some cases that advance malicious software can even bypass the anti-virus software by changing its code!

In some ways there is truth behind what Brian Dye, senior vice president of Symantec famously said a few months ago ‘Antivirus is dead’ and it is ‘doomed to failure’ because Anti-Virus relies on a signature database to block out malicious behaviours so, if a particular piece of malicious code has never been seen before – you will probably be a victim to it.

However AV is not completely doomed as Eugene Kaspersky quite rightly said, it is still ‘very much alive and kicking’ because as threats evolved so has the traditional AV. It is about choosing a product that has a database that is continuously updated and have a good feature set.

Many vendors are now reinventing AV and changing it to ‘Endpoint Security’ which offers a wider range of features from your standard things like Anti-Virus, Anti-Spyware and Anti-Malware but, include features like application control, mobile device security, encryption and rule-based system behaviour blocking.

However security has become more complex and just because AV or ‘Endpoint Security’ has more features, we cannot just relying on it to be the sole system defences, it is not viable anymore. It will not provide an adequate level of protection for a modern day complex network.

Networks have developed into complex environments with multiple layers and a range of devices connected so, a layered approach to network security is key because it helps protect the different level within the infrastructure.

AV should just be seen as the first line of defence only, its aim is to protect users from things like spam emails, malicious attachments and websites. Occasionally some will get through but this approach is more secure and safer. Always keep in mind there is no 100% defence against the malicious cyber-attacks because the variables are always changing. Continuously network monitoring is also key to catching any abnormal behaviour.

For more information on network security please feel free to contact us on 0845 603 5552 or info@netshield.eu

Netshield Anti-Virus service – powered by BitDefender

Anti-Virus software is a necessary evil – it can take valuable time and energy to deploy, update and manage and they are not all the same! Netshield Anti-Virus is a comprehensive solution that acts as your first line of defence against malicious software.

Check out the video below for a quick summary…