Data Foundry Blog - Managed Services

How Hybrid IT Strategies leverage colocation and cloud together

Blog img hybrid cloud colo

Cloud computing is a mainstay of digital business, and with the public cloud market generating a forecasted worldwide revenue of more than $500 billion by 2025, it’s clear that enterprises across all verticals are utilizing cloud-based capabilities for added agility, scalability and efficiency. The path to the cloud and the way in which businesses integrate it into their IT frameworks, however, can look different depending on the individual use case and the goals they’re trying to meet.

Read More

DDoS Attacks: What are They, and How Can You Be Prepared?

Img blog ddos attacks how to prepare data foundry

What is a DDoS Attack?

It’s an unfortunate truth that the landscape of digital threat is growing parallel to new digital business capabilities, with new cyberattack tactics emerging all the time. DDoS (Distributed Denial of Service) attacks, however, still remain one of the most dangerous when it comes to online business continuity. Both volumetric and application attacks exhaust targeted resources in order to degrade an enterprises’ website’s functionality. These DDoS attacks may not be as easy to see and can be stealthy, and they can effectively put a halt to your online operation.

Read More

Get Uninterrupted Sleep with a Skilled Remote Hands Team

Vitrual hands

Consider this inconvenient scenario: It’s 3 a.m., and you’re snuggled into bed, a hundred miles away from your organization’s servers, when an urgent call wakes you. Something has gone awry, your network has crashed, and no one else is available. Begrudgingly, you head out in the dark for the long trek to the data center and spend the next several hours troubleshooting and replacing equipment.

Read More

How to Choose a Web Application Firewall

Df blog waf firewalls 2 blue

Web application firewalls or WAFs can protect your website and web applications from a variety of attacks and intrusions that your network firewall can’t. Depending on the WAF your security team chooses, it can protect against XSS attacks, SQL injection, session hijacking and buffer overflows. If your website or application processes payments, it’s especially important to have a WAF, and it is a necessary standard to comply with PCI-DSS. Even if you don’t process payments, a WAF can protect against fraud and prevent malicious actors from tampering with your website and your applications.

Read More

Ignoring Messy Data Center Cabling? Here’s Why It’s Risky

Df cabling blog

“We build our computer systems the way we build our cities: over time, without a plan, on top of ruins.” – Ellen Ullman

If this sounds like your data center, it’s time for a change. That bird’s nest of cables costs you a little bit more every day in energy and productivity. Here’s why:

Read More

Backup and Recovery: Planning for Hurricane Season

Blog business continuity

Ensuring you have a backup and recovery plan in place before the season’s hurricanes hit is essential for companies worried about business continuity. The last thing you want is to permanently lose data, or to experience several hours or days of downtime due to a power outage. If you don’t already have a backup system in place, there’s no time like the present to get started. Read our blog post on choosing a backup strategy for more information on how to begin. If you have a backup strategy, keep reading to see if your plan is sufficient to properly restore your systems and applications in the event of a local disaster. Just because you regularly perform backups does not necessarily mean your systems will be properly restored when the time comes.

Read More

Stopping Petya & Global Cyber Attacks: 6 Precautions to Take

Blog bitcoin petya

Only six weeks after WannaCry, a similar type of ransomware has hit organizations and spread globally. Petya has mostly affected companies in Ukraine, but has also struck organizations in 64 other countries, including major companies in the U.S., such as Merck & Co and Mars, Inc. Experts are still working to understand Petya and its mechanisms of action, and no kill switch has been discovered yet. However, there are a few basic precautions announced by our partner Radware that your company or organization should take at a minimum to stop the spread of ransomware and other viruses.

Read More

OpSacred 2017: Financial Institutions to Face Anonymous-Driven DDoS Attacks

D Do S attacks Op Sacred

Anonymous, a notorious international network of hacktivists, launched OpSacred on June 11, 2017. OpSacred is an organized DDoS attack effort on financial institutions around the world. Anonymous is known for its DDoS attacks on government and corporate websites, and they are self-described as having “a decentralized command structure that operates on ideas rather than directives.” OpSacred is the continuation of a larger operation called OpIcarus (Operation Icarus), and OpSacred is expected to continue until June 21.

Read More

VPLS Vs MPLS and How They Work Together

VPLS network

Many business professionals who are seeking the most cost-effective and efficient solutions for their networks are unclear about the differences between Virtual Private LAN Service (VPLS) and Multiprotocol Label Switching (MPLS) and the benefits they provide. While they are two different concepts, they work together to provide an efficient and cost-effective network solution for a growing number of organizations.

Read More

Data Foundry Provides Market-Leading Backup & Recovery Service

170501 managed backup blog

As business continuity and data recovery become more essential for companies across the board, there is a growing demand for an efficient backup solution that can cover a variety of workloads. We’re pleased to announce a new managed service for our colocation customers, Managed Backup. Our Managed Backup service is a leading enterprise backup solution that allows users to backup or recover terabytes of data in minutes, not hours.

Read More