Business continuity events range from a failed server to communications failure to facility inaccessibility—and everything in between. That’s why it helps to have multiple infrastructure recovery solutions to choose from, depending on weather, political, and other conditions in which your business operates. One solution which provides significant flexibility is the Self-Propelled Electronic Armored Rack, or S.P.E.A.R. The S.P.E.A.R., containing a 22 U rack, can be moved via an internal drive system, which uses three layers of shock and vibration insulation. The standard drive system can move up to 500 pounds of equipment. An upgraded drive can move up to 1000 pounds. Options include power and temperature conditioning, cyber-locking system with access auditing, and sides and panels which can withstand small arms fire. Also available are antenna which are mounted on the top of the cabinet to provide Wi-Fi connectivity. Powering a S.P.E.A.R is not a problem. It can connect to any 220-230 volt service, including a generator, making it easy to move an existing data center as extreme weather approaches, or to transport stored equipment to any alternative location with acceptable power and communication capabilities.The cost of a S.P.E.A.R. with armored panels, air and power conditioning is about $100,000. However, if your business doesn’t operate in a war zone, the C-S.P.E.A.R. (Campus Self-Propelled Electronic Adaptable Rack) with similar options, but without armored panels, runs about $27,000. This isn’t for everyone, but it is a possible solution for fixed or mobile data centers located in hazardous or quickly changing operating conditions. Related content opinion MQTT is not evil, just not always secure The MQTT messaging protocol standard used by IoT vendors is not inherenly secure enough. Solutions exist to secure it, but organizations and vendors must assess risk and properly configure IoT and network security. By Tom Olzak Jul 17, 2017 3 mins Internet of Things opinion IoT messaging protocol is big security risk Popular IoT messaging protocol lacks encryption and sufficient device authentication security. By Tom Olzak Jul 14, 2017 3 mins Cloud Security Data and Information Security Internet of Things opinion Anatomy of an insider attack Manage insider attack risks with scenarios and application of common sense. By Tom Olzak Sep 30, 2016 4 mins Business Continuity Security opinion Identity governance and admin: beyond basic access management User behavior analytics give additional power to identity management and compliance. By Tom Olzak Aug 30, 2016 5 mins Investigation and Forensics Compliance Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe