As an industry professional, you're eligible to receive a printed copy of the journal.

Fill out your address below.

Please reset your password to access the new
Reset my password
Welcome aboard, !
You're all set. We've send you an email confirmation to
just to confirm you're you.

Welcome to DRJ

Already registered user? Please login here

Existing Users Log In

Create new account
(it's completely free). Subscribe

Organizations of all sizes increasingly turn to cloud providers such as Amazon, Microsoft, Google, and others. They utilize them to host new and existing applications as well as to accelerate application development. Further, many also use cloud native software-as-a-service (SaaS) offerings such as Microsoft 365, G Suite, and Salesforce. However, as organizations adopt the cloud, they should implement software that protects the applications and data hosted in the cloud. Promises, Promises Cloud providers strive to assure organizations that they can trust the provider to host their applications and data. Many cloud providers promise uptime percentages of no less than 99.99%…


Jerome Wendt

Jerome Wendt, an AWS Certified Solutions Architect, is the president and founder of DCIG, LLC., a technology analyst firm. DCIG, LLC., focuses on providing competitive intelligence for the enterprise data protection, data storage, disaster recovery, and cloud technology markets.

Optimizing Your Data Center’s Disaster Recovery Plan
As part of every business plan, there should be a disaster recovery approach that plans for natural, cyber, and emergency...
ENVATO PHOTO By seventyfourimages
How to Sell ‘Disaster Recovery’ to Senior Management
If you’re like many organizations, you have an inadequate disaster recovery (DR) program that leaves you vulnerable to risks such...
Counting on Disaster: What Every Financial Institution Should Know
Disaster planning and recovery are often viewed as the need for backup systems to safeguard an organization’s data. Here’s a little hint for the survival of your company ... it’s not just about the data.
The Evolution of Cyber Attacks, Evolving With the Times
This article was originally published in Enterprise Security Magazine.  Republished with permission. “Whether the cybercrime is holding data at ransom prior to...