Network Validation Tool for IDPA

SDS Technology is pleased to announce the release of Network Validation Tool for IDPA (NVT-IDPA).

Dell EMC Integrated Data Protection Appliance (IDPA) is a pre-integrated, turnkey and optimized appliance, built on the strength of Dell EMC’s leading data protection technologies. Network validation tool (NVT) for IDPA automates validation of Network readiness at customer site before deployment of IDPA appliance. Prior to installing IDPA, a network configuration has to be completed for the datacenter. As an installation best practice, the deployment team should review this configuration before starting the IDPA installation. Network validation tool (NVT) for IDPA automates this manual validation – saving time and effort.

For additional documentation or to download Network Validation Tool for IDPA (NVT-IDPA), visit our Network Validation Tool for IDPA (NVT) solution page.

New features and capabilities include:

· Added Support to run NVT-IDPA as Standalone Program, so installation is no longer required.

· Added Support to Download Results in Excel as well as PDF format

· Improved Performance by reducing time for completing Network Services Validation

· Added Switch validation support for Top of Rack and Upstream Switch: Is Port a member of Port Channel, and if so, what mode?

· Added Support For DELL OS 10 Switch, using show-tech support command output – vlan created in upstream switch

· Added IDPA version and Model in Download Results

Target audience:

· Internal Professional Services Resources (PS) and Project Managers for deployment of IDPA solution

· Business Partner Resources (PS) and Project Managers for deployment of IDPA solution

· Support Engineers to pre-validate the customer environment

· Customer Before deploying IDPA solution


  • No Related Posts

Rallying the Troops For GDPR

EMC logo

It can be lonely sitting out on Risk Management Island.  I have some good news for you – your closest friend, Compliance, has dropped a break in your lap – GDPR.  I know it isn’t easy to see it but GDPR can be a rallying cry to improve your risk management, security and compliance world.  Although the deadline was over a month ago, companies continue to adjust their processes in response to the regulation.


GDPR and the Risk Management Process

There are certainly many dimensions to GDPR – from the technology implications to the business operations changes needed.  One area I would like to highlight is the risk assessment angle of the GDPR.  This is an emerging topic in the regulatory compliance world.  No longer are regulators saying you must do A, B and C.  They are requiring a risk based approach – meaning, your company has to determine the risks and design and operate controls that effectively manage that risk.  We see this not only in GDPR but other regulations, PSD2 for instance, and it is a trend that will continue.

Organizations need to bulk up their risk assessment processes – how are risks identified and assessed, how are decisions made to address those risks, then how are the risks treated and monitored.   This must be a demonstrable process that can be inspected.   Those steps and the decisions made during the process should be documented to show how the organization arrived at its conclusions.


GDPR changes things from a ME thing to a WE thing.   Rally the troops.  Your friend Compliance will appreciate it.


Update your feed preferences





submit to reddit


  • No Related Posts

Re: Unarchive journal

You are correct, there are a number of risks in doing a migration and you will need to assess what those risks are and what you are willing to accept for functionality. Just to give you background reference, I work for a company that has specialized in SourceOne and the predecessor EmailXtender since before it was owned by DellEMC, I have been working in email archiving for over 17 years, and have been working with archive migrations for over 8,

If this is a small amount of data (less than a few TB), the SourceOne Restore may well work fine. You will have to plan for a space consumption for the restored data going back into a native target if going back into Exchange. Be aware that what you have stored in SourceOne when you look at the archive volumes in the S1 Admin console is single instanced and compressed. If you have SourceOne Reporting turned on, you can get a better idea of what sizes could be coming out. When extracting from an S1 Archive to native targets (be that Exchange, or even to PST) size of extraction target will need to be at least double, if not 4x or 5x of what you see stored inside S1. You also need to know that a SourceOne Restore activity, while it will do the job, can take a good bit of time (i.e. a few GB per hour per mailbox, in this case per journal mailbox). If you have a single journal and say 20+TB of data, you will be processing for quite some time and will need to split the job up and bracket it by date most likely. You also will get a one shot approach, that while you can get a report of what does and does not fail to restore (with detail logging turned on) you will not get a “Retry” option. You also do not get a report of what a mailbox by mailbox breakdown might look like for a migration (again unless you have S1 reports turned on and drill down into the mailbox detail for the users). Customers that have taken the approach of using the Restore Historical activity have seen small amounts and small counts of users work, but if you have hundred or thousands of users with 10s/100s of millions/billions of messages, the restore activity will be overwhelming so be prepared for a lot of work and rework as you go through the restore.

Keep in mind, that while a migration solution (yes I have worked with TransVault for a number of our customers in addition to some other migration tools) can have a cost to do so, the cost is about the value of the data, not the cost of the box. So you do need to look at the risk assessment of what the migration must achieve, and what the costs are of your time to do the work, as well as the costs or redoing work, proving the completeness of the migration, and probing what users got what data, and what did or did not succeed.

There are also other factors such as chain of custody, that dependent on the market segment your company serves, may well cost more than simply trying to go it alone. If you company is subject to regulatory oversight, or has a pattern of being highly litigated, the real costs may not even be the actual migration, but the risk of losing data in the migration or risks from being fined or sued for losing critical data. Part of your risk assessment can and should include the consideration of what would it take to simply maintain the S1 archive in place until the data in it has expired, this does mean operating a dual system for a period of time.

A migration solution will give you the option to do a pre-inventory of all data, including active and ex-employee, and archives and journals. You can then decide who, and what (based on filters such as date) is to be migrated into the new archive (if that is where you are going) or back into Exchange or PST. You can also direct ex-employee data to either a different user account, a corporate oversight account, or even elect to go external (such as to PST or MSGs) totally off-line if desired. So have multiple potential destinations for the migration can be quite helpful if that is needed. Depending on the new archive destination, you may well be able to do a direct migration from SourceOne into the new archive (such as if you are going to Office 365 and want to put data into the Archive of a user mailbox).

Leave a note if you wish to discuss further in detail with someone that has been where you are and helped other customers make this kind of change.


They’re training to stop hackers

Students interested in applying for the program must provide a letter of application with a statement of purpose, goals, expected degree and graduation date, time of support requested (grad/undergrad and in or out of state for tuition). They also must have a copy of all transcripts, at least two recommendations from faculty members or employers, a formal resume and GRE scores for graduate applicants.