Blog

Agility: Driver for Cloud Adoption

July 1, 2015 by Diana Nolting

Just a few years ago I recall overhearing a conversation about cloud in which several IT staffers were debating the use case of why you would use cloud. “Only for something I don’t care about, it’s way too insecure,” said one. “DR only, I can’t trust my important stuff with cloud,” followed up the second….

Tech Talk: Recovery Assurance

June 30, 2015 by Kayla Catron

Disaster recovery is not new. As long as businesses have existed, the need to protect and recover has existed as well. What is new, however, is the evolution of DR for businesses over the past decade. As replication technologies and reliability increased and the cost of protection has decreased, more businesses are finding reliable, affordable…

Four Levels of Security Controls

June 26, 2015 by Kayla Catron

Security is of upmost importance in the financial industry, and it’s not easy. While some tasks may fall to the bottom of your never-ending to-do list when time and resources are limited, security simply cannot. If you have highly sensitive, highly regulated data, consider an Intrusion Prevention System (IPS) Managed Service. Bluelock’s IPS service offers…

Beyond the SOC Audit

June 24, 2015 by Veronica Miller

Bluelock completes a SOC II audit annually. This means that our internal controls have been audited by a third party on widely accepted set of guidelines called the Trust Service Principles. Bluelock elects to complete the SOC II because it contains a higher level of technical information which our clients and prospects find helpful. An…

Tech Talk: Recovery-as-a-Service

June 23, 2015 by Kayla Catron

Having an effective disaster recovery plan is more than just a technology problem. Implement and maintain a strategy that will work when you need it most. Bluelock’s Recovery-as-a-Service solutions can help you do just that. Bluelock’s RaaS is a complete solution that incorporates top tier technologies with insightful tools and proven processes to ensure that…

When HIPAA compliance matters to you in hosting and recovery:

June 16, 2015 by Kayla Catron

When protection and security matter most, you need a provider who can interpret and apply compliance regulations. Trust your provider to offer recommendations and advice on how to protect and secure your cloud hosting and recovery environment. Choosing Bluelock for hosting and cloud recovery solutions provides you a secure, protected, compliance environment for your HIPAA-covered…

7 reasons to consider a new Cloud Service Provider

June 11, 2015 by Kayla Catron

Simply migrating to the cloud is not enough to make a solid return on your investment. To do so, you need a larger vision and strategy in terms of what you want your business and IT organization to be able to accomplish that you cannot have or do today. By freeing your team from the…

Move Your Applications to the Cloud in 4 Steps

June 2, 2015 by Kayla Catron

Few cloud service providers offer companies a choice of multiple types of virtual datacenters to service the needs of different workloads and different business requirements. However, the ability to match workloads to virtual datacenters based on specific characteristics can drastically increase efficiencies. To choose the right virtual datacenter for the right workload follow the four…

6 Considerations to Choosing a Cloud Hosting Provider

May 27, 2015 by Kayla Catron

Give your IT team freedom from the daily details of infrastructure management by moving to the cloud. Personnel, resources and time are all at a premium for small infrastructure IT teams, and a key benefit we see for companies who move to the cloud is their ability to refocus their staff on business-centered projects as…

How To: Create a Snapshot in your Bluelock VMware Environment

May 1, 2015 by Diana Nolting

If you’re new to using snapshots in your VMware environment you likely have a lot of questions. We dug into an introduction to the Do’s and Don’ts of Snapshots yesterday, which is a great primer to understanding risk to your environment and how to best mitigate that. Today, we’re going to go a step deeper…