Professional Documents
Culture Documents
Cyber Recovery Services
Cyber Recovery Services
Cyber Recovery Advisory & Implementation CSO, CISO, 1. What are your responsibilities in recovering from a cyber attack?
services expand upon the technology foundation CFO, CRO 2. Are your cyber security practices aligned with NIST Cybersecurity
of the solution by tying the technology to Framework? If yes, What approaches are you taking to align with the Recover
processes and procedures which ensure that your function?
customer’s applications and data are protected 3. If we could show you how to improve recoverability in a cyber attack would
and ready for recovery. you sponsor a technology solution?
Virtually eliminate integration, logistics and
operational challenges for every customer by CIO, CTO 1. Has security or your board asked you how you would recover from a
working with our expert cyber recovery consultants VP in Technology destructive cyber event?
to determine every customer’s most critical needs, 2. Are you comfortable with your organizations ability to respond to a data
processes, and define their recovery runbook destruction event that impacted backups as well as production data?
which is a step-by-step guide for recovery.
3. If we were able to show you a method to protect critical data, would you
sponsor a meeting with security to get their support too?
Expand your portfolio with a proven solution
that scales to a deliver right-sized recovery Mid-level Tech or 1. How have cyber attacks affected your business, your team?
solutions for every business type and size Resiliency / Disaster 2. What do you think that your role is in the event of a destructive cyber event?
Recovery (DR)
3. Many protection schemes start with an additional layer of protection on
Resell and earn rebates, plus earn more with Manager or Director
backups, and utilize procedures similar to disaster recovery. How confident
the same customer as opportunities are are you in your current backups and DR processes?
uncovered throughout the work process
• Advisory Services
create consensus and Advanced Advisory Cyber Recovery Advanced Implementation Technology
speed design • Business Recovery Metrics • Protect and Recover Data • Multi site, mainframe and storage
• Cyber Vault Solution Design • Vault Architecture (Air-gap, Management, Alert..) based technology implementation
• Implementation
• Solution Cost Estimates • Cyber Recovery Runbooks • Recovery automation
focuses on technology
and processes • Application Dependencies
• Restore Testing and validation • Performance tuning
• Implementation & Operationalization • Manage/Monitor
Roadmap • Includes advisory service
• Custom Services • Advanced Vault Analytics or
• Business Case
based on specific Validation Processes
• Executive Presentation
customer requirements
White paper
“Three Keys to Increase Confidence in Recovering from a Cyber Attack.” Forrester report on
Cyber Recovery, October 2019
Service Briefs
Cyber Recovery Advisory (Service Brief)
Cyber Recovery Workshop (Service Brief)
Cyber Recovery Advisory & Roadmap (Service Brief)