John Solano, Chief EngineerAs the prevalence of data breaches continues to grow, businesses of all sizes are recognizing the importance of taking a proactive stance in the areas of data defense and business continuity. The days of simply installing some software and maintaining subscriptions are in the past. Today, companies demand that virus and crypto defenses, as well as data recovery and business continuity plans be implemented, monitored, managed, and even tested for compliance requirements. “Disaster recovery backups have now become commonplace, and companies need to ensure that they can protect themselves to the best of their ability from a budgetary perspective,” says John Solano, Chief Engineer at Matthijssen. Matthijssen, a family-owned business for six decades, has made it their mission statement to find and implement comprehensive disaster management solutions within the scope and budget of its client’s requirements. Beginning with a comprehensive assessment, Matthijssen focuses on critical business workflows to identify where IT equipment and software is most vulnerable and works alongside companies to ensure these areas are bolstered and protected with fault-tolerance and redundancies. Should disaster strike, Matthijssen is then able to step in to recover/ restore data and business resources virtually seamlessly.
Matthijssen has long held that the best defenses are those which are multi-layered and are implemented and monitored within the framework of their managed services. SOPHOS, a Gartner rated company, is one vendor in particular with which Matthijssen has partnered to build robust, layered defense systems leveraging their numerous products to achieve this goal. Data/Disaster Recovery and Business Continuity implementations feature industry compliant equipment and software that adhere to businesses’ specific retention needs while providing security through encryption, co-location (cloud) and access control.
Disaster recovery backups have now become commonplace, and companies need to ensure that they can protect themselves to the best of their ability from a budgetary perspective
When the mail server of a large non-profit company became corrupted, Matthijssen was approached for immediate help. In this scenario, the company’s access controlled and encrypted backups became a vital resource. Matthijssen was able to identify a 24-hour retention point containing an uncorrupted backup of the database and successfully mounted it to the mail server. The client was restored to full functionality rapidly, thanks to the efforts put into Disaster Recovery planning, implementation, monitoring and management.
Scripting similar success stories, “We aim to provide the hybrid cloud model to non-enterprise clients as well as existing clients,” says Solano. The technology behind this model is unfamiliar to many clients due to its often cost prohibitive and ambiguous nature. “To overcome this, we are rolling out a do-it-yourself cloud for small businesses to acquaint them with the technology and to empower them to take advantage of the long term benefits,” he concludes.