We spent HOW much time to restore that backup file? Significantly less with file-level restoration

Offsite backup: a necessary evil that can be unreliable, hard to track and expensive to support. We know; it’s not what you got into technology for. Nonetheless, the business depends on putting mission-critical data offsite for those just-in-case moments of disaster.

The problem is, most “disasters” tend to be a single file that someone accidentally deleted or that got corrupted somewhere along the email chain.

Granted, if the primary business location becomes a smoking hole in the ground (perish the thought), we would be thankful to have all of that data available in a remote location somewhere so at least we know it could be restored “some day” instead of “never.” But for the normal course of doing business, what a hassle!

Option A: Recover your offsite backup file from tape

Let’s say accounting needs one file back from offsite tape backup. OK, here we go:

  1. figure out where the file was located,
  2. identify the right tape,
  3. recall the right tape from the vault,
  4. retrieve the tape from the offsite location,
  5. halt any currently running backup processes,
  6. swap the tape back into the library,
  7. attempt to restore the file (50% – 77% fail rate depending on the cited source),
  8. copy it back to the original location,
  9. notify and validate that the restored file is accurate,
  10. pull the tape back out of the library (make sure you have the right one),
  11. prepare for sending it back offsite,
  12. return tape to offsite location and verify its arrival.

When you add up all of the time spent, it could easily reach four hours for an experienced system admin to reliably restore one file. That’s four hours of time NOT spent on the mission-critical projects that are tied to helping the business achieve current goals, one of which is not spending inordinate time on the restoration of single backup files.

Option B: Recover your offsite backup file from snapshot

Maybe you’ve convinced your organization to make the transition from tape to a digital alternative like regular snapshots, meaning taking and storing images of the entire server on a daily basis. Now the restoration of that single file looks like this:

  1. figure out where the file was located,
  2. identify the right snapshot,
  3. download the entire server snapshot,
  4. restore the entire server on local hardware,
  5. find the file,
  6. attempt to restore the file (better odds here over tape),
  7. copy it back to the original location,
  8. notify end-user and validate that the restored file is accurate,
  9. delete the temporary server and downloaded snapshot.

From the initial request to getting the file restored and cleaning up the restored snapshot server, you might have cut the four hours of time to two. Nonetheless, it’s still the time of a resource with a well-paid skillset whose time is undoubtedly better spent elsewhere. Let’s hope you only get these requests occasionally.

Option C: Recover your single file with self-serve file-level restoration

When you have the opportunity to guide your organization to consider an offsite backup and recovery that makes the most effective use of your resources, consider the next two options when factoring in the real costs of your staff.

This is where your blood pressure starts decreasing and you get to allocate more resources on your critical business projects instead of recovering errant files.

If you can leverage a recovery technology that affords file-level restoration, you can use point-and-click with Windows, or console access with Linux, to do the following:

  1. login into your backup server,
  2. browse (Windows) or change directory (Linux) to the location of your file,
  3. select the version you want to restore (yesterday’s? last weeks?),
  4. specify target destination,
  5. click file (windows) or enter console command (Linux),
  6. wait for file to download,
  7. notify end-user it has been restored.

Our clients report it takes 5-15 minutes, depending on file size. Obviously this will depend on how much data you’re restoring and your connection speed. It’s also fair to say that you probably don’t need your most senior system administrator performing these tasks. They don’t have to know how to spin up a new server, be familiar with tape libraries, or unwind a snapshot. In addition to spending less time, you may be spending less for the time spent.

Did you notice the omission of verifying the file restored correctly? Not necessary if you have integrity validation at the time the backup is performed. More about that in a future post.

Option D: Managed file-level restoration

Some providers are now offering a managed flavor along the lines of Backup-and-Recovery-as-a-Service (everything needs to be available “-as-a-Service” these days, right?) In this case, file restoration might be as simple as:

  1. call or submit a ticket with the name and destination of the file to be restored,
  2. notify end-user when it has been restored.

Will you pay more for file-level restoration and managed recovery services? Probably, but don’t forget to factor in the time, headaches, and human resources of managing the “less-managed” solutions.

Cheers to fewer, faster recoveries!

Credit to Nick Lumsden for insights into the pains of backup and recovery.


7 questions to keep your offsite backup and recovery out of the outhouse

7 business drivers for your backup and recovery strategy

White paper: Disaster Recovery

Posted in Cloud Computing, Data Centers, Disaster Recovery, Information Technology Tips | Tagged , , , , | Leave a comment

TechPoint is driving Indiana’s technology growth

Upon moving into the Indianapolis market with the opening of a new 44,000 square foot data center, one of Online Tech’s first orders of business was to become as ingrained in the Indiana tech community as it is in Michigan’s.

With the ‘Victory’ statue that sits atop the Soldiers and Sailors Monument in downtown Indianapolis outside his office window, TechPoint president and CEO Mike Langellier seems to be winning the quest to grow Indiana’s technology base.

Hello, TechPoint.

Led by president and CEO Mike Langellier, TechPoint is a nonprofit economic development organization leading Indiana’s technology growth initiative. It is successfully doing this by focusing on talent recruitment, entrepreneurship and marketing tech and health information technology (HIT) cluster development in the state.

Impressed by the group’s work, Online Tech signed on as a TechPoint Pillar Partner, joining organizations like Eli Lilly and Company, AT&T Indiana and Comcast Business that contribute $25,000 or more annually to the effort.

TechPoint received a boost two years ago when its board of directors lured Langellier from his fast-rising career as an entrepreneur and software executive and charged him with leading the growth initiative into a next generation economy. Langellier accepted the challenge and the impact of his passion for tech and startups and vision of the future is already rippling through the ecosystem.

Whereas TechPoint had previously been known primarily for its networking events, Langellier ushered in a strategic shift to focus on the challenges and opportunities such as talent attraction and retention, capital investment and media promotion.

Langellier will discuss TechPoint and help welcome Online Tech to the Indiana tech community during the grand opening celebration of its Indiana data center, scheduled for 3 to 7 p.m. on Thursday, Oct. 23.

Brief remarks from Langellier, Online Tech co-CEO Mike Klein, Kelly Services IT Service Manager Richard Anderson, UYH LLP Managing Director David Barton and Baseline Data Services founder and President Lance Thompson are part of the itinerary at the no-pitch, behind-the-scenes look at the secure, multi-compliant, enterprise cloud computing, colocation, off-site backup and disaster recovery data center.

Anderson represents Kelly Services, a longtime client of Online Tech’s Michigan data centers. Barton is an auditor who will speak about the rigors of compliance in data centers. Thompson signed on Baseline as Online Tech’s first Indiana client and the Plainfield, Ind.-based company also became a business partner, extending our disaster recovery solution capabilities.

All the speakers will be available for networking and will, hopefully, join fellow attendees in Online Tech’s request to “eat, drink and be merry” at the event. (Register for the open house here.)

Now, back to TechPoint:

The organization’s talent initiative is comprised of the Xtern (retention) and Xpat (attraction) programs. This summer, 50 Xterns lived together on the downtown Indianapolis campus of IUPUI and worked at various area tech companies as part of “the ultimate tech summer internship experience.” The first Xpat event, IndyXmas, sold out and brought expats and out-of-towners from 14 states, several of whom have taken jobs and moved back to Indiana as a result.

To help catalyze startup growth with capital investment, customers and educational Entrepreneur Bootcamps, TechPoint resurrected its Tailwind Initiative with the support of the state’s Office of Small Business and Entrepreneurship and in collaboration with Launch Indiana. Last year, angel investors in the HALO Capital Group surpassed $20 million in investment in Indiana startups.

TechPoint’s signature event, the Mira Awards, honors the best of tech in Indiana. Last year’s sell-out attendance of 1,000 was a record. This year set the record for applications, with 170 applications for 14 awards — a 40-percent increase over the previous record — and almost half of those applicants are first-timers. A new media partnership earned Mira participants and winners a half-hour TV special on Inside Indiana with Gerry Dick, and the Mira Awards is now gaining a reputation for being as fun and energized as it is classy and powerful for the industry.

Lastly, to promote the companies and people in Indiana’s tech ecosystem, TechPoint increased its content marketing and media efforts, primarily with a new techpoint.org website and blog, as well as a growing and influential social media presence. This year the team will spotlight 200 stories and amplify them through channels to millions of impressions, helping to raise visibility for Indiana tech companies and people. New digital tools like a job board for tech openings and a “buy local” tech directory are currently in development.

Posted in Data Centers, Information Technology Tips, Online Tech News | Tagged , | Leave a comment

Online Tech part of webinar presentation of 5 tools to protect patient data

Want to learn more about five tools that can help protect patient data? Online Tech Director of Healthcare IT April Sage will be part of a panel presenting “5 Key Tools to Help Your Organization Achieve HIPAA Compliance” via webinar on Tuesday, Oct. 21.

The 90 minute webinar begins at 2 p.m. ET. (Register here.)

BlogHipaa.com presented the five tools in a recent post, citing tips from representatives of organizations in each area. Now those industry experts will co-present a webinar and expand their contributions from their respective areas of interest. BlogHipaa.com is hosting the webinar, which will highlight ways organization can use the tools to make the task of HIPAA compliance easier and more effective.

The five tools and the associated presenters are as follows:

  • Email encryption: Andy Nieto, Health IT Strategist at DataMotion
  • Mobile phone BYOD protection: Daryl Glover, Executive VP of Strategic Initiatives at qliqSOFT
  • HIPAA-compliant storage: Asaf Cidon, CEO and co-founder of Sookasa
  • HIPAA-compliant hosting: April Sage, Director of Healthcare IT at Online Tech
  • Compliance tracking solution: Bob Grant, ex-HIPAA auditor and CCO of Compliancy Group LLC

HIPAA Compliant Hosting White Paper
5 tools to protect patient data
Up your HIPAA IQ with a little HIPAA FAQ

Posted in Data Centers, Encryption, HIPAA Compliance | Leave a comment

Backing up sensitive data for recovery? Meet Mr. FIPS

In regulated industries, sensitive data must both be protected and retained, a challenging juxtaposition in a landscape of increasing cybersecurity threats. In the healthcare field, for example, losing data is one matter. Not having “exact retrievable copies,” as required by law, is another. And protecting those backed up files is equally important.

Healthcare and financial data must be retained for several years, but in many cases companies that handle sensitive data may retain it much longer. This means exponentially more sensitive data being sent offsite for remote backup and archival. Earlier this year, company officials at Bit.ly blamed a breach of its customer database on unauthorized access of its offsite backup data maintained by a third-party hosting provider.

Adding one or more remote locations and/or third parties to your offsite backup and recovery strategy complicates your risk profile, but there are a few things to look for that can help you sleep better at night, even if your sensitive data is stored offsite. If you have to meet compliance and security demands, here are three things to incorporate into your proposals and requirements:

1. Visit the physical location of your backup data

Even if you are going with a cloud-based or a third party tape or media-based offsite backup solution, it helps to know you can fly, drive, walk and point to your backup data. Not only does this improve your ability to accurately assess the risk to that data while in storage, it also increases the odds that you can get it back in a timely manner if you need it for disaster recovery efforts. Spend the few hundred dollars to go visit the facility, it will be cheaper than sleeping pills in the long run and well worth the peace of mind. There’s nothing that tells you more about the safety of your backup data location than experiencing it yourself.

2. Encrypt with Mr. FIPS

Those of you in regulated industries may already know Mr. FIPS, as in FIPS 140-2. If not, please introduce yourself. FIPS 140-2 is a cryptography standard specified by the Federal Information Processing Standard, and referenced by NIST (National Institute of Standards and Technology), the government, healthcare and other industries. Why do we care? If you choose an offsite backup solution that embeds one of the validated FIPS 140-2 cryptographic modules, you have a good level of assurance that the sensitive data you’re storing offsite is protected by strong encryption that had been tested and verified by an independent, third party organization. Unless you have time to try breaking the encryption algorithm yourself, go with an approach that someone else has had the time to test.

For healthcare covered entities and business associates, encrypting your offsite backup with a FIPS 140-2 validated cryptography module means that you can prove due diligence to protect patient data in the event it is lost or stolen. In fact, if the patient information has been encrypted in this manner, it’s not considered a data breach. When you compare any investment into using solutions that meet this encryption standard with the costs of data breach remediation including legal, loss of customer confidence, and remediation, it’s an easy investment to make.

In our own case, it was the deciding factor when Online Tech chose the encrypted version of EMC’s Avamar technology since we serve many healthcare, financial, and eCommerce clients that need to protect sensitive information. This gives us peace of mind knowing we’re protecting our clients data while in-transit and at-rest in our offsite backup.

3. Ask for the audit report

Adding a third party or remote location increases the complexity, but doesn’t need to make you less compliant or secure. Find a partner with the same approach to compliance and security as your organization. If you are handling sensitive, regulated information, this means that they too, should be getting independent, annual audits. Ask for the audit reports, and read them. They should make sense and leave you feeling reassured. If otherwise, keep looking.


7 business drivers for your backup and recovery strategy

3 questions your CIO needs to answer to set your offsite backup strategy

White paper: Disaster Recovery

Posted in Data Centers, Disaster Recovery, HIPAA Compliance, PCI Compliance | Leave a comment

7 questions to keep your offsite backup and recovery out of the outhouse

For many in the Midwest, fall is hunting season, and it wouldn’t be official without an outhouse reference. “Bear” with me; many companies are choosing the outhouse option needlessly as a regular course of their offsite backup and recovery planning.

As everyone plans and budgets for next year, many organizations are re-evaluating if their resources are best spent on managing offsite backup and recovery in-house, or if using a third party can effectively allow them to concentrate resources closer to their core competency and customers.

For some businesses, the cost of buying, building, or leasing  a secondary physical location is an automatic “no”. Others are already maintaining second sites, but may want to focus IT resources on more profitable areas of the business. In these cases, finding an outsourced provider to absorb the operational costs and burden of the complexities can make sense, despite the fact that finding a responsive partner for your offsite backup and recovery can be an elusive search.

As a litmus test for potential backup and recovery partners, ask yourself:

“Will I sleep better knowing my data is protected with [vendor X]?”

If the answer is yes, then you have probably found a good offsite backup and recovery partner. Congratulations, you’re sleeping better than most of your IT peers.

If the answer is no, don’t wait to continue the search until a disaster strikes unless your business can afford a major scramble.

If your business is like many businesses, this might be where you either:

  • flush the whole conversation until next year’s budget, or
  • leave it in a remote, dark place and hope it doesn’t raise a stink later.

In other words, because of budget or other resource constraints, the outhouse is the preferred choice.

Before you resort to hunting camp behavior, let me encourage you to continue the search. The trail might be faint, but the reward is worth your persistence.

Here are some additional questions to get your hunt for an offsite backup and recovery solutions back on track. If you can’t afford to put together and maintain a robust offsite backup and recovery solution in-house, try asking these questions to potential third party backup and recovery providers for the most painless solution that will help you rest at ease:

  1. Do they use their own offsite backup and recovery solution?
  2. When was the last time they tested recovery of their own critical systems?
  3. What is the failure rate of daily backups?
  4. Do they offer file-level restoration, or only a full-server snapshot?
  5. Do they leverage deduplication to optimize backup windows?
  6. If your data is regulated by HIPAA, PCI, SOC 2 or similar, do they maintain their own independent, annual audits?

Bonus points: Will they share a copy of the audit report with you as a client to reduce the burden of your audit process?

Undoubtedly, trying to find the perfect partner for your offsite backup and recovery can feel like chasing that mythical 12-point swamp buck. Don’t let that stop you from exploring all the options.


White paper: Disaster Recovery

Online Tech’s Offsite Backup and Recovery

Webinar: Technical Disaster Recovery Implementation

Posted in Cloud Computing, Disaster Recovery, HIPAA Compliance | Tagged , , , | Leave a comment

5 tools to protect patient data

As HIPAA regulations increase and cybersecurity threats advance, the healthcare industry’s effort to protect patient data gets more complex. Online Tech recently contributed to a story posted on BlogHIPAA.com that covers five tools to help protect patient information and ease the compliance burden:

  • Email encryption
  • Mobile phone BYOD protection
  • HIPAA-compliant storage
  • HIPAA-compliant hosting
  • Compliance tracking solution

BlogHIPAA spoke with representatives from industry-leading organizations in each of these areas, each of them focused on compliance. They each provided insight into why these areas are vital components of a HIPAA compliance strategy.


Bob Janacek, the CTO at DataMotion, explained that “unencrypted email messages and files hop from point to point through routes over the Internet until they reach their destination. At any of those points, data is open for scrutiny and can be copied or breached by unauthorized users. When encryption is used, data traverses the points between the sender and the recipient in a secure manner, shielded from prying eyes.”

He offered these best practices to help reduce the chance of protected data from being exposed through email or file transfers. Each is described in full on the BlogHIPAA post:

  1. Keep your email encryption system simple.
  2. Use policy-based gateway filtering.
  3. Look for exceptional handling of file attachments.
  4. Make use of extensive logging and reporting
  5. Require seamless mobile integration


People lose their phones and tablets. If employees’ personal devices contain PHI, a HIPAA breach is virtually guaranteed. From the massive Advocate data breach to the Affinity Health Plan photocopier breach, healthcare executives finally had to face the music and tighten information security controls in a post HIPAA/HITECH Omnibus world.

The folks at Qliqsoft, which provides a HIPAA-compliant messaging platform, say to “provide secure communications in an increasingly unsecure world, one must constantly engage in an open dialogue with industry experts and customers to determine how best to address efficient communication between providers, patients and caregivers at a time where BYOD and text messaging is the norm. One way to ensure security is to cut out unnecessary cloud-based messaging hosts. Utilizing “cloud pass-thru” technology is one powerful way to minimizing the number of potential security risks.”


More than 25 percent of healthcare organizations use some type of external storage for PHI. Dropbox is the most popular cloud storage and synchronization solution, but it does not offer safeguards for HIPAA compliance. Sookasa uses transparent on-device encryption to enable HIPAA and FERPA compliance for Dropbox.

Sookasa CEO and co-founder Asaf Cidon says whichever storage solution you use, there are some tips to follow, starting with a signed business associate agreement. But, wait, there’s more!

“It’s a common misconception that signing a BAA is sufficient to maintain HIPAA compliance. A signed BAA is an important requirement but is not sufficient to guarantee that your data will be safe in the cloud-connected mobile world,” Cidon says. He notes some cloud storage services offer a BAA, but do not offer data protection for PHI when accessed on a device.

Cidon’s key requirements for preventing HIPAA breaches for cloud storage are:

  • Encryption: Encryption of files both on the cloud and on mobile devices and desktops.
  • Access control: Central control of who on your team can access files, even if a device is taken offline.
  • Audit trails: Full audit trails for every file access on the cloud and on mobile.


Hey, this is where we come in!

Online Tech’s Director of Healthcare IT April Sage provided insight into what to look for in a HIPAA-compliant hosting partner. Keeping patient data secure within a data center can reduce risks of having data on portable devices. If an organization focuses on delivering healthcare applications but doesn’t want the burden of maintaining server infrastructure, Sage suggests looking for a hosting provider that embraces and delivers on their responsibility to protect patient data.

Sage said along with making sure a hosting provider can meet an organization’s technical specifications, key things to look for beyond the technology include:

  • Will they sign a Business Associate Agreement (BAA)?
  • Have they been independently audited against the U.S. Department of Health & Human Services’ Office for Civil Rights HIPAA audit protocol?
  • Will they share documentation of the audit with the auditor’s opinion of compliance?
  • Do their people, processes, and technology align to demonstrate a culture of compliance? Don’t underestimate the importance of an on-site visit to see for yourself where your patient data will reside.


End-to-end compliance software allows organizations to achieve compliance, protecting PHI and reducing liability by illustrating to auditors a good faith effort in regard to being compliant.

Bob Grant, a former HIPAA auditor who is now the Chief Compliance Officer at the Compliancy Group said the need for an end-to-end compliance solution is ever increasing.

“Protection of your PHI and reducing your liability is key for your business,” he said. “Using HIPAA compliance tracking software can help you illustrate to auditors that you have done everything necessary to comply with the regulations.”

Grant said the main focuses of HIPAA compliance software should include:

  • Business Associate Management
  • Gap Analysis
  • Remediation Management
  • Incident Management
  • Policy & Procedure creation (Templates)
  • Policy & Procedure Management (Version Control)
  • Attestation Management (Staff attesting to policies, procedures and training)

“Compliance is no longer a three ringed binder up behind someone’s desk; it needs to be a living, breathing solution that everyone in the organization can access,” Grant said.


Up your HIPAA IQ with a little HIPAA FAQ

Posted in Cloud Computing, HIPAA Compliance, Michigan Data Centers | Tagged , , | Leave a comment

Client profile: Baseline Data Services serious about disaster recovery

NOTE: This is the latest in a series of Online Tech client profiles. Read more here.

Indiana-based Baseline Data Services, LLC, was looking for data center space to continue growing its disaster recovery services business. Coincidentally, Online Tech was in the process of investing $10 million to open a secure, compliant, enterprise-class hosting facility in nearby Indianapolis.

The rest, as they say, is history.

Lance Thompson

The two organizations were so impressed with each other that not only did Baseline become the first customer at Online Tech’s new Indianapolis data center, they also formed a partnership to extend each other’s services to their respective clients. A fiber running between Baseline’s facility and Online Tech’s Indiana data center — which opened for business on October 1 — provides convenient and secure communication for shared customers.

“When I met the executives and engineers at Online Tech, I felt like they were an extension of the way we run our business,” said Baseline founder and president Lance Thompson.

Baseline’s focus is strictly on providing disaster recovery solutions, online data protection and virtual private servers to hundreds of companies across 44 states. It has a perfect track record of 100-percent recovery success after more than 100 confirmed disasters.

After more than 25 years in the industry, Thompson has seen expectations for disaster recovery change significantly. His company is focused on meeting the most demanding ones.

“In the past, people were very happy if they could be recovered in less than 24 hours,” he said. “Now, sometimes people need to literally fail over. If they go down in production, they need it back up in a matter of minutes. We’re capable of doing that.”

Baseline’s disaster recovery solutions include core processors, critical servers, image processing systems and individual applications. Not just core software systems are backed up – Baseline adds to backup configuration any third-party applications considered important to a client’s operation, including email exchange servers and domain controllers.

In the event of a disaster, Thompson said Baseline’s engineers “become an extension of the customers’ IT departments” and will recreate their server environment for them so IT can focus on restoring production.

The genealogy of Baseline starts when Thompson left IBM in 1983 to form his own business reselling used IBM computers. The focus of that company gravitated to specializing in the banking vertical and grew to include providing hardware sales, disaster recovery and check processing resources to banks around the country.

In 2006, Thompson sold the hardware sales and check processing divisions of the business and reincorporated the disaster recovery division at Baseline Data Services, LLC. The company expanded its facilities and added the various operating systems it works with today to provide services to middle-market and enterprise-level businesses, in addition to its banking base. Today, roughly 80-percent of Baseline’s new customers are from outside the banking industry.

Baseline operates its own world class, enterprise-level facility with a fully-equipped crisis center that clients can use as an alternative workspace during a disaster. But with that space nearing capacity, it was time to either expand or seek colocation with a data center that takes security and compliance as seriously as Baseline does.

There was only one such option in the state of Indiana – and it was still being renovated. So Thompson took tours of two of Online Tech’s Michigan data centers and later signed on to become the company’s first Indianapolis customer.

“I was running out of space and it was curtailing growth. Online Tech’s data centers made a lot of sense,” Thompson said. “I wanted to stick with what we’re good at and let Online Tech do what it’s good at. As an investment for me, it makes more sense to continue down our path than get into the data center business.”


Disaster Recovery white paper

Visit the grand opening of our Indianapolis data center on Oct. 23

Press release: Online Tech’s Indianapolis Data Center Opens for Business After $10 Million Investment

Posted in Data Centers, Disaster Recovery | Tagged , , , | Leave a comment

Bringing secure, compliant hosting to Indianapolis

Online Tech’s newest data center, right, is located near Lucas Oil Stadium in Indianapolis. It’s the company’s fifth data center in the Midwest and the first in Indiana.

It’s official!  Our newest data center in Indianapolis is open for business.

Mike Klein
Online Tech

We’re very excited to bring secure, compliant, enterprise class cloud, colocation and offsite backup and disaster recovery to Indianapolis. It’s a great pleasure to have the opportunity to serve Indiana businesses and its IT community from the 44,000 square foot facility on Merrill Street, minutes from downtown, that officially opened today.

So what makes Online Tech unique in the Indianapolis market? Just like at our four other Midwest data centers, we will be delivering secure, compliant, enterprise hosting for our clients’ mission critical applications. Businesses in need of the level of protection and access to the cloud that we provide previously had to look to other regions of the country for this type of data center.

What the heck does that mean? Let’s start off with the type of hosting that we don’t focus on. We don’t offer cheap commodity cloud servers for gamers, email marketers or low-end web hosting. There are plenty of low cost alternatives out there that don’t need to deliver 100-percent uptime or the stringent security or regulatory compliance we deliver.

Our clients include healthcare companies, banks, credit unions, insurance agencies, retailers and mid-size to large businesses that can’t afford downtime in their mission critical IT systems. They tend to be very concerned about security and regulatory compliance, and need the uptime benefits of enterprise technology without the capital outlay required to purchase the equipment themselves.

We think of our value proposition this way:

Security: The war against hackers continues to escalate, as does the cost and pace of new security technologies. Rather than build, monitor and maintain their own layered security defense in-house, our clients leverage the full array of security technologies available at our data centers and in our cloud server platform.

Compliance: Regulatory requirements continue to escalate – HIPAA for health care, SOX for financial industries, PCI for credit card processing and Safe Harbor for protecting EU citizen data. Rather than hire outside auditors to test their systems and processes, our clients leverage our third party audits as part of their compliance programs. We provide our audit reports to our clients annually so they don’t have to do the audits themselves.

Enterprise Hosting:  From our Tier 3 data centers with 100-percent uptime SLA to our high performance, high availability cloud computing, we’ve designed our systems for applications that can’t afford downtime. Our enterprise off-premise backup handles bigger data sets and offers faster recovery than most hosting companies in the market.

We’re excited about opening our new data center in Indianapolis. We invested $10 million making extensive improvements to create a world-class facility that will create up to 25 permanent jobs for local IT, sales and data center professionals.

There is a growing demand for secure, compliant hosting in Indianapolis and the surrounding region and we’re looking forward to serving all of Indiana as we continue to expand our network of data centers across the Midwest.


There will be an open house at the Indianapolis data center from 3 to 7 p.m. on Thursday, Oct. 23. We’re offering a no-pitch, behind-the-scenes look at a secure, compliant, enterprise cloud computing and colocation data center.

We invite all IT professionals in and around Indianapolis to come network with your peers, meet some of our clients, eat, drink and be merry! Click here or the button below to register for the event.

Posted in CEO Voices, Cloud Computing, Data Centers, HIPAA Compliance, Online Tech News, PCI Compliance, Safe Harbor | Tagged , | Leave a comment

Online Tech’s April Sage, attorney Tatiana Melnik presenting on challenges and opportunities of cloud computing at AHIMA conference

The American Health Information Management Association (AHIMA) is holding its 86th annual convention and exhibit in San Diego this week. This year’s theme is “Leading the Way to Health Intelligence” and its schedule of events is designed to address the challenges and opportunities healthcare professionals face now and in the future.

Cloud computing presents many of those challenges and opportunities, so Online Tech has gotten in on the fun.

April Sage

At 8 a.m. Wednesday, Online Tech Director of Healthcare IT April Sage and attorney Tatiana Melnik are co-presenting “A Primer on Moving to the Cloud – HIPAA, Encryption, eDiscovery, Oh My!”

Sage will discuss the risks and benefits highly-regulated healthcare companies face when moving to the cloud and help compare the risk profile of traditional and cloud environments when storing protected health information. She’ll also discuss administrative and technical implementation challenges with a discussion of how the choice of cloud structure – public, private, or hybrid – may impact HIPAA/HITECH compliance.

Melnik, a frequent contributor to Online Tech’s educational webinar series, will handle the legal portion of the presentation. It will include sample contract language often included in cloud computing agreements, contract language that healthcare providers often overlook during negotiations and terms that healthcare providers often do request, but should not.


Up your HIPAA IQ with a little HIPAA FAQ

Webinar: PHI in the ACO – Risk Management, Mitigation and Data Collection Issues

Webinar: Is the FTC Coming After Your Company Next? Court Confirms that the FTC Has Authority to Punish Companies for Poor Cyber Security Practices

Posted in HIPAA Compliance, Information Technology Tips, Online Tech News | Leave a comment

Visit the grand opening of our Indianapolis data center on Oct. 23

Hello, Indianapolis!

Online Tech invites all IT professionals in and around the Circle City to attend the grand opening celebration of our fifth Midwest data center – and first in Indiana – from 3 to 7 p.m. on Thursday, Oct. 23.

We’re offering a no-pitch, behind-the-scenes look at a secure, compliant, enterprise cloud computing and colocation data center. Network with your peers, meet some of our clients, eat, drink and be merry!

Registration is simple (click here or the button below) and required. You must present a valid photo ID (we are a secure and compliant data center, after all!) on the day of the event.

Our Indianapolis facility has more than 44,000 square feet of data center space. All critical equipment is N+1, or fully redundant. It is is SAS 70, SSAE 16, and SOC audited to provide security and reliability and also PCI, HIPAA, SOX and Safe Harbor audited to meet national industry compliance requirements.

Expansion of secure, compliant hosting into Indianapolis a ‘win-win-win’ for current clients, future clients and Online Tech

Press release: Online Tech Acquires Indianapolis Data Center

Posted in Data Centers, Online Tech News | Tagged , | Leave a comment