Blog

Welcome to MR2 Solutions Blog

  • Home
    Home This is where you can find all the blog posts throughout the site.
  • Categories
    Categories Displays a list of categories from this blog.
  • Tags
    Tags Displays a list of tags that have been used in the blog.
  • Bloggers
    Bloggers Search for your favorite blogger from this site.
  • Team Blogs
    Team Blogs Find your favorite team blogs here.
  • Login
    Login Login form

Uncategorized

Ways to stay innovative with Hyperconverged Technology

 

 After partnering up with Scale Computing, we've recognized that there have been major updates and changes in the hyperconvergence space that ultimately benefit our customers. Flash storage has added greater capacity in CUP, RAM and storage across a number of new solutions in our portfolio, in particular in the HC3 solution by Scale Computing. To satisfy the needs of more storage hungry data centers and in response to our customers in the market, we are pleased to announce recently updated features in the HC3 system. 

 

Storage Deduplication and Improved Detail

To reduce the storage footprint of data stored on virtual machines, HC3 has added storage deduplication. Virtual disks are deduplicated, post-process to eliminate duplicate data blocks and free up storage with minimal impact to running VMs. Deduplication allow disks to hold considerably more data than previously allowed within the same physical disk capacity. Storage details available in HC3 Web interface have dramatically improved with more information on utilization and efficiency.

 

Multi-Cluster Remote Management

This new update also includes the ability to monitor multiple clusters within the HC3 Web interface. The easy to use design shows the status of multiple clusters that can be local or remote to keep tabs on your entire enterprise of HC3 nodes and clusters. Whether they are single nodes in remote offices or DR targets, or multi-node clusters, the new multi-cluster view provides at-a-glance monitoring of all your HC3 assets.

 

Multi-User Administration and Logging

Multi-user login and administration is another update that will help companies better manage multiple admins. Multiple users may login with their own credentials to perform their own administrative functions. Logging keeps track of administrator access to assist in management and troubleshooting. 

 

Disaster Recovery Planning Service

MR2 will work with you in putting together a comprehensive disaster recovery plan including planning, identifying dependencies, prioritizing workloads, and DR testing. This service is now available to make sure you are meeting or exceeding your SLAs for recovery and minimizing data loss. It never hurts to have expert help when planning for disaster. 

 

Premium Installation Service

MR2 Solutions loves to work with technology partners that keep it simple for our customers. For those who want to hit the ground running the HC3, we offer a Premium Installation Service facilitated by our highly qualified support engineers. This service includes planning, prerequisites, priority scheduling and deep-dive technical training. This will enable you to manage your new solution in no time. 

 

Single Node Appliance Configuration

Now, a single appliance can be deployed all by itself. While a cluster is preferable for high availability and primary production, a single appliance can be more sufficient for disaster recovery, remote or branch offices, or even the small "s" of the SMB. 

 

And More!

 

Discover more updates on the latest Hyperconverged technology with MR2 Solutions at our upcoming educational seminar and free comedy show! 

Join us at Irvine Improv Comedy Club on Thur. Feb. 21, 2019 at 5PM to network with IT professionals and IT experts from Scale Computing. Enjoy a complimentary happy hour, dinner and comedy show on us! 

With limited seats available, RSVP now! 

 

MR2 LAUGH & LEARN: HC3 with Scale Computing

Thurs. Feb. 21, 2019 | 5PM 

Irvine Improv Comedy Club

REGISTER HERE

Why you need Managed Cloud services in your Data Center

 

As local IT consultants, we are seeing many IT departments struggle with limited resources while dealing with regulatory compliance requirements or intellectual property. Many of our customers also have security concerns as they are expanding locations and are going through a server/ desktop refresh. MR2 Solutions has partnered with Rapid Scale, a managed and hybrid managed cloud computing provider, that provides world-class secure and reliable suite of cloud solution to businesses of all sizes and across all industries. 

 

Here are some key differentiation factors that we've seen with this company out in the market: 

  • Full managed cloud services
  • Hybrid managed cloud services
  • Specialize in Desktop as a Service
  • Citrix partner of the year
  • First DaaS and SD-WAN Certified Global Citrix CSP
  • 24x7x365 White-Glove Global Support and Help Desk tickets
  • 100% uptime SLAs
  • Compliance: HIPAA, SOX, PCI, etc. 

Join us online for an educational webinar and learn more about this new dynamic in business and how solutions like Desktop as a Service, Infrastructure as a Service and Disaster Recover as a Service are helping IT teams meet user requirements while maintaining reliability and security.

 

[MR2 WEBINAR]: Cloud Computing with Global Leader, RapidScale

Friday Feb 1, 2019 | 9:00AM PST

REGISTER HERE: http://bit.ly/MR2Web_CloudRS 

Discover why your Network is Inefficient and How you can Solve it

With today's explosive data growth in real time applications, distributed work forces and cloud computing, a business's productivity and customer responsiveness is more dependent on a wide area network infrastructure. As more companies are focusing on WANs and cloud access networks, it's crucial to have enough strong bandwidth to support increased demand and predictable reliability to ensure continuous application availability. Cloud is rapidly changing demands on enterprise IT legacy resources. MPLS circuits and enabling devices, often augmented by separate WAN-Op and firewall equipment, no longer offer the necessary requirements for cost savings, flexibility, bandwidth, manageability performance and reliability. Check out our 2 min video on SD-WAN and how it can solve today's IT challenges. 

 

This month, you'll have the opportunity to connect with technology experts on SD-WAN, our partner Talari. Join us for a Holiday Cruise Luncheon on Newport Beach harbor on Dec. 18 to learn from industry leaders and to network with other IT professionals in the area. With limited seats, REGISTER NOW! 

 

MR2 HOLIDAY CRUISE LUNCHEON

Tues. Dec. 18, 2018 | 11:30AM

Hornblower Cruises Newport Beach - 2431 W PCH (South Location)

REGISTER HERE

Posted by on in Uncategorized
Quick Tips for a Cloud Based DR Strategy

You are jeopardizing your IT environment and your job if you don’t have a strategy for disaster recovery. Whether you are ready or not, unexpected outages will occur and if you don’t have a protocol in place, data loss will cost millions of dollars or even bring your company to failure. Forward-thinking IT leaders are increasingly turning to cloud-based Disaster Recovery as a Service (DRaaS) as a simple and cost-effective solution for protecting IT resources, ensuring high availability and having a plan to fully regain operations.

Here are some quick tips and benefits of including a managed cloud solution in your DRaaS option and how it can make it easier to economically protect your most valuable asset: your data.

 

1.        Cloud availability can eliminate human error and costly downtime

Cloud based DR prevents inaccuracies and flaws associated with traditional offline backups while improving visibility into file stores and virtual machines. This solution plays a heavy role in Recovery Time Objectives (RTOs), Recovery Point Objectives (RPOs) and regular testing and updates. Cloud technology has the robust capability to get you back into business within minutes of an incident.

 

2.       Cloud can do more than just back up

Traditional DR is often difficult to operate, hard to configure and quickly becomes outdated. Often times it’s out of financial reach for many organizations. Therefore firms solely rely on back up for their disaster recovery, however it doesn’t cover documented policies and procedures, application prioritization, RTOs and RPOs. Fortunately, cloud computing reduces the need for on-prem data center space, IT infrastructure and resources. It simplifies management of backup configuration and media.

 

3.       Cloud based DR can bring tremendous cost savings

The world is depending on 24/7 availability of data and applications, unanticipated downtime can be devastating. Outages now cost organizations an average of $140k to $540k per hour, and $5,600 per minute. What is even more alarming is that 25% of businesses never recover from disaster. Cloud has the flexibility of using operational budget rather than a large upfront capital expenditure to implement or expand a protection plan, as well as scaling up or down as requirements dictate.

 

For those who had already known the benefits of cloud and are well on your way to adopt a fully comprehensive solution, it now all comes down to finding the right managed cloud service provider with the right mix of solutions to meet business needs. With hybrid, multicloud IT infrastructure becoming the norm, organizations are increasingly dependent on multiple tools for data protection as part of their DR strategy. As you evaluate DRaaS providers, MR2 is here to highlight how our industry-leading partner, Navsite is a reliable cloud provider with managed cloud solutions to solve any of your IT needs. Benefits of working with Navisite include:

  • Reliable cloud provider that delivers excellent customer service, offers a high level of customization ability and meets any require certifications
  • Its cloud-based solution is easy to configure, manage and test
  • Takes a tailored, application-centric approach to DRaaS Tier 1, 2 and 3 applications, infrastructure and/ or business units may require separate tools to meet different RPOs and RTOs
  • Makes business continuity easy and simple, offering a portfolio that’s flexible, scalable, and feature-rich offerings, including vCAv, which makes it possible to get back to business a few minutes and a few clicks after disaster strikes

 

To learn more, contact a MR2 Solutions specialist today 949-474-4495 or email – michael@mr2solutions.com.

 

If you’d like to connect with experts from Navisite directly, come out to our Magic & Wine show event. Meet with them and other IT professionals in the area while enjoying a cocktail reception and complimentary magic show. Register now below:

 

MR2 Magic & Wine Show Event

Friday Nov. 9, 2018 | 6PM

Majestic Garden Hotel Anaheim

REGISTER HERE  

How to Lead today's Hybrid Enterprise with Software-Defined Perimeter

Enterprises today are challenged with accessing resources that are not on-prem securely. IT professionals also struggle with today’s digital transformation where control is limited as companies migrate and manage remote users, applications and cloud systems. In addition, IT workloads have evolved dramatically where XaaS and cloud service providers have shifted the IT infrastructure that supports the enterprise away from its users. Enterprise applications and workloads are increasingly supported by distributed infrastructure and capabilities that often stretch across multiple cloud providers, data center providers and XaaS providers. In this shift, often times the security policies and solutions that are protecting critical data and applications remain on physical hardware.

 

The Need for Zero Trust

Zero Trust is a philosophy that changes the way businesses approach network security. The concept is that it’s a security model that redesigns networks into micro-perimeters. Zero trust is generated to limit risks associated with excessive user privileges by adopting these three main elements. First is the fact that zero trust ensures all resources accessed are secure regardless of the location or hosting model. Second, this model adopts a “least privledge” strategy to strictly enforce access control. Lastly, the zero trust model inspects and logs all traffic for suspicious activity.

“Zero Trust demands that CIOs and CISOs move away from legacy, perimeter-centric models of information security – which are useless for today’s digital businesses, no longer bounded by the four walls of their corporation – to a model that is both data- and identity centric and extends security across the entire business ecosystem.” – Forrester

 

What is Software-Defined Perimeter (SDP) and how does will it help?

Software-defined perimeter is an open security architecture promoted by cloud security alliances comprised of vendors and practitioners that specialize in network security. SDP has three main elements for this type of architecture:

-          Identity-Centric: user- or device- based access control; bridges the gap between network security user roles, admin and application access tailored to the specific policies; enables the network to minimize the number of network access

-          Precise, Adaptive, Resilient Security: emphasizes authentication before connection where it can dynamically- provisioned for 1:1 connectivity where each individual will have a unique view of the network tailored to their policy

-          Designed for hybrid environments: Infrastructure-neutral and simplifies security for environments with a mix of cloud and on-prem environments

“By 2011, 60% of enterprises will phase out network VPNs for digital business communications in favor of software-defined perimeters.” – Gartner

 

A Better Approach to Secure Access

It’s virtually impossible to secure your distributed, hybrid IT infrastructure with perimeter security that hasn’t been updated in 20 years. Perimeter-based security solutions such as VPNs, next-gen firewalls and NACs are ineffective against malicious insiders and targeted attacks. These antiquated tools are also complex and expensive to operate.

b2ap3_thumbnail_Cyxtera1.jpg

 

Our top colocation and security partner, Cyxtera, offers a top of the line solution called AppGate SDP that meet these zero trust elements. It is also resilient and massively scalable to support enterprise-grade, mission-critical and global environments. Learn more with Jim Anthony, Cyxtera’s VP of Cybersecurity Sales Engineering as we will be a guest speaker at our IT Executive Panel Discussion at our MR2 Porsche Driving Experience event. Learn more here.