">--> White Papers • Disaster Recovery Journal

As an industry professional, you're eligible to receive a printed copy of the journal.

Fill out your address below.






Please reset your password to access the new DRJ.com
Reset my password
Welcome aboard, !
You're all set. We've send you an email confirmation to
just to confirm you're you.

Welcome to DRJ

Already registered user? Please login here

Existing Users Log In
   

Create new account
(it's completely free). Subscribe

White Papers

White Papers

April 18, 2019

DRJ’s White Paper section is the one place to explore in-depth thoughts on today’s most relevant issues. Discover insight into a variety of topics including cloud computing, industry standards, personnel management, risk analysis and much more. The subjects are constantly evolving, providing you a non-stop feed of up-to-date industry information.

White Papers are sponsored by our industry’s leading service providers. This allows DRJ to bring you the most relevant information in a free, convenient format. Your contact information will be shared with White Paper sponsors.

* By downloading a white paper you are agreeing to share your contact information with the sponsor of that paper.

For information on sponsoring a White Paper, view our media kit.

Note: You must be logged into DRJ.com to download these free White Papers

The Forrester Wave: Governance, Risk, And Compliance Platforms, Q1 2020

Sponsored by ServiceNow

According to the 2020 Forrester Wave for Governance, Risk, and Compliance: “GRC platforms must become agents of change, enabling risk professionals to manage the array of data points and processes required to meet their organization’s risk and compliance needs, at scale, and at the pace of innovation in the business.” They named ServiceNow a leader. According to the report, “ServiceNow has masterfully executed against an aggressive product roadmap, transcending its ITSM roots and making its way onto many RFP shortlists.” ServiceNow can be your innovation partner. By seamlessly embedding risk and compliance activities into your daily work, we can help you improve business decisions, gain real-time visibility into emerging risks, and increase productivity across your organization.

Developing a more effective risk report for your board

Sponsored by ServiceNow

Today, enterprise risk, cyber security, and privacy costs are top concern for boards, but these are complex topics. If you’re an IT, security, or privacy leader, learn how to make a more effective and efficient presentation on risk to the board that offers a realistic look at risks to the business.

Gartner Magic Quadrant for IT Risk Management (ITRM)

Sponsored by ServiceNow

This is an invaluable tool for those seeking an unbiased, third party evaluation of vendors as resilience, risk management, and agility become essential for business. Read the full, complimentary report for a third-party, unbiased evaluation of vendor, insight into the significant movements in the market, and the factors driving growth.

The Ultimate Guide to Business Continuity Testing

Sponsored by Agility Recovery

This guide outlines a complete set of practical methods for business continuity testing.

Formulating a business continuity plan (BCP) is only half the battle. A solid BC strategy needs more than just a well-laid out theory. How well does your plan hold up in a real-world disaster? Business continuity plan testing is the most reliable way to find out, and it is a critical component of continuity planning. By skipping regular testing, you won’t know if your organization is prepared for a disaster—until it’s too late.

Business Continuity Lessons Learned from COVID-19

Sponsored by Agility Recovery

The immediate response to COVID -19 is over. The challenge now is to reopen what has been shut down. Now, like never before, companies have to restart their engines and get national economies going again.

The challenge is intensified by uncertainties about the progression of COVID-19 and the social, political, and fiscal actions that it will drive. In a prolonged time of uncertainty, businesses need to restructure their operations and to adapt to the ever-present unpredictability. It means being prepared for disruption.

The Gorilla Guide to Failproof Cloud DR

Sponsored by Datrium, Inc.

Failproof disaster recovery? You’re probably wondering how anyone can make such an aggressive claim. If you've had to recover from a disaster, you know the process is filled with problems – from corrupt backups to messy VM refactoring, all causing extremely slow recovery times. Yes, all of that was true – in the past. With a focus on the cloud, Internet of Things, and extreme mobility, combined with an “always-on” economy, it’s impossible to rely on legacy DR solutions and expect failproof recovery. So what do you need for failproof recovery? Read the Gorilla Guide to Failproof Cloud Disaster Recovery to find out.

The Gorilla Guide to Why Modern IT Requires Modern Disaster Recovery

Sponsored by Datrium, Inc.

Protecting your data center is your top priority. But, you're continually faced with the rise of new external threats. That means you need new tools to respond effectively and quickly. Read the Gorilla Guide to Why Modern IT Requires Modern Disaster Recovery, to see how you can improve your backup and disaster recovery strategy. We'll review the types of threats and attacks companies face, and the best ways to back up and restore critical systems and data to ensure maximum uptime and avoid paying a ransom.

The Complete Guide to Ransomware Recovery

Sponsored by Datrium, Inc.

Datrium has helped dozens of customers successfully recover from ransomware attacks without paying the cybercriminals a dime. We’ve worked with the FBI and leading experts in the security field to get customers back up and running quickly. We’ve taken that knowledge and created The Complete Ransomware Recovery Guide for IT professionals.

Is Your Organization Ransomware Proof?

Sponsored by Flexential

Is your organization ransomware proof? How to use DRaaS as your silver bullet against ransomware attacks. Ransomware is a form of malware that encrypts files and then demands the victim pay a ransom—often payable in bitcoin for anonymity—to restore the files. The global cost of ransomware will reach $20 billion in 2021, according to a recent report, and the average downtime after a ransomware attack doubled between 2018 and 2019 to 12.1 days. The weaponization of data is on the rise, and organizations need to effectively fail-safe their business-critical data, systems and applications against disruptions. Download this white paper to learn why organizations are using disaster recovery-as-a-service solutions with extended journaling capabilities to protect their IT infrastructure against cyber threats like ransomware.

How to Improve Data Resiliency with Disaster Recovery-as-a-Service

Sponsored by Flexential

The fundamental premise behind the very existence of an IT department is the expectation that systems will be kept operational and business-critical applications will always be available. With that in mind, IT leaders invest an immense amount of time and capital into ensuring that their systems are as robust as possible, data is protected and performance is monitored. However, as the pace of business and change accelerates, it is an increasingly difficult task to stay ahead of the curve. This is especially true when trying to plan for disasters, which are, almost by definition, unforeseeable. Disasters can come in many forms— from a site-wide outage due to a natural event to data corruption caused by human error to malicious attacks requiring extraordinary measures to overcome and recover to a safe point—and the number and types of events that can cause disruption are on the rise. This whitepaper discusses the importance of a tailored BCDR solution to fit your business needs and how adding DRaaS to your data resiliency strategy can strengthen your ability to proactively protect against unexpected threats

DCIG Top 5 SME Anti-ransomware Backup Solutions

Sponsored by DCIG

Expectations as to the features that a small and midsize enterprise (SME) backup solution “must” offer often come about due to technology advancements. Backup appliances, backup-asa-service (BaaS), cloud connectivity, deduplication, and hyperconverged appliances represent recent advancements that many SME backup solutions now possess. As we enter the 2020’s, this has, for the moment, changed. Ransomware, a type of malware, represents an external force driving much of the current innovation occurring in SME backup solutions.

Jumpstart your Disaster Recovery and Remote Work Strategy: 6 Considerations for your Virtual Desktops

Sponsored by teradici

Virtualized desktop infrastructure (VDI) has become a strategic choice for many IT organizations because it can reduce the burden of desktop management on IT staff, reduce costs, and improve uptime and therefore staff productivity. For these same reasons, VDI is essential to your disaster recovery plan. Your ability to implement redundancy to help prevent downtime from occurring in the first place is improved, and you can easily establish reliable server and virtual desktop backups. We know that virtual environments are not fully immune to disasters or business interruptions. But unlike traditional hardware-based environments, there are numerous cost-effective options that allow you to host data in multiple private data centers or public clouds to protect business continuity. Learn the top considerations in this informative whitepaper.

DCIG Top 5 Enterprise Anti-ransomware Backup Solutions Report

Sponsored by DCIG

The DCIG Top 5 Enterprise Anti-ransomware Backup Solutions Report provides enterprises guidance on the best backup solutions to choose to help improve their response to ransomware attacks. Using this Top 5 report, enterprises may quickly create a list of the Top 5 solutions to help them detect, prevent, and recover from a ransomware attack.

Best Practices for Implementing a Travel Risk Management Program

Sponsored by WorldAware

Each time an employee travels, he or she is exposed to a range of personal health, safety, and security risks. At the same time, legal trends continue to shift the burden of mitigating these risks squarely onto employers. To address this critical issue, organizations must take a comprehensive approach toward protecting themselves and their travelers. In 2008, the Global Business Travel Association (GBTA) partnered with WorldAware to develop the Travel Risk Management Maturity ModelTM (TRM3TM). This risk management assessment tool continues to help organizations evaluate opportunities to improve their programs today.

Best Practices to Leverage the Cloud for Disaster Recovery

Sponsored by Navisite

Choosing the right DRaaS solution depends on factors like supported workloads, application dependencies, virtualization technologies, required RPOs and RTOs, and budget. When implementing the solution, it is also important to follow industry-standard best practices. In this study, we reviewed the main advantages of DRaaS solutions, and how they help address several acute business continuity challenges. Each different DR solution and DRaaS solution provider has its own benefits and drawbacks that should be taken into consideration when selecting a service provider. It is also possible that a combination of solutions should be used. As a managed-cloud service provider, Navisite provides services that enable organizations to implement a data protection and replication program, or implement a full disaster recovery as a service (DraaS) program that supports business continuity and meets business and compliance requirements.

Why your current disaster recovery strategy may not cover compliance

Sponsored by Navisite

Disaster recovery is often an area that organizations know they need to do, if they aren't, and others do to varying extents. Even when it is a regular practice, one area of this practice that frequently doesn't get due consideration: compliance. With the many global and regional regulations that have been implemented in the last decade or more, it becomes ever more imperative that your DR strategy covers compliance concerns. This whitepaper will address the things your organization should consider as it develops or continues its disaster recovery programs to ensure you're staying compliant with various regulations.

The BCM Professional’s Playbook: Make Active Shooter Preparedness Part of Your BC Program

Sponsored by Strategic BCP

Tragically, active shooter events are now 18 times more likely than workplace fires. This makes them a recognized hazard per OSHA. As your legal obligation to provide an environment safe against workplace violence continues to evolve, so should your best practices. By incorporating active shooter training into your existing Business Continuity program under the umbrella of life safety; you can guard against this growing threat with minimal disruption, fear, or employee angst. This playbook addresses regulatory concerns and legal obligations; know when to run, hide, or fight; how to build an effective active-shooter program; choosing the right trainer; and how to manage emergency communications effectively.

Are You Prepared for an Active Shooter Incident?

Sponsored by Black Swan

Active shooter incidents are increasing. Many organizations, including schools, businesses and events, have begun including protocols for the possibility of an active shooter situation. The statistics are disturbing. The FBI released a paper “A Study of Active Shooter Incidents in the United States Between 2000 and 2013” with the following metrics.

Accounting for People 2.0

Sponsored by Black Swan

With the advent of mobile technology and social media platforms, accounting for people has changed significantly in recent years. What was primarily a function of herding people to specific time zones in a parking lot or safe area has been transformed into a complex procedure providing detailed information in real time on employee/visitor locations, as well as their health and safety status. There are clear advantages to modern accounting for people practices; however, not all organizations are aware of the new methods and tools that can determine who is safe or not in a crisis situation.

A Two-Pronged Approach to Locking Down IT Security

Sponsored by Bluelock

Preventive measures are key to securing your organization's systems. But failure to establish a restorative strategy is a missed opportunity. A single security breach can cause shareholders to scurry, IT teams to scramble, and systerms to crash. But no greater is the disruption than to customer trust.

Organizational Resilience: 7 Phases That Move You From Crisis Through Recovery

Sponsored by Black Swan

In analyzing numerous crises over 30 years we have found that while each event is unique, typically all exhibit 7 common phases. This constitutes an essential roadmap for organizations in assessing their preparedness and determining necessary steps to effectively and expediently respond should a large-scale event affect their operations. In this white paper, we will walk you through a detailed account of each phase and provide areas to address in responding to the needs of human assets, such as employees, families and visitors, within an organization.

The Challenges of Managing Vendor Risk Contingency Plans

Sponsored by Strategic BCP

Organizations increasingly rely on critical, “Tier 1” vendors for essential products and services. This reliance increases their exposure to various types of risk, including regulatory risk, reputational risk, information security risk, and financial risk. Vendor Risk Management intersects with Business Continuity Management (BCM) and Operational Risk Management (ORM) where third-party vendors provide critical products, services, or have access to critical company information. This playbook explores how &ndash using established risk management and BCM/DR principles &ndash we can define a practice to manage vendor risk while addressing contingency and recovery capabilities.

Evaluating and Applying Relevant BCM Standards

Sponsored by Strategic BCP

Discover a better way to address key business continuity standards and guidelines that are so important for compliance and better continuity plans. Harness the power of the original BCP Genome™ to strengthen your own planning and compliance practices—whether you adopt its framework as is, or adapt its logic to create your own framework. Also, compare eight leading industry standards—ISO22301, FFIEC, NFPA, NIST, HIPAA, and more—to identify their strengths and gaps relative to program organization, management, training, and audit vs. emergency facilities or business and IT recovery.

The BCM Professional’s Playbook: Convergence of Business Continuity & Risk Management

Sponsored by Strategic BCP

The demands placed upon Business Continuity, Risk Management, and Disaster Recovery professionals increase every day. As a result, organizations need to reassess their approach Business Continuity Management. If they don't, they'll get left behind, affected by continued adherence to outdated methods. The convergence of these disciplines is ongoing. Emerging regulations, frameworks, and standards place greater emphasis on risk management. As decision makers accept this evolution, Business Continuity increasingly becomes a subset of Risk Management. How the process is implemented—the value it brings a risk-based model—determines whether or not the process is a sound.

Best Practices for Doing Enterprise Cloud Backup and Disaster Recovery Right

Sponsored by UCG Technologies

In the technology business for 30 years including a decade in cloud backup and disaster recovery, we’ve learned a few things along the way. Here are best practices to follow – and land mines to avoid.

Crisis Communications: Seven Lessons Learned from Disaster Response Experiences

Sponsored by Black Swan

When an organization experiences a disaster, whether man-made or natural, it can expect to receive hundreds, if not thousands of telephone inquiries. Having responded to large-scale, mass-casualty disasters, we have found that the only common thread between these events was that all affected individuals and the public in general want information about what happened, as well as frequent updates, and they want it quickly. Responding to “stakeholders”—people who have some connection with the organization—lies at the heart of effective crisis communications after a large-scale incident. Anguished family members and friends call to learn about loved ones who were involved in the incident, the media calls looking for a story, regulators seek the facts of the crisis, business partners ask about recovery times, etc. Managing information in the aftermath of a disaster is a challenge and we have compiled seven important “lessons learned” that can mitigate the Crisis Communications: Seven Lessons Learned from Disaster Response Experiences challenge and assist affected organizations with business recovery, reputation management, and brand protection.

Why Crisis Response and Business Continuity Plans Fail: 10 Lessons Learned from Real-World Experience

Sponsored by Black Swan

Many organizations invest considerable time, money and effort in developing Crisis Response and Business Continuity (CRBC) plans, only to have them fail at a critical time, usually during a disaster response. To learn about failed plans, I interviewed a number of risk and crisis managers as well as business continuity professionals. While not the result of scientifically based research, this anecdotal information provides valuable lessons learned from real-world experience.

Natural Disasters and the Workplace: Eight Steps Employers Should Take to Prepare Their Workplace for a Natural Disaster

Sponsored by Black Swan

We may think, “Natural disasters can’t happen here,” or “That couldn’t happen to us,” but they can and it does, so we need to be prepared. In the wake of numerous large scale man-made and natural disasters, many organizations have vastly improved their disaster recovery and readiness plans. However, recent high impact incidents have provided additional valuable lessons for risk management professionals. We recommend updating your current plans in the following areas accordingly.

DRaaS Bridges Executive and IT Practitioner Gap in DR Practices

Sponsored by Bluelock

There is a noticeable disconnect between those calling for an IT disaster recovery (DR) strategy and those actually implementing it. According the IDG survey referenced in this whitepaper, top executives expressed confidence in their firm’s ability to leverage DR practices, while IT implementers felt significantly less confident in doing so. This whitepaper explores the disconnects between IT leadership and their staff, as well as the motivations behind adopting Disaster Recovery-as-a-Service (DRaaS) to protect data assets and empower business objectives.

Ultimate Guide to DRaaS

Sponsored by Bluelock

Disaster recovery is not easy. It’s critical to protecting your organization’s most precious assets, though typically under-funded and under-appreciated. Now that always-on business is the new normal, any form of downtime can be detrimental to the livelihood of your organization. Having a strategic plan in place is paramount. Disaster Recovery-as-a-Service is changing the way many businesses are tackling the complexities of disaster recovery. This quick, action-oriented guide will help you assess your organization’s needs and develop an effective Disaster Recovery-as-a-Service (DRaaS) strategy. This guide will help you make important decisions and recover data quickly and effectively, with confidence.

5 Reasons CIOs are Rethinking IT Disaster Recovery

Sponsored by Bluelock

The pressure on IT teams to deliver service uptime and availability is being met with major advancements in DR capabilities. Now is the time to rethink IT disaster recovery. Disaster Recovery-as-a-Service (DRaaS) is poised to quickly take over the way businesses recover and protect their applications due to its ability to enable IT systems availability. Take the next step on your DR journey with this guide as it shows you the top five reasons that CIOs are rethinking their IT disaster recovery strategies today.

Best Practices in Using a Notification System

Sponsored by MIR3, Inc.

When a crisis strikes, you need to alert your stakeholders. And if you want to control your message, you need to get that information out as fast as, or faster, than anyone else. With the growth of social media, that’s not always easy. By preparing your message and using your notification system more effectively, your organization will stand the best chance of surviving a crisis. Regardless of how you use notification today, this paper will show you how get more from the system you already have.

Is Business Continuity Certification Right For your Organization?

Sponsored by Avalution

This white paper analyzes the business case for pursuing organizational business continuity certification, including what it takes to complete the certification process and how best to begin preparing.

Designing a Business Continuity Training Program to Maximize Value & Minimize Cost

Sponsored by Avalution

Business continuity is a key component of an organization’s risk management program. However, employees (ranging from executives to the general employee population), partners and customers are often unaware of the existence of the program or their role within the business continuity effort. Can management rely on a business continuity program if key stakeholders are unaware of their response and recovery responsibilities? No. And, as a result, the time and resources invested in the planning effort are often wasted.