The road to data recovery
- 04 July, 2012 12:00
Owen Hile, IT director of Brisbane-based law firm, Gadens Lawyers, has a lot on his mind. Not only is he in the process of outsourcing data to IBM’s data centre in Sydney, but is also gearing up for an office move involving 300 employees.
The law firm, which has been an IBM customer for 10 years, selected the vendor’s SmartCloud virtual server recovery (VSR) offering so that in an event of a disaster, such as a repeat of the Queensland floods, the firm can recover its data quickly.
Hile said the decision to outsource its data was driven by the fact Gadens Lawyers had grown massively in staff numbers. In the past two years, it has gone from 160 to 300 people. This was because the financial services section of the law firm had won new business during that time.
“The employee increase is a big thing to manage from an IT perspective because my team consists of six staff,” he said.
“The challenge we had running our own disaster recovery [DR] site was that it became impossible to manage the increasing amount of gear we had in the Brisbane data centre.
“We looked to outsource the infrastructure side of it to somebody else, which led us to choose IBM.” While it was too early to report a return on investment, Hile said he was attracted to the VSR offering because it had a fixed monthly fee, unlike the previous situation where he was faced with ever-changing hardware costs.
Another deciding factor, according to Hile, was IBM being the most flexible provider he talked to. “I wanted the ability to have access to the physical host, not just virtual machines. Most of the providers I spoke with wouldn’t give us the resources we needed,” he said.
Hile added that he did not go into the outsourcing project “blind”, as his brother, who works as an IT manager for a Brisbane construction firm, had already implemented VSR 12 months ago. “I had positive feedback from him about it so I went in with some confidence that the VSR would work,” he said.
Once the outsourcing project and office move is finished, the IT department will conduct a review to see if any more outsourcing might be conducted in the future.
When it comes to Cloud computing, Hile said the firm is taking a cautious approach because of the sensitive nature of client data. However, it has begun working with a UK-based Cloud provider called Recoup which developed time recording software for the legal services industry. Gadens Lawyers uses the software to manage time sheets and billing records hosted in the Cloud.
“They had an innovative product that we saw a lot of promise in and we looked at the risk side of it,” Hile said. “The type of data they are managing for us is non-sensitive. We were comfortable in outsourcing in that respect because it was limited sets of data.”
Also on the IT project list is document automation and a refresh of the firm’s 300 desktop computers. When it comes to bring-your-own-device (BYOD), Hile said that while senior associates are provided with notebooks for remote use, he has no plans to develop a BYOD policy as of yet because of security concerns.
However, he admitted it is getting harder to justify a fleet of 70 BlackBerrys as staff members want to use their tablets at work, and said a BYOD policy may be developed after the next hardware refresh cycle.
Follow Hamish Barwick on Twitter: @HamishBarwick
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.
Larry Page wants to see your medical records
Dual-Persona Smartphones Not a BYOD Panacea
After two-year hiatus, EFF accepts bitcoin donations again
CIOs struggle to deliver timely mobile business apps: survey
Spiceworks' free management software gets integrated MDM
Bring Your Own Device FAQs
This report covers the frequently asked questions associated with the implications of BYOD devices in the workplace. Any solution in this space needs to be built on simplicity, scalability and security. Click to find out how to address the IT security challenges.
New Demands for Real-time Threat Management
Many organisations are evaluating a new security model based upon IT risk management best practices. This is a good idea, but not enough for today’s dynamic and malevolent threat landscape. To keep up with IT changes and external threats, large organisations need to embrace two new security practices: real-time risk management for day-to-day security adjustments and real-time threat management to detect and remediate sophisticated, stealthy, and damaging security breaches (i.e., advanced persistent threats, or APTs). Learn more.
Advanced Targeted Attacks
The new threat landscape has changed. Cybercriminals are aggressively pursuing valuable data assets, such as financial transaction information, product design blueprints, user credentials to sensitive systems, and other intellectual property. Simply put, the cyber offense has outpaced the defensive technologies used by most companies today. Find out more on how to protect against the next generation of cyber-attacks.