sb-eu logo
Story image

Sungard AS named DRaaS leader by Forrester

25 Apr 2019

Sungard Availability Services (Sungard AS) was among the select companies that Forrester invited to participate in The Forrester Wave: Disaster-Recovery-As-A-Service Providers, Q2 2019. In this evaluation, Sungard AS was cited as a Leader in DRaaS.

Sungard AS received the highest score for both the Strategy and Current offering categories among the eight vendors included in the report. 

It was noted for its ability to “serve client needs at all stages of their need for business continuity.” 

The report also cites that Sungard AS “uses app-level orchestration to serve the most complex deployments,” and “assesses the success and failure of DR tests or invocations and ties SLAs to financial penalties.”

Sungard AS was also cited for presenting “the recoverability state as a “resilience score” that includes elements that affect recovery, including previous test successes and trends, recovery life-cycle management, and applied automation.”

The report highlighted that Sungard AS “manages large-scale infrastructure recovery using application discovery and dependency mapping, automated change management, and advanced orchestration tools that automate recovery tasks at a business application level.”

“I believe this Forrester Wave report illustrates how Sungard AS has continued to innovate and deliver market-leading capabilities to improve enterprise business resilience,'' says Sungard AS product management for global recovery services vice president Joseph George. 

“With our broad range of advanced, multi-tier DRaaS services and cloud recovery solutions, our customers can be sure they''re significantly improving their resilience posture. That’s more critical than ever given today’s digital economy.”

The Forrester Wave report evaluated eight DRaaS providers on three categories divided into 34 criteria, including:

  • Current offering: Criteria includes core DRaaS offerings, recovery objective capabilities, technology support, data transfer, change management, ownership of recovery tasks, data resiliency and risk mitigation, security, self-service management, self-service reporting, consulting services, scale, supported disaster declarations and concurrent failure handling
     
  • Strategy: Criteria includes services offerings strategy and corporate strategy
     
  • Market presence: Criteria includes install base, revenue, revenue growth, employees, geographic scope, customer feedback and technology partners
Story image
Check Point acquires Odo Security to bolster remote security offering
The deal will integrate Odo’s remote access software with Check Point’s Inifinity architecture, bolstering the latter company’s remote security capabilities in a time where working and learning from home has become the norm, and looks to largely remain that way in the near future.More
Story image
Shlayer malware proves Apple devices aren't as secure as you think
"Apple never talks about malware publicly, and loves to give the impression that its systems are secure. Unfortunately, the opposite has been proven to be the case with great regularity."More
Story image
Video: 10 Minute IT Jams - The benefits of converged cloud security
Today, Techday speaks to Forcepoint senior sales engineer and solutions architect Matthew Bant, who discusses the benefits of a converged cloud security model, and the pandemic's role in complicating the security stack in organisations around the world.More
Story image
Revealed: The behaviours exhibited by the most effective CISOs
As cyber-threats pile up, more is being asked of CISOs - and according to Gartner, only a precious few are 'excelling' by the standards of their CISO Effectiveness Index.More
Story image
Spending on managed security services in A/NZ to grow despite COVID headwinds
COVID-19 has changed security priorities significantly, and managed security services in A/NZ are set to benefit. More
Story image
Ripple20 threat could affect 35% of all IT environments – ExtraHop
The vulnerabilities have the potential to ‘ripple’ through complex software supply chains, enabling attackers to steal data or execute code.More