Blog

Beyond the SOC Audit

June 24, 2015 by Veronica Miller

Bluelock completes a SOC II audit annually. This means that our internal controls have been audited by a third party on widely accepted set of guidelines called the Trust Service Principles. Bluelock elects to complete the SOC II because it contains a higher level of technical information which our clients and prospects find helpful. An…

Tech Talk: Recovery-as-a-Service

June 23, 2015 by Kayla Catron

Having an effective disaster recovery plan is more than just a technology problem. Implement and maintain a strategy that will work when you need it most. Bluelock’s Recovery-as-a-Service solutions can help you do just that. Bluelock’s RaaS is a complete solution that incorporates top tier technologies with insightful tools and proven processes to ensure that…

When HIPAA compliance matters to you in hosting and recovery:

June 16, 2015 by Kayla Catron

When protection and security matter most, you need a provider who can interpret and apply compliance regulations. Trust your provider to offer recommendations and advice on how to protect and secure your cloud hosting and recovery environment. Choosing Bluelock for hosting and cloud recovery solutions provides you a secure, protected, compliance environment for your HIPAA-covered…

7 reasons to consider a new Cloud Service Provider

June 11, 2015 by Kayla Catron

Simply migrating to the cloud is not enough to make a solid return on your investment. To do so, you need a larger vision and strategy in terms of what you want your business and IT organization to be able to accomplish that you cannot have or do today. By freeing your team from the…

Move Your Applications to the Cloud in 4 Steps

June 2, 2015 by Kayla Catron

Few cloud service providers offer companies a choice of multiple types of virtual datacenters to service the needs of different workloads and different business requirements. However, the ability to match workloads to virtual datacenters based on specific characteristics can drastically increase efficiencies. To choose the right virtual datacenter for the right workload follow the four…

6 Considerations to Choosing a Cloud Hosting Provider

May 27, 2015 by Kayla Catron

Give your IT team freedom from the daily details of infrastructure management by moving to the cloud. Personnel, resources and time are all at a premium for small infrastructure IT teams, and a key benefit we see for companies who move to the cloud is their ability to refocus their staff on business-centered projects as…

How To: Create a Snapshot in your Bluelock VMware Environment

May 1, 2015 by Diana Nolting

If you’re new to using snapshots in your VMware environment you likely have a lot of questions. We dug into an introduction to the Do’s and Don’ts of Snapshots yesterday, which is a great primer to understanding risk to your environment and how to best mitigate that. Today, we’re going to go a step deeper…

How do I use snapshots with my VMware environment?

April 30, 2015 by Diana Nolting

Snapshots can be a helpful tool for VMware technology users, and Bluelock cloud users. They allow you to record your virtual machines from a single point in time and capture the changes you are making. In case you need to revert to the earlier copy. While snapshots can be a useful tool, it’s very important…

Bluelock Announces Tailored Hosting and Disaster Recovery Solutions to support HIPAA Complaint Workloads

April 28, 2015 by Kayla Catron

Today, Bluelock announced two new secure cloud hosting and cloud recovery solutions for healthcare technology businesses. These tailored solutions can now choose a recommended, ideal mix of services and solutions chosen specifically to protect their most sensitive ePHI and HIPAA applications. Bluelock’s HIPAA-supporting hosting solution includes proven configuration options, implementation and onboarding processes designed for…

Get In Front of Disaster Recovery Planning

April 24, 2015 by Kayla Catron

Disasters are unexpected. Will your datacenter be able to perform a fast, full recovery when disaster strikes? Proper communication with your organization’s leadership, both IT and business, can help ensure your valuable infrastructure and applications will be protected, even when the unexpected occurs. A clear matrix of risk, recovery and expense creates a well-defined DR…