TheConfident SMB SMBIT As Your Business Enabler IT As Your Business Enabler >TheBEAUTY is in thePACKAGE Design & Source Productions

Also >No More “Red Panic Button” >Messaging in a Bottle >Backup Leaps Forward ç Contents March/April 2010

Laura Tufariello, Kathia Toraño, Founder and Owner Accountant and IT Lead

Confidence in a connected world. TheConfident ç SMB Contents

Case Study No More “Red Panic Button” Founded in a downstairs room of 16 the home of founder Billy Wilson, Sandcroft Management Services understands entrepreneurship. With managed services from Vitality Consulting Services Limited and various Symantec technologies, Sandcroft is able to focus on In Every Issue 10 evolving and running its business. Cover Story By Patrick E. Spencer The Beauty is in the Package >16 The passion and attention to detail Design & Features Source Productions puts into its environmentally 23 Message in a Bottle sustainable products extend to its technology If you use email or instant Business Perspectives solutions with the help of Baroan Technologies messaging, your business is Deduplication: and Symantec data protection technologies. under attack every day—including It’s Everywhere! By Mark L.S. Mullins everything from spam to Thoughts and Analysis confidential messages leaving from Carine Clark >10 your organization, either >3 maliciously or accidentally. ThinkTank By Ken Downie >23 Find out what security trends will dominate in 2010, how cybercrime Backup Leaps Forward is getting much easier, 29 New data protection technologies migrate to Windows 7 can help you not only avoid in seven easy steps, ç potential disasters but aid in EDITORIAL TEAM reducing costs, saving time, and and more. Publisher and Editor in Chief Patrick E. Spencer, PhD Subscription Information boosting productivity. >4 Managing Editors Brian Heckert, Mark L.S. Mullins, Online subscriptions are free to individuals Dee V. Sharma, Donna Tarlton, who complete a subscription form at By Alan Drummer Courtenay Troxel http://go.symantec.com/theconfidentsmb- >29 Design Director Joy Jacob subscribe. For change of email address, Contributing Writers Ken Downie please send an email to Alan Drummer [email protected]. Mark L.S. Mullins Dee V. Sharma Privacy Policy Patrick E. Spencer Symantec allows sharing of our mail list in Web Producer Laurel Bresaz accordance with our corporate privacy Podcast Producer Jon Eyre policies and applicable laws. Please visit www.symantec.com/about/profile/policies/ < 2 > Symantec Marketing privacy.jsp or write us at theconfidentsmb_ Chief Marketing Officer Carine Clark [email protected]. Confidence in a connected world. Vice President James Rose TheConfident Business Perspectives Thoughts and Analysis from Carine Clark SMB Data Protection Data Deduplication: It’s Everywhere! ake no mistake about it: Most companies have duplicate data in two Information is the fundamental locations—on their primary storage, where they Mconnecting fabric of your store common information such as Microsoft business. You rely on information Office documents, and in their backup data.

technology and systems to run your With deduplication you can reduce the amount Messaging Security business, drive new opportunities, of data you store for backup and recovery by increase revenue, and operate efficiently. as much as 90 percent. Equally important, this Yet the volume of information and its new technology reduces data in remote offices continued growth is a challenge for companies and virtual server environments. of every size, especially for budget-constrained If you are just now considering deduplica-

SMBs. During the next four years, IDC estimates tion—or even if you already have it—you may y Case Stud that the digital universe will expand by 400 want to consider a more strategic approach to percent; however, IT budgets will expand just managing information overload. Put your data 20 percent and IT staffing 10 percent. You can’t storage on a diet. The feature “Backup Leaps y keep buying more disk or tape to store and back Forward!” delves into how you can tackle du- up this information because information growth plicate information, regardless of its location, continues to outpace IT expenditures for storage. with a single solution. This can reduce not only Stor Cover But there is a solution! It’s called dedupli- complexity and costs, but deliver more reli- cation. By compressing data and storing only able access to the information that drives your changes to the original data, deduplication is business. And that’s a direction you want your ç Contents about storing data only once. That can help you business to follow everywhere. reduce duplicate data everywhere, cut complex- ity, and shave IT infrastructure costs. Regards,

s Carine S. Clark Video Chief Marketing Officer, Symantec Carine explains how to manage information overload with deduplication. < 3 >

Confidence in a connected world. TheConfident ThinkTank SMB

The Enduring Family Business Protection Data A Third of S&P 500 Companies are Family Businesses that Began Small with a Big Vision

amily businesses are an often- or cannot be traded counterparts. overlooked form of ownership. inside and outside the According to

FYet they are all around us—from family. McKinsey’s Messaging Security millions of small and midsize companies 3. Participation. analysis, the that underpin many economies to Families that average family household names such as BMW, participate actively business Samsung, and Wal-Mart. A recent in company boards M&A deal was 1

McKinsey report finds that less than fare well. On average, 15 percent y Case Stud 30 percent of family businesses survive 39 percent of board members in family smaller, but total value added— into the third generation of family businesses listed on the S&P 500 are measured by market capitalization

ownership. However, those that do, tend inside directors, compared with 23 after the announcement—was 10.5 y to perform well over time compared percent in nonfamily companies. percent, compared with 6.3 percent for with their corporate peers. nonfamily counterparts.

4. Long-term perspective. Successful Stor Cover What are the attributes of family companies seek steady, long- 6. Philanthropy. Charity is an important a successful family business? term growth and performance, rather element in keeping families committed 1. Meritocracy. Successful businesses than short-term gains that avoid risking to the business, providing meaningful ç Contents that survive many generations have a the family’s wealth and control of the jobs for family members and promoting strong management ethos based on business. This also serves debt-holder family values for future generations. meritocracy. interests: family businesses tend to In the U.S., family-funded foundations 2. Control. Maintaining family control have lower financial leverage and cost of include 13 of the 20 largest players. while raising fresh capital is a major debt than corporate peers. For the full report, click here. source of potential conflict. Enduring 5. Value, not size. Family businesses 1 family businesses regulate ownership make smaller but more value-creating Christian Caspar, Ana Karina Dias, and Heinz-Peter Elstrodt, “The five attributes of enduring family issues—for example, how shares can M&A deals than their corporate businesses,” McKinsey Quarterly, January 2010. < 4 >

Confidence in a connected world. TheConfident ThinkTank SMB

SMBBEAT Protection Data Windows 7 Gains Momentum BBB Launches FREE Data Security Guide for Small Business IT Professionals at Small Business Have Been Most Aggressive in Their Nearly 85 percent of data breaches Plans to Upgrade to Windows 7 occur at small businesses, accord- ing to a September 2009 report by

recent Spiceworks’ VISA. Responding to this trend, the Messaging Security Intent to upgrade to Windows 7 within the first 90 days AVoice of IT report post-launch as measured by company size Better Business Bureau (BBB) has measures upgrade launched a free, customized educa- tion program called “Data Security— plans and adoption Made Simpler” to help small busi- 1-19 42% sentiment on Windows ness owners develop and implement

7 before and after its effective data-security strategies. y Case Stud 20-99 24% official debut. With Data security can sometimes be an results from over 1,500 100-249 22% overwhelming topic for small com- panies, and this program is designed y respondents, high- 250+ 28% to demystify the complexities of data lights from the report security tools. “While data breaches

include: affect businesses of all sizes, many Stor Cover > The number of SMBs 01020304050 small business owners aren’t taking Source: Spiceworks, “Voice of IT report, Microsoft Windows 7 & SMBs: Speeding the necessary steps to create ongoing planning to adopt Up Adoption Rates,” January 2010. Windows 7 grew by 20 data security policies and practices, ç including training their employees,” Contents percentage after the official launch says Steve Cox, President and CEO > IT pros at the smallest firms (<20 employees) are upgrading the fastest, at of the Council of Better Business more than double the rate of larger organizations Bureaus. > The top two reasons for moving to Windows 7 were speed (73 percent) and user Developed in partnership with interface (69 percent) Symantec, VISA, Kroll’s Fraud Solu- tions, and NACHA—The Electronic > In the next 12 months, 45 percent of Windows 7 installations will be on new ma- Payments Association, the program chines, while 55 percent will be on existing machines

For the complete report, click here. * Continued on next page < 5 >

Confidence in a connected world. TheConfident ThinkTank SMB Data Protection Data Cybercrime Made Easy Continued from previous page SMBBEAT

Do-it-yourself Kits Drive a Surge in Internet-Borne is presented by Kelley Drye ChannelWeb. Tested at Computer Infections Warren, LLP and Bryan the CRN Test Center lab, Cave, LLP. To learn more Symantec Endpoint Protec- o-it-yourself (DIY) kits are becoming big business in the cyber about this program, click tion Small Business Edition underworld, according to a recent report in USAToday.com. here. was installed and config- Generally sold for $400 to $700, the kits come with everything ured in about 16 minutes,

D Messaging Security Security in 20 Minutes you need to begin infecting PCs. Selling software is legal; it’s what you with a few more minutes to For small businesses do with it that can get you in trouble. Rookie and veteran cyber crooks build software for network to get the most out of a alike are using DIY kits to carry out phishing campaigns, blasting out clients. network security applica- fake e-mail messages that look like official notices from UPS, FedEx, For the complete review, tion, it should be easy to or the IRS, or account updates from Vonage, Facebook, or Microsoft click here. Outlook, or even medical alerts about the H1N1 flu virus. “It’s possible install and use, offer robust that the people creating and selling these kits may be the same groups functionality, and minimize Deduplicate Data, y Case Stud already profiting from cybercrime, and they could see this as yet hardware and network Replicate Savings complexity. According to a Delivering on its deduplica- another revenue stream,” says Marc Rossi, manager of research and recent product review by tion strategy, Symantec y development at Symantec. ChannelWeb, Symantec has launched Backup Exec For more on this report, click here. Endpoint Protection Small 2010 to offer midsized busi-

Business Edition offers all nesses a flexible approach Stor Cover Internet Infections of these characteristics. to eliminating duplicate 2009 Email spam intercepted “[It] is smart, well-tailored data without adding com- Global Top 5 geographies Top 5 verticals to small business, and plexity. According to market spam rate ç 88.2% Denmark 87.7% Engineering easy to manage. And, yes, research, while storage Contents 87.7% 87.6% Hong Kong 86.3% Education it takes about 20 minutes capacity is growing 48 to 50 87.4% France 86.3% Global Marketing/Media to install—from start to percent each year, approxi- spam estimate 86.9% China 86% Retail 86.2% Norway 85.8% 107 Manufacturing finish—so a small network mately 70 percent of data billion per day Email virus intercepted can achieve nice security stored is duplicate and has Top 5 geographies Top 5 verticals with minimal hassle,” says not been accessed in more 1 in 112.2 Luxembourg 1 in 192.2 Education 2009 1 in 147.8 Gov/Public Edward F. Moltzen, who than 90 days. Thus, orga- Global 1 in 173.3 China 1 in 188.3 Brazil 1 in 168.8 Accom/Catering reviewed the product for nizations that implement virus rate 1 in 199.2 United Kingdom 1 in 214.2 Marketing/Media 1 in 286.4 1 in 225.8 Germany 1 in 242.1 Engineering Source: MessageLabs Intelligence: 2009 Annual Security Report < 6 >

Confidence in a connected world. TheConfident ThinkTank SMB

Continued from previous page SMBBEAT CAPTCHA! Protection Data an integrated deduplication and archiving Luring the Needy solution can realize savings of up to 20 to into Cybercrime 40 percent in storage costs while making Threat Landscape critical information more readily accessible. emember the swirl- Total malware variants Spam botnet machines Backup Exec 2010 offers fully integrated ing letters and num- data deduplication and archiving technolo- gies and is the first backup and recovery solu- Rbers you’re asked million million Messaging Security to type in as a verification 73 5 tion to offer granular recovery of Microsoft Exchange 2010, SQL Server, and Active Direc- measure when you log in to Spam stopped Unique domains hosting malware tory in VMware as well as Microsoft Hyper-V supposedly secure web- environments from a single pass backup. It sites? Well, cyber crimi- also enables integration with third-party de- 60million 30 million duplication appliances through the Symantec

nals have figured a way y Case Stud around these CAPTCHAs— Source: MessageLabs Intelligence: 2009 Annual Security Report OpenStorage Technology (OST) program. For more information, click here. Completely Automated Public Turing tests to tell advertised as a data processing job, PC Advisor Awards 2010: Wins PC y Computer and Humans Apart. Ac- each worker can receive approxi- Advisor’s Best Security Software Award PC Advisor Awards 2010 have named cording to the MessageLabs Intelli- mately $2 to $3 per 1,000 accounts created, with each being sold to 2009 as the Best Stor Cover gence: 2009 Annual Security Report, Security Software. Combining solid protec- CAPTCHA-breaking tools became spammers for around $30 to $40 tion with a user-friendly interface, Norton more readily traded in the under- per 1,000 accounts. gains accolades from the PC Advisor test ç ground cyber economy in 2009, and Some major sites are already inves- center for the accuracy of its reputation- Contents criminals were able to create large tigating alternative verification meth- based algorithm, which helps it protect against rapidly evolving threats. Antispy- numbers of real accounts for web- ods such as large libraries of photo- graphic images, whereby users must ware and firewall tools are included, along mail, instant messaging, and social with strong measures to thwart Trojans, networking websites. be able to analyze or interact with the viruses, and rootkits. An intuitive interface In fact, a new kind of business has image in a way that would be very allows users to see exactly what’s what and emerged, specializing in providing challenging for a computer program. tweak the setup easily. For the complete review, click here. real people to create real accounts For the complete MessageLabs report, click here. on major webmail services. Often < 7 >

Confidence in a connected world. TheConfident ThinkTank SMB

OFFERS REALITY CHECK Protection Data Save up to 35% on Backup TECH BRIEFS SUCCESS Exec 2010 Family of Products Migrating to Windows 7, Get Save on backup, recovery, and Started Here in ACTION deduplication Expect These Security Trends to Bank of Tampa Orion Registrar Dominate in 2010 Secure vault protects hundreds High quality backup saves time Check out Symantec Protection of endpoints from threats and costs Suite Challenge Don’t Fall for Malicious “Tweets” Uncover the state of your security Business Office Systems Payment Systems Group Messaging Security STREAMING Office business downtime Online processor protects cus- minimized tomer and company data WORD TO WATCH: Backup Exec 2010 THE WISE Learn how to improve backup Symantec Backup Exec 2010: CBSA Architects Rodyk & Davidson LLP performance while reducing Data protection solution solidly Law firm gains control over data Addressing the Causes of storage costs designed y Case Stud Inefficiency in Data Protection WATCH: Threat Forecast 2010 Selecting Your Hosted Security What to expect and how to protect y Service Provider your organization

eDiscovery Compliance: WATCH: Stor Cover New Requirements Risk Calculator

Calculate s The Tangled Web: Silent Threats the cost of ç and Invisible Enemies 2010 a system Contents outage to Death to PST Files: The Hidden your business Cost of Email

The boss said he wanted that email found by end of day.

Now, I wonder which tape ç Tips Tips to Protect Tips to Achieve 8 10 it’s saved on. Your Business and Backup and Recovery < 8 > &Tricks Secure Its Data Success

Confidence in a connected world. TheConfident ThinkTank SMB Data Protection Data

RESOURCES SOCIAL Visit us online at Small Business Solutions and Midsize MEDIA Business Solutions and take advantage of a world of resources The Confident SMB Blog to help you have confidence in your connected world. Get insights and highlights EVENTS of new content, and interact with The Confident SMB Symantec Tech Days Find a Reseller Customer Success Messaging Security Taking the answers on the road Find the perfect partner to See how other SMBs succeed team. January 14 – May 4 help you manage your IT with the help of Symantec needs Symantec Facebook Page Symantec Vision 2010 Las Vegas Hosted Services Readers with Facebook Knowledge, insights, and inspiration to take control Trialware Downloads Secure and manage your accounts can connect and of your IT world. Trial version of Symantec information using the power share ideas with Symantec

MGM Grand Hotel, Las Vegas, NV products are available for of cloud computing while also receiving notifi- y Case Stud download April 12–15, 2010 cation of each new issue. Education Services Become a fan today. Symantec eLibrary: A Maximize your IT for more event information. y Click Here Subscription for Success investment with a skilled, Twitter One-year subscription gives educated workforce Tweeting on everything from you access to hundreds of the new The Confident SMB Symantec training modules Symantec Connect articles, research reports, Stor Cover Talk Back to Symantec A technical community to podcasts, webcasts, custom- Chat with a Sales help your IT team keep your er successes, and more, the Do you recommend Symantec? Specialist Now systems up and running Symantec Publishing Twitter Share your thoughts. Security made simple. Chat account keeps Symantec ç directly with a specialist now Contents customers and partners up to date. Start following the License Renewal Center tweets today. Get continued protection for your product today Linkedln Exchange tips and strate- Podcasts gies with peers by joining For people on the go, pod- The Confident SMB group on casts deliver news, product LinkedIn.com. information, and strategies you can use < 9 >

Confidence in a connected world. Cover Story TheConfident Design & Source Productions SMB Data Protection Data

By Mark L.S. MullinsThe Beauty is in the Package Messaging Security

Technology Enables Creativity y Case Stud for an International Small Business

ntering the headquarters of Design & Source y Productions is a transformative experience. Stepping off the elevator on the third floor Cover Stor Cover of a nondescript building in Manhattan’s EFlatiron District, one suddenly experiences an ç environment full of vivid color and visual stimuli, but Contents with an overriding aura of peace. Modernistic displays of the company’s glamorous product lines blend seamlessly with the old building’s exposed brick and loft-style architecture. One gets the feeling that the proprietors are not corporate types, and that they know something about design. < 10 > MICHAEL BRUNETTO Confidence in a connected world. Cover Story TheConfident Design & Source Productions SMB

The Full Package on Protection Data Design & Source Productions Founded: 1996 Tufariello made in 1986. Technology evolves with Headquarters: New York City, New York She was completing a the business Locations: 5 Employees: 16 stint as an airline flight The company’s first step into the Key Products: Custom luxury packaging and private attendant and was a school world of technology was small by label and promotional accessories that include: shop- teacher for a number of years today’s standards. “The fax machine

ping bags, totes, handbags, and gift and display boxes Messaging Security Cutting-edge, Sustainable Materials: before that. “I decided to build a was introduced the year I began my • TerraSkin (paper made from stone) business on the passions of my first company,” Tufariello relates, • Recycled textiles life—design and travel. So I got “and I quickly discovered how useful • Bio plastics (made from vegetable starch) • Renewable pulp (made from sugar cane, reed, into the business of importing that device was to an international and rice straw) stationery and gift bags,” she business.” Website: www.designandsource.com recalls. “We got an Atari computer with a y Case Stud Tufariello’s prior experience dot-matrix printer in the late 1980s,” Of course, design is what the company served her well in the new Tufariello continues. “Later, we got a y is all about. The 16-person firm endeavor. She had visited many scanner and started scanning designs creates beautiful and environmentally exotic places as a flight attendant, and photos. Email was a hard sell for

sustainable product packaging, bringing back things of beauty from me at first, but I became convinced Stor Cover shopping bags, stationery, and each location, and creative design that it’s an effective and efficient way accessories; it also advises companies was a lifelong hobby that she also to communicate.” ç on how to make their packaging more practiced during her teaching career. As the company’s technology Contents eco-friendly. Its customer list includes “I started the business out of footprint grew, its needs for IT upscale department and specialty my small apartment, and my first services evolved. “At the beginning, stores, hotels, cruise lines, gift shops, suppliers were in Taiwan,” Tufariello we would use ‘friends of friends’ to and cafés. explains. “In 1996, I founded Design help us with our technology needs. & Source Productions, and we have There was always someone willing A business born of passion grown to occupy a 5,000-square foot to help, but most of them had their The company’s roots can be traced to headquarters space and four branch own way of doing things. So the a career change decision that Laura offices across Asia.” next person would come in and < 11 >

Confidence in a connected world. Cover Story TheConfident Design & Source Productions SMB Data Protection Data Beautiful and Sustainable: The Birth of a Market Niche do it differently, and there was no standardization.” esign & Source Productions found its environmental niche in the late 1990s. “We always got involved with products that we liked and thought were Dbeautiful,” explains founder and owner Laura Tufariello. “A little over 10 Finding the right IT partner years ago, I was drawn to a particular material because of its beauty, and it turned Tufariello decided to try another approach out to be a better choice environmentally.” when the time came to deploy a new Messaging Security The new material produced fewer toxic fumes during production and use than the material that it would replace. “I learned that customer relationship management (CRM) environmentally friendly materials don’t have to look like package in 2000. “We chose GoldMine and granola—that green can be glamorous,” describes Tufariello. “So engaged the reseller W Systems to set it I decided to move our focus toward new and more sustainable all up for us. They did such a good job that

materials.” y Case Stud The result was the creation of a new subsidiary, Chameleon we asked them for a recommendation for Packaging, that essentially defines the larger company’s culture general IT services, and they recommended

and identity today. “More and more companies are wanting to Baroan Technologies.” y reduce waste, improve their packaging, and generally bolster Based in New Jersey and founded their green credentials,” Tufariello says. “We have proven that 13 years ago by Guy Baroan, Symantec major companies can re-invigorate brands through innovative, Cover Stor Cover sustainable packaging. Partner Baroan Technologies offers “One material we’re excited about is TerraSkin, a paper managed IT services customized to the that is made entirely from stone left over from construction projects,” Tufariello unique needs of each customer. “We cater continues. Design & Source has used TerraSkin in everything from shopping bags ç to small and midsize businesses that don’t Contents to soap packaging. The firm also uses a leather-like material made from recycled cotton, plastics made from vegetable starch, and paper packaging made from the have their own IT staffs,” explains Baroan. pulp of sugar cane and rice straw. “We provide everything from software Through her company’s innovation, Tufariello has earned a solid reputation and hardware deployment to ongoing in green design. She is an adjunct professor at the State University of New York’s monitoring and help desk services.” Fashion Institute of Technology, teaching a course in sustainable package design. In 2008, she was a guest speaker at the Women’s Leadership Council at the United Nations. And in the same year, Design & Source Productions received the “New Standardizing data protection York Enterprise Best Practices Award” for Green Business. Baroan conducted an assessment and began helping Design & Source streamline < 12 >

Confidence in a connected world. Cover Story TheConfident Design & Source Productions SMB Data Protection Data

and upgrade its infrastructure. daily incremental and weekly One of the early projects full backups, and all the local involved data protection. team had to do was change “Backups were being done out the tapes.” manually and sporadically, Messaging Security which put a lot of critical data Going green through at risk,” Baroan recalls. virtualization Baroan rolled out the latest Two years ago, with a network version of Symantec Backup and server upgrade project Exec at Design & Source in on the drawing board, the y Case Stud

“I decided to build a business on the y passions of my life—design and travel.”

– Laura Tufariello, Founder & Owner, Design & Source Productions Stor Cover

2005, deployed concurrently Baroan team showed the ç with a Dell PowerVault net- company how they could Contents work-attached storage (NAS) significantly reduce their system. “The most important power consumption through benefit was that the back- virtualization. “This was ups were happening and the attractive to us because of data was being protected,” our environmental emphasis,”

Baroan asserts. “But in addi- Tufariello says. “We were From left: Laura Tufariello, Founder and Owner, in the Design & Source tion to that, the process be- already purchasing 100 showroom with Guy Baroan, President of Baroan Technologies, and came simpler. We set up the percent wind power for our Design & Source Accountant and IT Lead Kathia Toraño MICHAEL BRUNETTO < 13 >

Confidence in a connected world. Cover Story TheConfident Design & Source Productions SMB

Podcas t

Kathia Toraño and Guy Baroan Protection Data discuss how technology solutions headquarters, but virtualization Accounting and What Else…? meet Design & Source’s business helped us go one step further.” requirements. About this time, Kathia Toraño hen Kathia Toraño was in high school came on board as Design & in her native Puerto Rico, she was graduation, I put my resume on the New Source’s accountant—a role Wnaturally good with numbers and York craigslist page. Design & Source adept with computers, but she never thought contacted me, I flew to New York for a that also includes overseeing the that these natural skills would become a career series of interviews, and within a week I was IT infrastructure and managing Messaging Security for her. “I used to joke with my classmates, ‘No working here.” the relationship with Baroan one graduates from high school wanting to be Toraño’s official role at the company Technologies. “We took our five an accountant’,” is in accounting, but as with most small she quips. businesses, that was not the only hat servers and converted them Toraño resisted she would be called to wear. Specifically, to VMware ESX servers on one this career path the accountant at Design & Source also piece of hardware,” she says, for a time, de- manages the company’s IT infrastructure. “and we can add more servers y Case Stud claring majors in “I was good with computers, but I never communications, really learned about networks or business as needed without adding

French literature, systems,” Toraño says. hardware.” y and photography Fortunately, the Baroan Technologies before settling team was already in place, so Toraño wasn’t Bolstering disaster recovery on accounting. alone in the role. “I became the liaison At Baroan’s recommendation, Stor Cover She also changed between the end users and Baroan,” she schools, study- explains. “At first, I was calling them with Design & Source deployed ing at Fordham all sorts of simple questions. But now I feel Symantec Backup Exec System ç Kathia Toraño, Accountant University for that I know my way around our systems Recovery to add another layer of Contents and IT Lead, Design & Source two years before pretty well. data protection and provide for Productions returning home “It’s great to work for a small business to complete her degree at the University of because I can gain experience in a lot of more robust disaster recovery Puerto Rico, where she also worked for the different areas,” Toraño continues. “I’m for its virtual environment. accounting firm Kevane Grant Thornton. studying for the CPA exam, but I’m also “Although we haven’t had a “I fell in love with New York during my involved in IT, Web design, and even trade large-scale disaster, Baroan time at Fordham and knew that I wanted to show marketing. It’s interesting to mix things come back,” Toraño recalls. “So after up a bit and find a new balance.” showed us how important it is for us to be prepared,” Toraño says. “We’re going crazy MICHAEL BRUNETTO < 14 >

Confidence in a connected world. Cover Story TheConfident Design & Source Productions SMB Data Protection Data s here when the CRM is down for 15 particularly the Video minutes, so the fact that it could be deduplication option,” Design & Source and Baroan Technologies discuss days was a real concern.” Toraño says. “Being a how the role of technology Backup Exec System Recovery design firm, we are often helps drive the company’s takes snapshots every two hours of sending and receiving growth.

the company’s three most critical emails with multiple image Messaging Security servers—the main administrative attachments, and copies are sent Toraño couldn’t be happier with her relationship with Baroan Technologies and Symantec. “The Baroan team “We’re going crazy here when the CRM is down for introduces us to the technology advances that we need to keep our 15 minutes, so the fact that it could be days was y Case Stud business successful, and they’re always a real concern.” just a phone call away if something

– Kathia Toraño, Accountant and IT Lead, Design & Source Productions happens. And Symantec provides us y with the peace of mind that our data is protected no matter what.” n server, the server hosting the to several people in our company. Stor Cover Microsoft SQL Server-based CRM Being able to identify and remove the Mark L.S. Mullins is a managing editor of The Confident SMB and CIO Digest and senior manager of Symantec’s system, and the image library—which duplicate data will be amazing, as it Global Reference Program team. ç together have close to a terabyte of will save so much space.” Contents data. In the event of a server failure, “We’re also planning to deploy these snapshots can be used to Symantec Protection Suite Enterprise Sustaining Data with Symantec Solutions quickly restore the servers—even to Edition at Design & Source this year,” n Symantec Backup Exec dissimilar hardware. Baroan adds. “With the amount n Symantec Backup Exec System Recovery of critical data and the global Server Edition n Symantec Backup Exec System Recovery Looking to the future interactions they have every day, it Desktop Edition “We are really excited about up- makes complete sense to deploy a n Symantec Partner: Baroan Technologies grading to Backup Exec 2010, comprehensive security solution.” < 15 >

Confidence in a connected world. TheConfident Case Study Sandcroft Management Services SMB Vitality Consulting Services Data Protection Data

No More “Red Panic Button”By Patrick E. Spencer Managed Services and the Right Technologies Accrue Tangible Results at Sandcroft Management Services

he roots of entrepreneurship Messaging Security run deep in the history of Cambridgeshire, England T(the County of Cambridge). When a group of scholars left

Oxford under the threat of hostile y Case Stud townspeople in 1209, they resettled in the township of Cambridge. The y refuge became a permanent home with the appointment of their

first Chancellor in 1226, one that Stor Cover developed into one of the most renowned educational institutions in ç the world today—the University of Contents Cambridge. Entrepreneurship forms part of the fabric of Cambridgeshire, world’s oldest continually operating a downstairs room in the home of the founding of the University of book publisher, to the many small founder Billy Wilson. Cambridge being just the start—from businesses scattered across the Silicon Fens, the high-tech area county. Counted among the latter From large to small on the outskirts of Cambridge, to is Sandcroft Management Services Billy started his career working for Cambridge University Press, the Ltd., which was started in 1990 in several large United Kingdom-based < 16 >

Confidence in a connected world. TheConfident Case Study Sandcroft Management Services SMB Vitality Consulting Services William (left) and Billy Wilson, Sandcroft Management Services Data Protection Data firms. About 10 years later, size,” Billy remembers. And he was recruited by a small though there have been some accounting business to manage unexpected bumps in the road, its operations. And he quickly the company has sustained its learned what he wanted to early success; its offices are a do with the rest of his career. flurry of activity. Technology

“With this move, I discovered has been a key part of the Messaging Security that I enjoyed working in a success. “Beyond a lot of hard small business versus a large work and long hours, a key business,” he says. “And I never enabler of our growth has been turned back.” technology,” Billy notes.

After a few years he An important hallmark in y Case Stud determined to start his the expansion of the business own small business, having was the addition of Billy’s identified a need for one-stop son, William Wilson, in the y accounting, bookkeeping, late 1990s. “Unofficially, I

and consulting services for Stor Cover small businesses and the self employed. Always looking for Entrepreneurial Equation: new opportunities, Billy added Sandcroft Management ç Contents payroll services to the business’ Services portfolio in 1991 under the Founded: 1990 Employees: 13 name of Sandcroft Payroll Customers: Accounting, bookkeep- Services Ltd. ing, and payroll services for limited Sandcroft Management companies, charities, partnerships, and sole traders; payroll services for Services grew very quickly approximately 300 businesses, from during its first several years. small to enterprise “We more than tripled in Location: Sawston, Cambridge, U.K. Websites: and JULIAN HICKMAN www.sandcroft.co.uk < 17 > www.sandcroftpayrollservices.co.uk. Confidence in a connected world. TheConfident Case Study Sandcroft Management Services SMB Vitality Consulting Services Data Protection Data

Adding Vitality to IT with Managed Services joined the company a few weeks from Vitality Consulting Services Limited after its founding, posting invoices for a pound an hour,” he jokes. hen Sandcroft Management “However, officially, I have been Services turned to Symantec Partner Vitality Consulting with the company for about 13 Messaging Security WServices Limited for help years.” In addition to his accounting in gaining tighter control over its IT responsibilities, he oversees IT environment, the company had high strategy and decision making for expectations—and those have been either the firm. met or exceeded. The success is a mix of the right IT governance and business y Case Stud Remediating “worry” management processes and the deployment of the right technologies. The managed Adoption of computer technologies services model from Vitality Consulting by Sandcroft Management Services y Services was precisely what was hastened in the mid-1990s Sandcroft Management when one of the largest Internet Podcas t Stor Cover Services needed. George Ilko, CTO George Ilko discusses how and Founder, Vitality companies in the U.K. at the time Symantec helps Vitality Consulting Services Limited. became a customer for its payroll No spam at last Consulting Services deliver essential solutions for small services. “We had to conduct For messaging security, from Symantec—whether ç businesses. business with them over the Contents Vitality Consulting Services it is Symantec Mail Security implemented Symantec Mail for the very small business or Symantec Internet,” Billy explains. “This actually Security for Microsoft Exchange layered Brightmail Gateway or MessageLabs Hosted expedited our reliance on IT.” with MessageLabs Hosted Email Security. Email Security for the larger small business Prior to 2008, Billy and William The solution stopped the incoming spam or midsize business—that it will resolve the managed their IT environment with “dead in its tracks,” according to George message security challenges of our clients.” Ilko, CTO and founder at Vitality Consulting supplemental support from a local The benefits of the deployment are IT provider. However, day-to-day Services. “We have great confidence that dramatic. “Our employees previously JULIAN HICKMAN whatever the messaging security solution IT management was consuming

Continued on next page valuable billable time, not only < 18 >

Confidence in a connected world. TheConfident Case Study Sandcroft Management Services SMB Vitality Consulting Services s

Vitality Consulting Services…Continued from previous page Protection Data for Billy and William, but for spent as much as 30 minutes each day Video the entire staff. “We would managing spam,” says William Wilson, George Ilko discusses spend two hours trying to fix account and IT strategist at Sandcroft Vitality Consulting Services’ partnership with Symantec. a problem and create another Management Services. This time has been one that took four hours to sort recaptured and is being spent on billable out,” William explains. or other business-critical initiatives. point for us. We can sell a robust disaster Messaging Security recovery solution to small businesses that they “There were really two Tallying endpoint security previously could not have afforded.” primary business issues when For endpoint security, Vitality Consulting Sandcroft Management Services Services rolled out Symantec Endpoint Numbers are in data protection approached us,” remembers Protection. “Locking down the network is Backups to a virtual server at an off-site George Ilko, chief technology y Case Stud typically the first step we take with clients,” Ilko location hosted by Vitality Consulting officer and founder of Vitality says. “Getting a comprehensive set of endpoint Services are scheduled daily. “We get an Consulting Services Limited. security checkpoints, from antivirus and email notification that each backup was antispyware to network intrusion prevention, successful,” Ilko says. “And in the case of “Spam was the first one.” y is critical. With Symantec Endpoint Protection, system failures at the Sandcroft Management Specifically, the staff was we have one console from which to manage Services’ facility, we are able to redirect expending valuable energy on all endpoint security.” This not only improves to the virtual infrastructure. Email, the deleting spam each morning Stor Cover operational efficiencies for Vitality Consulting practice management software, and other and then throughout the day, Services, it reduces the overall risk exposure applications continue to run.” time that could be spent on for Sandcroft Management Services. Of course, successful backups are only as ç Contents The integration of Symantec Endpoint good as the ability to recover the data. “Testing billable projects. The second was Protection and Symantec Backup Exec System of most backup-and-recovery solutions is related to business continuity; Recovery allows Vitality Consulting Services typically a very time-consuming process,” Ilko data retention requirements to deliver added value to its clients such as notes. “With Backup Exec System Recovery, we as specified by insurance and Sandcroft Management Services. “We are able are able to test data restore in real time using regulatory bodies such as the to initiate off-site system backups based on the virtualization feature.” Accounting Standards Board. threat levels identified by Symantec Endpoint Vitality Consulting Services Services Protection,” Ilko says. “This is a huge selling maintains a virtualized server environment, “We must maintain successful backups every day,” Billy says. Continued on next page “I cannot count the number of < 19 >

Confidence in a connected world. TheConfident Case Study Sandcroft Management Services SMB Vitality Consulting Services Data Protection Data

The Vitality Group…Continued from previous page

using HP servers and VMware, at its Vitality Consulting Services performs disk client sites as at it’s hosted data center. backups to Cisco or HP NAS devices.) After times when I’ve arrived at home and The built-in virtualization support in the 30 days, the data is then moved to an realized that I’d forgotten the backup different Symantec software tools, from HP StorageWorks tape library. Then, for tape at the office and had to drive back Backup Exec and Backup Exec System additional business continuity protection, to the office to retrieve it (an insurance Messaging Security Recovery to Endpoint Protection, is Vitality Consulting Services uses Backup requirement).” important to Vitality Consulting Services, Exec to replicate data from its data center They began looking at different as well as it’s clients such as Sandcroft to the Lloyd’s of London data center options and settled on a managed Management Services. location in London every 30 days. “We are For Sandcroft Management Services able to offer our clients an enterprise-class services model. “IT is not our area of expertise, it’s accounting, bookkeeping,

storage infrastructure, Vitality Consulting business continuity solution on a small y Case Stud Services maintains a tiered storage business budget,” Ilko proudly states. consulting, and payroll services,” model. The first tier consists of using William observes. “The reason we

Backup Exec System Recovery to back up Returns keep coming turned to Vitality Consulting Services y systems to a Seagate Maxtor disk device. Just as the releases of Symantec was to stop the worry,” Billy adds. “We (For larger clients and infrastructures, Endpoint Protection and Symantec sought someone we could trust to

Backup Exec System Recovery 2010 Stor Cover added to Vitality Consulting Services’s manage our IT for us.” Vitality Consulting toolbox, the recent release of Backup Sandcroft Management Services Services Ltd. Exec 2010 does so as well. “The addition signed a managed services agreement ç of the deduplication technology is Contents Founded: 2007 with Vitality Consulting Services in Customers: Small businesses that span going to be a big plus for us,” Ilko says. early 2008. “The solutions from Vitality various industry segments such as media “We are able to reduce our storage and entertainment, business and profes- requirements, including energy costs Consulting Services allow us to avoid sional services, and retail, among others and rack space, which means we can pressing the ‘red panic button’,” Billy Services: Managed services that include IT deliver more competitive solutions to quips. “When a PC went down before, consulting, security, and business continuity our clients like Sandcroft Management Key Partnerships: Symantec, HP, Cisco, or something else happened, we lost APC, and Microsoft Services. Our benefit becomes a shared valuable staff time remediating. Now Location: Cambridge, U.K. benefit with our clients.” we simply call Vitality and know the Websites: www.vchq.co.uk problem will be resolved.” < 20 >

Confidence in a connected world. TheConfident Case Study Sandcroft Management Services SMB Vitality Consulting Services

Podcas t

Managed services equation notes they aim Billy and William Wilson talk about the components. To Protection Data A Symantec Silver Partner, Vitality for one hour. importance of a robust technology infra- address security and structure for their business growth. Consulting Services worked with the Using Symantec business continuity Sandcroft Management Services team pcAnywhere, the requirements, to conduct an audit of their existing team is able to remediate many Vitality Consulting Services relies IT environment. The audit included problems remotely. “Remote access on various Symantec technologies an assessment of network, security, decreases the interruptions to our that are used to manage the

and business continuity requirements staff,” William relates. “However, Sandcroft Management Services Messaging Security compared to the organizational status when needed, the Vitality Consulting IT environment. These include Symantec Backup Exec and Symantec Backup Exec System Recovery for “The reason we turned to Vitality backup and recovery, Symantec

Endpoint Protection for endpoint y Case Stud Consulting Services was to stop security, and Symantec Mail Security for Microsoft Exchange layered with the worry.” y MessageLabs Hosted Email Security – Billy Wilson, Founder, Sandcroft Management Services Ltd. for messaging security. Cover Stor Cover quo in each of these areas. Vitality Services’ team will come out on Accruing the results Consulting Services then mapped site—24×7.” The results of the different solutions ç several different technology solutions Vitality Consulting Services are impressive. Employees no longer Contents to meet these different requirements. pinpointed several technology spend valuable time sorting through The annual managed services solutions as a result of their initial spam every day, sometimes up to agreement with Vitality Consulting audit. These encompassed three 30 minutes daily per employee. Billy Services, which Sandcroft different business areas. For the no longer needs to manage daily Management Services renewed for network environment, Vitality backups, which consumed as much another year in early 2009, includes Consulting Services worked with as 30 minutes of his time every day. a four-hour service-level agreement Sandcroft Management Services to System recovery time has also been (SLA) response time, though Ilko implement various Cisco technology slashed. A recovery with the previous < 21 >

Confidence in a connected world. TheConfident Case Study Sandcroft Management Services SMB Vitality Consulting Services s

Video Protection Data Billy and William Wilson discuss infrastructure and how Vitality Consulting Services and “We have highly confidential client Symantec help them focus on the processes—locating information such as employee business. it would have taken the tapes in the off- addresses, insurance numbers, and us days to complete site facility, retrieving them, and then banking details, and we simply cannot the migration,” Ilko says. “And the staff restoring the data—would have taken lose any of that information.” would have been without access to up to two days to complete. However, The “red panic button” is no longer to Messaging Security the practice management software under the managed services SLA from be found on Billy’s—or William’s—desk. during this timeframe. However, we Vitality Consulting Services, a one-hour Billy even thinks he might be able to take were able to complete the entire recovery window is stipulated, though a little time off, concluding: “Now that I migration in about 20 minutes Ilko notes that they can usually complete have all of the IT systems set up just the using Backup Exec System Recovery a recovery in 20 minutes. right way, and William heavily involved y Case Stud to image the existing server and In addition, the new security in the business, I plan to take a little bit redeploy the practice management measures and infrastructure reduces of time off—perhaps watch some rugby software solution to the new HP y Sandcroft Management Services’ or do some gardening.” n ProLiant server hardware.” risk exposure and enables the Patrick E. Spencer (Ph.D.) is the editor in chief for The organization to maintain compliance Stor Cover Time for rugby and gardening Confident SMBand CIO Digest and the author of a with PCI standards and other regulatory Despite the economic downturn, book and various articles and reviews published by requirements. “We’ve passed PCI audits Continuum Books and Sage Publications, among others. Sandcroft Management Services and penetration testing with flying ç continued to see year-over-year growth Contents colors,” Ilko reports. in 2009. “We’re quite proud of our In Whole, Not in Part: Sandcroft Management Services success this past year,” William touts. Symantec Solution gained unexpected value from their “And IT has become an increasingly n Symantec Backup Exec Symantec investment when they n Symantec Backup Exec System Recovery important growth enabler for us.” n Symantec Endpoint Protection were recently faced with the need to n “Vitality Consulting Services, along Symantec Mail Security for Exchange migrate their practice management n Symantec pcAnywhere with the software tools they have n MessageLabs Hosted Email Security software to dedicated hardware. n Symantec Partner: Vitality Consulting deployed, give me peace of mind “Without Backup Exec System Recovery, Services Ltd. at the end of the day,” Billy adds. < 22 >

Confidence in a connected world. TheConfident Messaging Security Feature SMB Data Protection Data

Message in a Bottle By Ken Downie Don’t Let Poor Security Hamper Your Communications Messaging Security f you use email or instant messaging, your business is under attack every day. Spam is no longer just an annoyance, but certifiably dangerous. A primary conduit for viruses and malware, it’s also a produc-

I y Case Stud tivity vampire that represents a constant drain on your IT staff, end users, network bandwidth, and computer systems—not to mention the morale of employees who y are routinely bombarded by offensive messages. Consider the other side of the coin: the risk of

sensitive, confidential, or obscene messages leaving Stor Cover your organization, either maliciously or accidentally. Compliance and legal concerns are forcing many ç companies to take control of outbound messaging, Contents while other organizations are doing so voluntarily, out of concern for their reputations. Indeed, do you really know what’s leaving your SMTP gateway? With that in mind, smart SMBs are working with their technology partners to minimize messaging security risks and reclaim productivity with the least amount of management overhead and capital expense. < 23 >

Confidence in a connected world. TheConfident Messaging Security Feature SMB

Sean Adams, IT Manager, Bertelkamp from a less dramatic, yet very Protection Data Automation, Inc. regular occurrence—the daily exercise of identifying and deleting spam messages from inboxes. Many or IT resources companies can save thousands of to implement dollars per year simply by freeing the security employees from this drudgery. infrastructure that Besides, with spam accounting for Messaging Security a typical enterprise more than 90 percent of email volume environment has,” at most companies, paying for servers, says Brian Burke, bandwidth, storage, and IT staff to program director, support data you don’t want doesn’t security products make much sense. y Case Stud & services, IDC. “So whether it’s a Minimize complexity with virus infection y a single-vendor solution Bertelkamp Automation, Inc. that knocks There’s no one-size-fits-all solution for Founded: 1975 out their

messaging security, even for SMBs, Stor Cover Calculate the true Location: Knoxville, Tennessee network for Employees: 100+ but using security products from a cost of spam a few hours IT Staff: 4 single vendor can be helpful from In the war on spam, now Partner: JensenIT.com or days, or an an integration standpoint. “Security ç is not the time to be Website: www.bertelkamp.com information Contents vendors are now developing products weak—but if you are, leak via email, that are focused on the SMB market you’re not alone. Many SMBs are still in although these things can be costly to to meet the need for cost-effective, denial about the true cost of spam, yet a company of any size, they’re much easy-to-manage, integrated messaging they are even more at risk than larger more of a risk to smaller businesses security solutions,” notes IDC’s Burke. organizations. because the bottom line is that much “And a single-vendor solution can “SMBs are more vulnerable to spam more sensitive.” strengthen overall business continuity and email-borne threats because they The bulk of the cost of spam to by combining traditional messaging generally don’t have the time, money, SMBs, however, is likely to arise CHRISTIAN LANGE CHRISTIAN < 24 >

Confidence in a connected world. TheConfident Messaging Security Feature SMB Data Protection Data security with data loss prevention and distributor for manufacturers of This thing probably came in through archiving technologies.” industrial automation components. an email from a trusted source. Once Bertelkamp Automation is The company has experienced it was in, of course, it was too late.” a Knoxville, Tennessee-based firsthand the disadvantages of a Working with Symantec Partner representative and stocking piecemeal security solution. Jensen Information Technologies, “We used to just block Bertelkamp integrated a Symantec everything and then had Brightmail Gateway Small Business Messaging Security to manually edit firewall Edition appliance into its Multi- Messaging Security Trends configurations to let the Protocol Label Switching (MPLS) cloud ramingham, Massachusetts-based good stuff through. It network. Symantec Brightmail Gateway technology consulting firm IDC recently was very labor intensive,” Small Business Edition was the right Fconducted a survey1 and related forecast y Case Stud update2 on key trends in the messaging security “Security vendors are now developing products market. Highlights include:

> 79 percent of companies want their messaging that are focused on the SMB market to meet y security solution to handle both inbound and outbound security issues the need for cost-effective, easy-to-manage, > 34 percent of organizations are planning to integrated messaging security solutions.” Stor Cover adopt virtual security appliances over the next 12 months – Brian Burke, Program Director, Security Products & Services, IDC > 63 percent of organizations feel that a hybrid ç Contents approach (combination of on-premise and in- recalls Sean Adams, IT fit for Bertelkamp,” says John Jensen, the-cloud) to email security is most effective for stopping inbound email threats manager. “Despite this, systems architect at Jensen IT. “It’s cost > SaaS will overtake both software and appliances we had an incident where effective and easy to deploy.” as the most widely deployed messaging security one of our workstations Now, Adams is getting back the 30 platform in 2012 (based on revenue) got infected by an email- to 40 minutes a day he used to spend

1 “Messaging Security Survey: The Good, Bad, and Ugly,” IDC borne virus, and we on firewall white-list management, and #216781, February 2009 basically became an email he no longer worries about messaging 2 “Worldwide Messaging Security 2009–2013 Forecast Update and 2008 Vendor Shares: Is Virtual a Reality?” IDC #219270, July spam relay for this virus. security. “The accuracy of Symantec 2009 < 25 >

Confidence in a connected world. TheConfident Messaging Security Feature SMB

that leaves our Reclaim your workforce Protection Data organization—from Putting an effective messaging security now on, email around strategy in place can result in enor- here is going to mous productivity gains for SMBs. One be monitored very example is J.A. Kennedy Real Estate conservatively.” Co. in Las Vegas, Nevada, which decid- Although ed to outsource its entire IT infrastruc- Bertelkamp chose a ture to local managed services provider Messaging Security physical appliance, Kortek Solutions, a Symantec partner. many companies are A previous IT consulting arrangement opting for virtual ap- had resulted in widespread damage pliances to conserve from a virus received via email and power and space. multiple instances of data loss. y Case Stud “SMBs have a strong “We had projects and lots of

interest in virtual information to manage, we were y TWM Solicitors LLP security appli- adding employees, and we couldn’t Founded: 1790 ances,” says IDC’s afford to lose any more valuable Alan Barrett, Head of IT, Location: Guildford, U.K. Burke. “The ben- time to spam and viruses,” says Joe Stor Cover TWM Solicitors LLP Employees: 175 IT Staff: 5 efits of increased Kennedy, founder and president. Brightmail Gateway is Website: www.twmsolicitors.com scalability and Kortek Solutions hosts a single Mi- ç unbelievable,” he says. data center con- crosoft Exchange-based server for J.A. Contents “We’re blocking around solidation com- Kennedy, which also runs Symantec 25,000 spam messages a day, and bined with hardware cost savings Mail Security for Microsoft Exchange we haven’t had one false positive. can easily be explained to manage- software with Symantec Premium An- We’re also able to grant certain users ment. And the use of virtualization tiSpam, an add-on subscription ser- access to instant messaging and know is very compatible with Green IT ini- vice that offers a high accuracy rate we’re doing so securely. In addition, tiatives, which can actually be a key against critical false positives. with the outbound message filtering, driver depending on an executive’s “False positives were a real I finally have control over the content personal philosophies.” problem before,” Kennedy recalls. JULIAN HICKMAN < 26 >

Confidence in a connected world. TheConfident Messaging Security Feature SMB From Left: Lyle Epstein, President and CEO, “We’re able to reduce the number Kortek Solutions and Joe Kennedy, President, of hours we spend on unproductive J.A. Kennedy Real Estate Co. Protection Data tasks, which contributes directly to the bottom line,” Kennedy confirms. “Our previous antispam soft- “And we’re mitigating risk as well—we ware was not very effective haven’t had any instances of data loss at distinguishing spam from since using Symantec Mail Security.” legitimate email. It was causing “Small businesses are deeply af- us to miss business-critical

fected by any kind of productivity loss, Messaging Security emails. This has not happened and messaging is a key area where IT since we switched to Symantec can give that time back to the busi- Mail Security.” ness,” observes Lyle Epstein, presi- In addition, spam email used to dent and CEO of Kortek Solutions. be a major productivity challenge for Kennedy and his staff, draining y Case Stud Consider a hosted hours a week per employee. Now the services approach

company is saving more than 1,000 y A growing number of organizations hours a year previously are choosing hosted, software-as-a- spent sifting through Podcast service (SaaS) solutions for messag- Joe Kennedy and Lyle email and deleting Stor Cover ing security, a trend that IDC’s Burke Epstein talk about how spam, or hunting down they reclaim productivity expects to continue. “By utilizing J.A. Kennedy Real Estate Co. information from acci- at J.A. Kennedy Real SaaS, the initial capital expense of ç Founded: 2004 Estate dentally deleted emails. Contents Location: Las Vegas, Nevada the software or appliance invest- Employees: 12 IT Staff: None Partner: Kortek Solutions “We had projects and lots of information to man- Website: www.jakennedyrealestate.com age, we were adding employees, and we couldn’t afford to lose any more valuable time to spam and viruses.” – Joe Kennedy, President, J.A. Kennedy Real Estate Co. < 27 >

Confidence in a connected world. TheConfident Messaging Security Feature

SMB Podcast Sean Adams and John Jensen discuss the importance of ment is eliminated messaging security and data we’re paying a fraction of server didn’t get patched on time, Data Protection Data and replaced with loss prevention solutions to what it would cost us to but every spam that lands in her or Bertelkamp Automation. a monthly or an- manage messaging security his inbox makes her or him wonder nual subscription in house, and we’re handing it why IT isn’t doing a better job. service fee,” he notes. “SaaS can also off to experts,” says Barrett. “Before, enough spam was getting significantly reduce soft costs related The firm is also using MessageLabs through to impact my image as a savvy to ongoing maintenance, upgrades, Hosted Email Archiving from Symantec IT professional who can stop these

and staff training. There’s less need for to ensure that all emails sent or re- kinds of things,” says Bertelkamp’s Ad- Messaging Security capital investments to replace aging ceived are retained, and to enable non- ams. “Now I don’t get any complaints.” technology. We’re seeing more and technical users to retrieve old email TWM Solicitors’ Barrett agrees. “The more SMBs gravitate toward hosted without assistance from IT. effectiveness of our messaging secu- mail security solutions, and the main “We have an appliance in our data rity and archiving strategy is ultimately

driver is cost savings.” center that acts as the retriever,” communicated out to our clients,” he y Case Stud For TWM Solicitors, a Guildford, Barrett explains. “Everything gets concludes. “It demonstrates profes- U.K-based law firm that operates journaled to a mailbox on both of the sional excellence.” n from seven locations in the south [Microsoft] Exchange servers, and then y of England, cost was what drove its gets picked up by the archiving box, Ken Downie is Senior Writer at NAVAJO Company. His work has appeared in Business Finance, Business decision to outsource email security. encrypted, and sent off to the external Credit, and CIO Digest magazines. Cover Stor Cover “Nearly 90 percent of our email archive in the cloud. So we have a traffic was spam, and I didn’t want to complete history of communication. filter within our network because the And because the archive is hosted Layered Messaging Security ç hardware and bandwidth demands off site, there are disaster recovery Symantec Solutions Contents would be cost prohibitive,” explains benefits as well.” Symantec Hosted Services n MessageLabs Hosted Email Archiving Alan Barrett, head of IT. n MessageLabs Hosted Email Security The firm now uses MessageLabs Staking your n MessageLabs Hosted Instant Messaging Security Hosted Email Security from Symantec reputation—every day Security from Symantec n Symantec Brightmail Gateway Small Business for virus and spam protection, as IT professionals who pay close Edition well as outbound content control. attention to messaging security are n Symantec Mail Security for Microsoft Exchange n Symantec Premium AntiSpam subscription “By outsourcing our spam filtering to also making a savvy career move. service MessageLabs Hosted Email Security, The CEO probably won’t know if the < 28 >

Confidence in a connected world. TheConfident Windows Data Protection Feature SMB Data Protection Data

Backup Leaps Forward by Alan Drummer

New Data Protection Strategies Messaging Security Save Time and Money

ho has time for this topic? You’re in a

hurry, with bigger and more important y Case Stud Wgoals. Just like the captain of the Titanic. Seriously, there are new strategies in data y protection that can not only keep your business off the bottom of the Atlantic, but also reduce Cover Stor Cover costs, save time, and boost productivity. The Confident SMB has prepared a quick summary. Reviewing the strategies are several ç IT decision-makers at small and midsize Contents businesses, along with their IT partners. Some interviewees are the sole IT resources at their companies, serving hundreds of users. Like you, they’re stretched thin, and they’re looking for ways to stretch further. By Alan Drummer If analyst Jon Collins, managing director of Freeform Dynamics Limited, had only a few < 29 >

Confidence in a connected world. TheConfident Data Protection Feature SMB

Nick Joseph, Network Manager, “You need to understand what Orion Registrar kind of information you’re storing Protection Data and what kind of risks exist for that moments to sum up data protection, information,” Collins adds. “The he’d want to leave you with two key word is classification. Probably points: 20 percent of your information has 1. There are some things in data 80 percent of your business value. protection that are easy to do, Which small bits of information Messaging Security such as making a copy of data and would put you most at risk if they storing it elsewhere (often done) were lost or stolen? And what might and validating that the copy can be go wrong with that information?” restored (not done enough). 2. And there are some things that if Classify data y Case Stud you don’t do them, then you are Many businesses have a customer risking a great deal. database that gets regularly backed

up, Collins says, and those tapes y Ask the right questions should be validated. But a data True data protection, Collins protection review might also identify explains, is not about finding the that the business’ most sensitive Stor Cover Orion Registrar, Inc. right answers, but sitting down and data is elsewhere—such as pricing Founded: 1994 asking the right questions. information that is stored on the ç Location: Arvada, Colorado Contents Employees: 24+ IT Staff: 1 Symantec Partner: Advanced Internet Security, Inc. “We can’t go wrong with deduplication. We’re Website: www.orion4value.com digitizing nearly two floors of file cabinets, and I can’t wait until they’re gone.” – Nick Joseph, Network Manager, Orion Registrar, Inc.

MICHAEL BRUNETTO < 30 >

Confidence in a connected world. TheConfident Data Protection Feature SMB Mike Levine, Senior Vice President and deduplication shortens backup Chief Information Officer, Winebow times and conserves storage cap- Protection Data acity, it will become a part of the CEO’s laptop. “Then the question is landscape—a feature rather than more about guarding against data a technology—and part of the way loss,” Collins points out. “Instead of we do backups.” just backing that data up, a better Deduplication is already an answer may well be encrypting that integrated feature of Symantec data or storing it on the main server Backup Exec 2010, released in Messaging Security and giving the CEO secure access.” February 2010. And it will be put to use at Orion Registrar, Have less to protect: deduplicate Inc., an Arvada, Colorado-based Data protection becomes simpler quality and environmental systems with deduplication—technology that registrar that provides audits to y Case Stud enables only a single backup copy organizations seeking ISO 9001 to be made if there are multiple and other types of certification. The y instances of the same information. company is busy migrating from “Even a non-technical person paper to digital processes.

understands the value of dedup- “We can’t go wrong with dedup- Stor Cover lication immediately,” Collins points lication,” says Nick Joseph, network out. “Instead of ‘why deduplicate?’ Winebow manager at Orion. “We’re digitizing ç Founded: 1980 the question becomes “why nearly two floors of file cabinets, Contents Location: Montvale, New Jersey duplicate?’” and I can’t wait Employees: 450 When deduplication first IT Staff: 5 until they’re Podcast Symantec Partner: Quality emerged, it was expensive and gone. Winebow discusses how it Technology Solutions, Inc. often required a special appliance, Data volume solved storage, email, and Website: www.winebow.com availability challenges with Collins acknowledges. “The uptake is now 200 Quality Technology Solutions. hasn’t been that fast for smaller gigabytes, and organizations for perfectly valid Joseph expects it to as much as reasons,” he observes. “But because triple in the next 18 months. Backup

ROBIN RAO < 31 >

Confidence in a connected world. TheConfident Data Protection Feature SMB Data Protection Data Podcast Join Pat Hanavan, VP, Backup time had already been reduced by 33 2010 will further Exec Product Management, to quality and good value. percent with an upgrade to Symantec streamline backup and learn about the latest features A sales force of 250 Backup Exec 12, and Joseph expects reclaim a substantial in Backup Exec 2010. promotes the Winebow that deduplication in Backup Exec amount of disk space. portfolio in the field, “And that moves directly over to cost relying extensively on email. savings,” he says. As the volume of email grew, Messaging Security Joseph is a one-man IT operation performance slowed. “I was getting SMBs Report on serving 24 employees, 80 sub- several complaints a day from reps Data Protection contractors, and 11 offices in 9 trying to sync up their email and countries, and like many other small having to wait up to 30 seconds,”

ymantec commissioned Rubicon y Case Stud SConsulting to conduct an inde- businesses depends heavily on his IT Levine says. “That can seem like a pendent survey of IT decision-makers partner, in this case Symantec Gold lifetime when you’re sitting across

at several hundred small businesses Partner Advanced Internet Security. from a customer.” y in North America with fewer than 250 “I couldn’t do this without help from Levine turned to Quality Technology employees. Highlights include: people like David Kramer at Advanced Solutions, Inc. (QTS), a Symantec 92% of SMBs have some form of data Internet Security,” Joseph adds. “They Silver Partner serving hundreds of Stor Cover backup technology keep me up on the latest advances businesses in the northeast United 50% of SMBs have experienced sig- nificant data loss such as deduplication and make sure I States. QTS deployed Symantec ç 33% of those who lost data lost sales take advantage of them.” Enterprise Vault, a solution that Contents 25% of SMBs conduct no PC backup deduplicates and compresses 20% of SMBs conduct no server Get a load off your servers: archive messages and their attachments as backup Mike Levine is experiencing another it migrates them off Winebow’s email 50% of backup files on PCs and serv- benefit of deduplication. He’s senior server to an archive. ers are stored in the same location as vice president and chief information “Symantec Enterprise Vault reduces originals 13% of those who lost data lost officer ofWinebow , a leading U.S. the volume of messages by about 40 customers importer of international wines, to 60 percent as it archives them for spirits, and sakes that represent high our customers,” says Neil Rosenberg, < 32 >

Confidence in a connected world. TheConfident Data Protection Feature SMB From left: Harry Dente, IT Manager, ETD Discount Tire Center, David Navara, V. President and

Howard Adler, President, Pascack Data Services, Inc. Protection Data

president and chief executive officer amount of data pushed over of QTS. “That leaves just current the circuits was too high, even messages on the email server, which with WAN optimization,” QTS’ can then work as intended.” Rosenberg observes. “And the

“Now email is instantaneous,” target servers were running out Messaging Security Winebow’s Levine adds. “There are of disk space to keep up with no more complaints. Yet users still the source servers, which are see the older, archived messages on a SAN. So by implementing in their mailboxes because of Symantec Enterprise Vault, we

Enterprise Vault, and can open them were essentially able to reset the y Case Stud with a double-click.” replication and send only current data to the DR site.” Recover faster: archive y Why continue to back up data Recover smarter: ETD Discount Tire Center

that’s not changing? That’s a good granular recovery Stor Cover question. “Once you’ve archived Orion’s Joseph Founded: 1946 Location: Lyndhurst, New Jersey data you don’t need and stored it can also recover Employees: 300 backup in addition safely with a tested plan for disaster email in minutes IT Staff: 1 to the granular ç Contents recovery, you shouldn’t have to back because of patent- Symantec Partner: Pascack Data backup,” he says. Services, Inc. it up anymore,” notes analyst Collins. pending granular “I can get what I Website: www.etddiscounttire.com This is the case at Winebow, recovery technology need in one backup where the Microsoft Exchange in Symantec pass. I can recover database is replicated with a third- Backup Exec. “It’s been absolutely individual Exchange messages—or party solution over a wide area incredible, saving us an extra two virtual machine files—and prevent network (WAN) to another site for hours of backup time and also space issues from occurring ahead of disaster recovery purposes. “The we would have used for a brick-level time.”

MICHAEL BRUNETTO < 33 >

Confidence in a connected world. TheConfident Data Protection Feature SMB Data Protection Data Recover sooner: Computer Associates’ ARCserve. or complete Windows systems in image-based backup But as systems got older, if a server minutes instead of hours or days— Harry Dente had a tough data totally crashed it became harder to even to different hardware, virtual protection challenge. He’s IT manager recreate them on similar hardware. environments, or remote locations. of ETD Discount Tire Center (ETD), a “Over time, you get different disk “One of its big plusses for us,” Dente major wholesaler/retailer with seven drives, controllers, and applications notes, “is that in testing, Symantec

locations in New Jersey, 300 employees, that require different drivers,” Dente Backup Exec System Recovery Server Messaging Security Edition has worked great for bringing our servers back on dissimilar “I was getting several complaints a day from reps hardware.” Adds David Navara, vice trying to sync up email and having to wait up to 30 president at Pascack Data Services, “We seconds. Yet users can now recover servers in under an y Case Stud Now email is instantaneous. hour. Before we started using Symantec still see older, archived messages because of Backup Exec System Recovery it would Enterprise Vault.” have taken many hours and probably y even a day or two.” – Mike Levine, Senior Vice President and Chief Information Officer, Winebow Cover Stor Cover Reduce risk: delete! and 100 workstations. Dente supports explains, “making the likelihood Winebow’s Mike Levine is looking them all as a one-person IT team. of successful recovery slim.” forward to an ultimate form of ç Contents The company’s infrastructure Dente turned to IT provider Pascack protection: includes several servers that are Data Services, Inc., a Symantec Silver deleting data older, but critical to the business. Partner, and was introduced to “Downtime for our point-of-sale Symantec Backup Exec System s Video server could easily cause a high five- Recovery Server Edition, an Learn how Backup Exec or six-figure disruption,” Dente notes. image-based backup and disaster 2010 makes life easier He used to perform a full backup recovery solution that easily for IT administrators. of the servers each night using recovers individual files/folders < 34 >

Confidence in a connected world. TheConfident Data Protection Feature SMB Data Protection Data

“Symantec Backup Exec System Recovery Server willing to try new operating systems Edition has worked great for bringing our servers and applications we roll out, such as Microsoft Windows 7 and Microsoft back on dissimilar hardware.” Office 2007. Good data protection – Harry Dente, IT Manager, ETD Discount Tire Center makes us all more productive.”

Back out on the North Atlantic, it was Messaging Security that’s no longer needed. “We’ve just are consistently enforced, courts a clear, calm, and cold night on Sunday, been through a workshop with QTS to have held that organizations can’t April 14, 1912. Judging from dinner set data lifecycle policies and will be be required to produce information menus, everyone on the Titanic had able to discard older information they are not legally obligated to enjoyed a good meal—from 10 courses

according to policy,” Levine explains. keep. Symantec Enterprise Vault in first class down to the simple but y Case Stud “We’re close to finalizing what our includes features that can automate nutritious dishes in steerage. And if the policies will be.” the enforcement of data lifecycle captain had been focused on concepts The usefulness of data lifecycle policies. other than fast and unsinkable, the meal y management is often overlooked, QTS’ might have been followed with a good Rosenberg notes. “Organizations tend Protecting confidence night’s sleep. n Cover Stor Cover to just keep adding storage, and more Good data protection secures more Alan Drummer is Creative Director for Content at than half the stored data will never than just data, Orion’s Joseph NAVAJO Company. His work has appeared in CIO Digest, be needed again. Meanwhile, keeping points out. “Years ago, backup was Los Angeles Times, Create Magazine, and on The History Channel. ç significant amounts of old data can something we considered after Contents create exposure.” the fact—after a deployment,” It’s safer and more efficient, he recalls. “Now, we look at data Symantec Solutions for Data Rosenberg notes, to have lifecycle protection in tandem with planning Protection policies that identify how long an implementation. And because n Symantec Backup Exec 2010 n Symantec Backup Exec System Recovery certain information needs to be our employees can count on backup Desktop Edition kept, and at what point it can be and recovery success, they have n Symantec Backup Exec System Recovery Server Edition deleted. When policies like these much more trust in IT and are more n Symantec Enterprise Vault < 35 >

Confidence in a connected world. ç Contents