Story image

Sungard AS named DRaaS leader by Forrester

25 Apr 2019

Sungard Availability Services (Sungard AS) was among the select companies that Forrester invited to participate in The Forrester Wave: Disaster-Recovery-As-A-Service Providers, Q2 2019. In this evaluation, Sungard AS was cited as a Leader in DRaaS.

Sungard AS received the highest score for both the Strategy and Current offering categories among the eight vendors included in the report. 

It was noted for its ability to “serve client needs at all stages of their need for business continuity.” 

The report also cites that Sungard AS “uses app-level orchestration to serve the most complex deployments,” and “assesses the success and failure of DR tests or invocations and ties SLAs to financial penalties.”

Sungard AS was also cited for presenting “the recoverability state as a “resilience score” that includes elements that affect recovery, including previous test successes and trends, recovery life-cycle management, and applied automation.”

The report highlighted that Sungard AS “manages large-scale infrastructure recovery using application discovery and dependency mapping, automated change management, and advanced orchestration tools that automate recovery tasks at a business application level.”

“I believe this Forrester Wave report illustrates how Sungard AS has continued to innovate and deliver market-leading capabilities to improve enterprise business resilience,'' says Sungard AS product management for global recovery services vice president Joseph George. 

“With our broad range of advanced, multi-tier DRaaS services and cloud recovery solutions, our customers can be sure they''re significantly improving their resilience posture. That’s more critical than ever given today’s digital economy.”

The Forrester Wave report evaluated eight DRaaS providers on three categories divided into 34 criteria, including:

  • Current offering: Criteria includes core DRaaS offerings, recovery objective capabilities, technology support, data transfer, change management, ownership of recovery tasks, data resiliency and risk mitigation, security, self-service management, self-service reporting, consulting services, scale, supported disaster declarations and concurrent failure handling
     
  • Strategy: Criteria includes services offerings strategy and corporate strategy
     
  • Market presence: Criteria includes install base, revenue, revenue growth, employees, geographic scope, customer feedback and technology partners
Chillisoft rounds out portfolio with file integrity vendor
Tripwire is the fourth vendor for Chillisoft in six months, adding critical security controls, vulnerability management and file integrity monitoring.
ESET researchers break down latest arsenal of the infamous Sednit group
At the end of August 2018, the Sednit group launched a spear-phishing email campaign, in which it distributed shortened URLs that delivered first-stage Zebrocy components.
Google 'will do better' after G Suite passwords exposed since 2005
Fourteen years is a long time for sensitive information like usernames and passwords to be sitting ducks, unencrypted and at risk of theft and corruption.
Who's watching you? 
With privacy an increasing concern amongst the public, users should be more aware than ever of what personal data companies hold.
Fake apps on Google Play scamming users out of cryptocurrency
Fake cryptocurrency apps on Google Play have been discovered to be phishing and scamming users out of cryptocurrency, according to a new report from ESET.
Optic Security Group celebrates Axis accolade
Auckland-based business security systems provider Fortlock has picked up an award at Axis Communications’ annual Oceania Axis Partner Summit 2019.
Managing data to comply with privacy regulations - Micro Focus
It’s crucial for organisations to be able to access, understand, and accurately classify the data they have so they know how to treat it.
Hackbusters! Reviewing 90 days of cybersecurity incident response cases
While there are occasionally very advanced new threats, these are massively outnumbered by common-or-garden email fraud, ransomware attacks and well-worn old exploits.