{"id":21896,"date":"2022-05-10T15:12:48","date_gmt":"2022-05-10T15:12:48","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/?p=21896"},"modified":"2023-01-10T19:15:36","modified_gmt":"2023-01-10T19:15:36","slug":"business-continuity-software","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/products\/business-continuity-software\/","title":{"rendered":"8 Best Business Continuity Software Solutions"},"content":{"rendered":"\n<p>Even a single hour of downtime can cost businesses over <a href=\"https:\/\/itic-corp.com\/tag\/hourly-cost-of-downtime\/\" target=\"_blank\" rel=\"noreferrer noopener\">$1 million<\/a>, and costs can quickly add up, considering the average downtime for <a href=\"https:\/\/www.statista.com\/statistics\/1275029\/length-of-downtime-after-ransomware-attack\/\" target=\"_blank\" rel=\"noreferrer noopener\">ransomware attacks is 22 days<\/a>. Unfortunately, many organizations don\u2019t have business continuity solutions in place to help them avoid <a href=\"https:\/\/www.axios.com\/2022\/05\/09\/lincoln-college-illinois-closing-covid-19-cyber\" target=\"_blank\" rel=\"noreferrer noopener\">major spurts of downtime<\/a>. Business continuity software can point out vulnerabilities in a company\u2019s network, build plans, and keep the business running during a crisis.<\/p>\n\n\n\n<p><strong>Jump to:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><a href=\"#what-is\">What Is Business Continuity Software?<\/a><\/li><li><a href=\"#best-software\">Best Business Continuity Software<\/a><ul><li><a href=\"#oracle\">Oracle Risk Management Cloud<\/a><\/li><li><a href=\"#castellan\">Castellan<\/a><\/li><li><a href=\"#archer\">Archer Business Resiliency<\/a><\/li><li><a href=\"#igrafx\">iGrafx<\/a><\/li><li><a href=\"#fusion\">Fusion Framework System<\/a><\/li><li><a href=\"#logicmanager\">LogicManager<\/a><\/li><li><a href=\"#sai360\">SAI360<\/a><\/li><li><a href=\"#bc-in-the-cloud\">BC in the Cloud<\/a><\/li><\/ul><\/li><li><a href=\"#what-should-be-covered\">What Issues Need To Be Covered By a Business Continuity Plan?<\/a><\/li><li><a href=\"#best-practices\">Business Continuity Best Practices<\/a><\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"what-is\">What Is Business Continuity Software?<\/h2>\n\n\n\n<p>Business continuity software, also called business continuity management, is a type of digital platform that helps businesses continue operating as normal in the event of a natural disaster, power outage, or <a href=\"https:\/\/www.esecurityplanet.com\/threats\/multi-party-cyberattacks-lead-to-big-losses\/\" target=\"_blank\" rel=\"noreferrer noopener\">cyberattack<\/a>. Think of it like a generator: if the power goes out at your house, the generator turns on to power any necessary systems, like the refrigerator. Similarly, business continuity software keeps critical business systems running during an outage, but it also helps organizations create a plan for a crisis, so they know what to do when one inevitably happens.<\/p>\n\n\n\n<p><strong>Read more: <\/strong><a href=\"https:\/\/www.esecurityplanet.com\/networks\/incident-response-how-to-prepare-for-attacks-and-breaches\/\" target=\"_blank\" rel=\"noreferrer noopener\">How to Create an Incident Response Plan<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"best-software\">Best Business Continuity Software<\/h2>\n\n\n\n<p>Companies looking for business continuity software should consider the following tools, chosen for their high user reviews and the features they offer.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"oracle\">Oracle Risk Management Cloud<\/h3>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh4.googleusercontent.com\/BGsPvZPPB1HKt30Aq5TSZo5DT0ld_Bv9kvNBnOBF28Y8AYJympOd2OivC5VcVJsixhvNLdLZ4vtOImvKBII4H94PVhz6nxzI28dx76FClVBPpV3uAWDX868eAXuSORR_Ued7_vbP4AkpRRPNEw\" alt=\"Oracle Risk Management Cloud dashboard.\"\/><\/figure>\n\n\n\n<p>Oracle Risk Management Cloud is focused more on the fraud and cyberattack prevention aspects of business continuity, rather than disaster recovery. It makes organizations more resilient by integrating with Oracle ERP and tracking user activity with <a href=\"https:\/\/www.esecurityplanet.com\/threats\/ai-ml-cybersecurity\/\" target=\"_blank\" rel=\"noreferrer noopener\">artificial intelligence (AI)<\/a> to block any suspicious behaviors. Pre-built security rules make it easy to assign user permissions while keeping all sensitive information in a single location. It\u2019s sold as part of the Oracle ERP, and pricing is not available on the website.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Key Features<\/h4>\n\n\n\n<ul class=\"wp-block-list\"><li><a href=\"https:\/\/www.esecurityplanet.com\/compliance\/compliance-gdpr-pipl-ccpa\/\" target=\"_blank\" rel=\"noreferrer noopener\">Compliance tools<\/a><\/li><li>Automated monitoring and workflows<\/li><li>Separation of duties reports<\/li><li>Pre-built security rules<\/li><li>Operational <a href=\"https:\/\/www.esecurityplanet.com\/products\/risk-management-software\/\" target=\"_blank\" rel=\"noreferrer noopener\">risk management<\/a><\/li><li>Audit management<\/li><\/ul>\n\n\n\n<h4 class=\"wp-block-heading\">Pros<\/h4>\n\n\n\n<ul class=\"wp-block-list\"><li>Automates role-based access as people leave or change positions<\/li><li>Great for monitoring transactions and preventing fraud<\/li><li>Provides faster solutions to potential risk<\/li><\/ul>\n\n\n\n<h4 class=\"wp-block-heading\">Cons<\/h4>\n\n\n\n<ul class=\"wp-block-list\"><li>Customer support needs improvement in responsiveness<\/li><li>Limited customizations available<\/li><\/ul>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"castellan\">Castellan<\/h3>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh6.googleusercontent.com\/v7rP9I7rKmJt_ixsmkB9uz26EjBLXqU-4nE9kOD7ewD0HfuOdL-HtiF4zgPBZra3e3-e8YnoUJ_s6gTgZQQK-G6AUiU3sLZzTiX-ewNMexelHB_-WwZJk_VP-prd5iQvOZS87lkvWFHQvY74NQ\" alt=\"Castellan dashboard.\"\/><\/figure>\n\n\n\n<p>Castellan helps organizations minimize the impact of a variety of business interruptions, including natural disasters and cyberattacks. The complete solution includes operational resilience, disaster recovery, business continuity, crisis management, and compliance tools to keep everyone aware of their role in the process. In addition to the software, Castellan also provides hands-on guidance to improve business continuity plans. Pricing information is not available on the website.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Key Features<\/h4>\n\n\n\n<ul class=\"wp-block-list\"><li>Automated program governance<\/li><li><a href=\"https:\/\/www.esecurityplanet.com\/products\/single-sign-on-solutions\/\" target=\"_blank\" rel=\"noreferrer noopener\">Single sign-on (SSO)<\/a> and <a href=\"https:\/\/www.esecurityplanet.com\/mobile\/multi-factor-authentication\/\" target=\"_blank\" rel=\"noreferrer noopener\">two-factor authentication<\/a><\/li><li>Impact analysis reports<\/li><li><a href=\"https:\/\/www.esecurityplanet.com\/threats\/automated-security-risk-assessments\/\" target=\"_blank\" rel=\"noreferrer noopener\">Risk assessments<\/a><\/li><li>Customizable reports and dashboards<\/li><li>Live reporting<\/li><\/ul>\n\n\n\n<h4 class=\"wp-block-heading\">Pros<\/h4>\n\n\n\n<ul class=\"wp-block-list\"><li>User-friendly interface<\/li><li>Helpful and responsive customer support<\/li><li>Robust reporting options<\/li><\/ul>\n\n\n\n<h4 class=\"wp-block-heading\">Cons<\/h4>\n\n\n\n<ul class=\"wp-block-list\"><li>Not as customizable as similar products<\/li><li>Some users had issues with SSO on mobile<\/li><\/ul>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"archer\">Archer Business Resiliency<\/h3>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh6.googleusercontent.com\/tERnGhG63G59JfUQukXtDvjaYiVk9IarwpQrz1Ixr0nG_OCS00hMt4-Ameqw1GoCx-r8DdxN-KLZ9-gEIti5zo8P7CkU9vwnJ71nnpxb5xROwMFf5s6etY3wcYyUMFqQXudvhcmIBsVdE5mXdw\" alt=\"Archer Business Resiliency dashboard.\"\/><\/figure>\n\n\n\n<p><a href=\"https:\/\/www.esecurityplanet.com\/products\/rsa-archer\/\" target=\"_blank\" rel=\"noreferrer noopener\">Archer Business Resiliency<\/a> makes it easy for organizations to identify their critical business processes and create disaster recovery plans that account for them. Businesses also get insight into their risks, helping them determine which processes will cause the most issues during an outage. <a href=\"https:\/\/www.esecurityplanet.com\/trends\/cybersecurity-hyperautomation\/\" target=\"_blank\" rel=\"noreferrer noopener\">Automation<\/a> is available to improve response times and initiate testing and plan execution immediately during an emergency. Interested organizations will have to contact Archer for pricing information.&nbsp;<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Key Features<\/h4>\n\n\n\n<ul class=\"wp-block-list\"><li>Impact analysis<\/li><li>Risk assessments<\/li><li>Automated disaster recovery<\/li><li>Risk insights<\/li><li>Scenario testing<\/li><li><a href=\"https:\/\/www.esecurityplanet.com\/products\/third-party-risk-management\/\" target=\"_blank\" rel=\"noreferrer noopener\">Third-party risk management<\/a><\/li><\/ul>\n\n\n\n<h4 class=\"wp-block-heading\">Pros<\/h4>\n\n\n\n<ul class=\"wp-block-list\"><li>Offers a high level of detail in reports<\/li><li>Flexible platform with a lot of features<\/li><li>Easy to generate standard and custom reports<\/li><\/ul>\n\n\n\n<h4 class=\"wp-block-heading\">Cons<\/h4>\n\n\n\n<ul class=\"wp-block-list\"><li>Major customizations can be expensive and time-consuming<\/li><li>Expensive compared to similar solutions<\/li><\/ul>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"igrafx\">iGrafx<\/h3>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh3.googleusercontent.com\/Ynj0xGmPuLiFXv900fsjYcj9D2SBx06kKh-bJIeVNi6nJRGG2QkFA2UiCr9p5Nlk3n38qN399iY8wSEdNpYfejoSh3KOLn6vsNlb4cjh8UzPvVT6lLKRf_PArwZkhoF5mlaLPpskBjr3txrltw\" alt=\"iGrafx dashboard.\"\/><\/figure>\n\n\n\n<p>iGrafx is focused on helping organizations meet the compliance and resiliency requirements of their industry with full visibility into critical business processes. Visual process maps make it easy to build and document business continuity plans and assess them for accuracy and consistency. Users can also share new processes with the process knowledge management features, designed to eliminate bottlenecks and potential risks. For pricing information, interested organizations will need to contact the iGrafx sales team.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Key Features<\/h4>\n\n\n\n<ul class=\"wp-block-list\"><li>Visual process builder<\/li><li><a href=\"https:\/\/www.esecurityplanet.com\/compliance\/gdpr-solutions\/\" target=\"_blank\" rel=\"noreferrer noopener\">Compliance tools<\/a><\/li><li>Metadata repository<\/li><li>Customizable approval process<\/li><li>Workflow automation<\/li><li>Resiliency assessment<\/li><\/ul>\n\n\n\n<h4 class=\"wp-block-heading\">Pros<\/h4>\n\n\n\n<ul class=\"wp-block-list\"><li>Easy to use and adapt to business needs<\/li><li>Helpful and knowledgeable customer support<\/li><li>Drag-and-drop workflow builder is intuitive<\/li><\/ul>\n\n\n\n<h4 class=\"wp-block-heading\">Cons<\/h4>\n\n\n\n<ul class=\"wp-block-list\"><li>Although helpful, customer support can be slow to respond<\/li><li>Can sometimes lag with large process maps<\/li><\/ul>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"fusion\">Fusion Framework System<\/h3>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh6.googleusercontent.com\/9FhFR7fBFhn3lEAnyadMd3u7aibKbMGALW9be5u5ulC0Ob2_XTscWI-sAY7J2eppiCpWOgef3A6UCLs_bk7MDxe9Ye1mMNNrUvlIj-aYkNo5WFaVfijqtjBlu0WAdi6rEpWij6ee16pwyJt_Cg\" alt=\"Fusion Framework System dashboard.\"\/><\/figure>\n\n\n\n<p>Fusion Framework System allows organizations to map critical processes and gain valuable risk insights to improve business continuity management. Businesses can also practice disaster scenarios, including task assignment, communication, and reporting to see how their plan would handle a real disaster. With options for both business continuity management and disaster recovery, users can handle outages no matter where they come from. Pricing information is not available on the website.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Key Features<\/h4>\n\n\n\n<ul class=\"wp-block-list\"><li>What-if scenarios<\/li><li>Plan evaluations<\/li><li>Risk and impact assessments<\/li><li>Visual process maps<\/li><li>Customizable risk tolerances<\/li><li>Third-party risk management<\/li><\/ul>\n\n\n\n<h4 class=\"wp-block-heading\">Pros<\/h4>\n\n\n\n<ul class=\"wp-block-list\"><li>Robust and flexible reporting capabilities<\/li><li>Intuitive and easy to use<\/li><li>Active and helpful user community<\/li><\/ul>\n\n\n\n<h4 class=\"wp-block-heading\">Cons<\/h4>\n\n\n\n<ul class=\"wp-block-list\"><li>Offers a limited number of user licenses<\/li><li>Records can only have one owner with change access<\/li><\/ul>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"logicmanager\">LogicManager<\/h3>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh3.googleusercontent.com\/NeJrb2MjjnhvJ_I4wqOWlPwV9hkC4oY-MFVeO_Y3J5LlWqQHKQ5osW8S1aYi7VUodI_GvSSgCqWexSpT3z4IO2sz3H9Pymo75BfsdEH3IOPBzDpIaP_KVXFIbJvG6eLB8CFEMOQOi3TrJWp-_w\" alt=\"LogicManager dashboard.\"\/><\/figure>\n\n\n\n<p><a href=\"https:\/\/www.esecurityplanet.com\/products\/logicmanager\/\" target=\"_blank\" rel=\"noreferrer noopener\">LogicManager<\/a> is enterprise risk management (ERM) software that helps organizations track critical business processes and prepare for potential outages. Business impact analyses give companies \u201cwhat-if\u201d scenarios that detail how their organization would fare during an incident. Then, they can undertake disaster simulations to practice and improve plans before an outage actually occurs. LogicManager helps businesses identify gaps and dependencies in their continuity plans for better <a href=\"https:\/\/www.esecurityplanet.com\/networks\/best-incident-response-tools-services\/\" target=\"_blank\" rel=\"noreferrer noopener\">incident response<\/a>. Pricing information is not available on the website.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Key Features<\/h4>\n\n\n\n<ul class=\"wp-block-list\"><li>Disaster simulations<\/li><li>Impact analysis<\/li><li>Centralized review framework<\/li><li>Automated testing<\/li><li>Taxonomy for risk linking<\/li><li>Pre-built analysis templates<\/li><\/ul>\n\n\n\n<h4 class=\"wp-block-heading\">Pros<\/h4>\n\n\n\n<ul class=\"wp-block-list\"><li>Workflows are customizable to meet business needs<\/li><li>Easy to deploy company-wide<\/li><li>Good for reporting and tracking business risk<\/li><\/ul>\n\n\n\n<h4 class=\"wp-block-heading\">Cons<\/h4>\n\n\n\n<ul class=\"wp-block-list\"><li>Can have a steep learning curve<\/li><li>Some users want more standard templates for out-of-the-box usability<\/li><\/ul>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"sai360\">SAI360<\/h3>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh4.googleusercontent.com\/xqZJ2ONWAotDMsTNy-K0C0Guu79AZlSG1QGyhtCm1DOxKKs_3hVe7pfqbciDjY3BdPzq0_uWCYTZBl8zOgqGpHeV5hMEnUCcieGXyk9WEsYclowR_ssGjkVkUW85driM3K-RVjR8QiEM7tkmBA\" alt=\"SAI360 dashboard.\"\/><\/figure>\n\n\n\n<p>SAI360 ensures operational resiliency during a disaster with a mass notification system to keep everyone aware of the problem and progress. Administrators get a real-time view of the situation, allowing them to assign tasks and follow the business continuity plan step by step. Business continuity maps are also tied to the organization\u2019s risk management framework to highlight any potential risks they need to address. SAI360 also includes multilingual content, perfect for global enterprises. Pricing information is not available on the website.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Key Features<\/h4>\n\n\n\n<ul class=\"wp-block-list\"><li>Customizable forms and fields<\/li><li>Automated workflows<\/li><li>Multilingual content<\/li><li>Process and risk mapping<\/li><li>Mass notification system<\/li><li>Business impact assessment<\/li><\/ul>\n\n\n\n<h4 class=\"wp-block-heading\">Pros<\/h4>\n\n\n\n<ul class=\"wp-block-list\"><li>Users can customize forms, fields, workflows, and notifications<\/li><li>Easy to understand and get started<\/li><li>Accurate and insightful dashboards and reports<\/li><\/ul>\n\n\n\n<h4 class=\"wp-block-heading\">Cons<\/h4>\n\n\n\n<ul class=\"wp-block-list\"><li>Support can sometimes be slow to respond and resolve issues<\/li><li>There may be inaccuracies in the multilingual content<\/li><\/ul>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"bc-in-the-cloud\">BC in the Cloud<\/h3>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh3.googleusercontent.com\/dkL0GV7fvj7tYB87nR1JtmobWpTnWCyvcHYP1KtYai7MWLCgvRXGGqF3IatjqPazS4px_dZ7F6pnkoChx0yCt-lrdI9u6nXlm5qMoOe5UlyQJ5oWEGiCOhRCxk5qtCjI_9VLgRant3vNOMR2Tg\" alt=\"BC in the Cloud dashboard.\"\/><\/figure>\n\n\n\n<p>BC in the Cloud provides both business continuity software as well as professional services to help organizations build and manage their disaster recovery and business continuity plans. The software is cloud-based, meaning it\u2019s accessible across multiple locations and BC in the Cloud handles all maintenance and updates. This is also important because it means an organization\u2019s business continuity plan is still accessible, even if its data center is down. The software works well out of the box but is also customizable to meet the business\u2019s needs. There are two pricing tiers available.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Key Features<\/h4>\n\n\n\n<ul class=\"wp-block-list\"><li>Pre-defined templates and plans<\/li><li>Customizable dashboards and reports<\/li><li>Vendor tracking<\/li><li>Automated workflows<\/li><li>Drag-and-drop process builder<\/li><li>Mass communications<\/li><\/ul>\n\n\n\n<h4 class=\"wp-block-heading\">Pros<\/h4>\n\n\n\n<ul class=\"wp-block-list\"><li>The system is very customizable in both design and configuration<\/li><li>User interface is intuitive and easy to use<\/li><li>Responsive and helpful customer support<\/li><\/ul>\n\n\n\n<h4 class=\"wp-block-heading\">Cons<\/h4>\n\n\n\n<ul class=\"wp-block-list\"><li>It can be difficult to migrate code from test to production<\/li><li>Advanced reporting capabilities are limited<\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"what-should-be-covered\">What Issues Need To Be Covered By a Business Continuity Plan?<\/h2>\n\n\n\n<p>The first thing you should do when creating a business continuity plan is to take stock of all of your critical business processes, so you know what to prioritize during a crisis. Find out where your biggest risks lie and start planning out steps you need to take to mitigate them.&nbsp;<\/p>\n\n\n\n<p>During the planning process, you also need to assign areas of responsibility to everyone on the disaster recovery team and establish a chain of command, so employees won\u2019t waste time wondering what they should do or repeating work during a crisis. The plan should also include contact information for everyone included in the chain of command as well as external personnel, like firefighters and utility companies. Make sure you update this contact information regularly.<\/p>\n\n\n\n<p>A <a href=\"https:\/\/www.techrepublic.com\/article\/10-things-you-should-cover-in-your-business-continuity-plan\/\" target=\"_blank\" rel=\"noreferrer noopener\">business continuity plan<\/a> also needs to include information on remote sites and workspaces in case of a disaster. What should employees do if the office gets flooded? Are they able to work from home or should they report to another office location? Companies with a lot of software-as-a-service applications will be able to adjust quickly because their data is stored in the cloud.&nbsp;<\/p>\n\n\n\n<p>However, those with on-premises data should have <a href=\"https:\/\/www.cioinsight.com\/news-trends\/business-continuity-dominates-at-storage-decisions\/\" target=\"_blank\" rel=\"noreferrer noopener\">backups stored offsite<\/a>, preferably far enough away that a natural disaster wouldn\u2019t be able to hit both the main office and the backup site in one fell swoop. Also, consider <a href=\"https:\/\/www.esecurityplanet.com\/products\/best-backup-solutions-for-ransomware-protection\/\" target=\"_blank\" rel=\"noreferrer noopener\">ransomware-proof backup services<\/a> for added security.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"best-practices\">Business Continuity Best Practices<\/h2>\n\n\n\n<p>Business continuity can\u2019t be an afterthought in your organization. With downtime costing businesses millions of dollars, your employees need to know exactly what steps to take when disaster strikes. If you don\u2019t start planning until a crisis happens, you\u2019ll waste valuable time getting organized.&nbsp;<\/p>\n\n\n\n<p>Additionally, don\u2019t forget <a href=\"https:\/\/www.esecurityplanet.com\/trends\/cybersecurity-outlook-2022-ransomware-and-ai-attacks\/\" target=\"_blank\" rel=\"noreferrer noopener\">vendors and partners<\/a> when making your business continuity plans. While a tsunami in Japan might not affect your business directly, it might cause a temporary shutdown of one of your suppliers, forcing you to source product from elsewhere. You need to be able to adapt quickly, meaning you should already have backups in place.<\/p>\n\n\n\n<p>You should also choose business continuity software that is cloud-based. If your business continuity plan is stored in the cloud, you\u2019ll still be able to access it, even during a power outage or if your data center crashes. Cloud-based business continuity software also ensures your entire team is working from the same plan, even if employees are working from different locations. Consider other types of cloud-based software as well, allowing employees to work from home if the office is destroyed.<\/p>\n\n\n\n<p><strong>Read next: <\/strong><a href=\"https:\/\/www.esecurityplanet.com\/threats\/a-few-clicks-from-data-disaster-enterprise-security\/\">A Few Clicks from Data Disaster: The State of Enterprise Security<\/a><\/p>\n\n\n<div id=\"ta-campaign-widget-66d6d6e5c3f00-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d6d6e5c3f00\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d6d6e5c3f00\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d6d6e5c3f00\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d6d6e5c3f00\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d6d6e5c3f00\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d6d6e5c3f00\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Even a single hour of downtime can cost businesses over $1 million, and costs can quickly add up, considering the average downtime for ransomware attacks is 22 days. Unfortunately, many organizations don\u2019t have business continuity solutions in place to help them avoid major spurts of downtime. Business continuity software can point out vulnerabilities in a [&hellip;]<\/p>\n","protected":false},"author":158,"featured_media":21897,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[17],"tags":[3753,9727],"b2b_audience":[34],"b2b_industry":[],"b2b_product":[248],"class_list":["post-21896","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-products","tag-disaster-recovery","tag-disaster-recovery-plan","b2b_audience-evaluation-and-selection","b2b_product-business-continuity"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>8 Best Business Continuity Software Solutions<\/title>\n<meta name=\"description\" content=\"Business continuity software helps businesses manage their plan for when a crisis happens. Explore the best BCP software now.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/products\/business-continuity-software\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"8 Best Business Continuity Software Solutions\" \/>\n<meta property=\"og:description\" content=\"Business continuity software helps businesses manage their plan for when a crisis happens. Explore the best BCP software now.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/products\/business-continuity-software\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2022-05-10T15:12:48+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-01-10T19:15:36+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/05\/Business-Continuity-Planning.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"1400\" \/>\n\t<meta property=\"og:image:height\" content=\"933\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Jenn Fulmer\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jenn Fulmer\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"10 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/business-continuity-software\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/business-continuity-software\/\"},\"author\":{\"name\":\"Jenn Fulmer\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/246026b2372e81da9f4360516d4eb75e\"},\"headline\":\"8 Best Business Continuity Software Solutions\",\"datePublished\":\"2022-05-10T15:12:48+00:00\",\"dateModified\":\"2023-01-10T19:15:36+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/business-continuity-software\/\"},\"wordCount\":1757,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/business-continuity-software\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/05\/Business-Continuity-Planning.jpeg\",\"keywords\":[\"disaster recovery\",\"Disaster Recovery Plan\"],\"articleSection\":[\"Products\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/business-continuity-software\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/products\/business-continuity-software\/\",\"name\":\"8 Best Business Continuity Software Solutions\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/business-continuity-software\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/business-continuity-software\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/05\/Business-Continuity-Planning.jpeg\",\"datePublished\":\"2022-05-10T15:12:48+00:00\",\"dateModified\":\"2023-01-10T19:15:36+00:00\",\"description\":\"Business continuity software helps businesses manage their plan for when a crisis happens. Explore the best BCP software now.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/business-continuity-software\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/products\/business-continuity-software\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/business-continuity-software\/#primaryimage\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/05\/Business-Continuity-Planning.jpeg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/05\/Business-Continuity-Planning.jpeg\",\"width\":1400,\"height\":933,\"caption\":\"Three business people escaping an office fire with business continuity plans.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/business-continuity-software\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"8 Best Business Continuity Software Solutions\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/246026b2372e81da9f4360516d4eb75e\",\"name\":\"Jenn Fulmer\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/09\/T039FL812-U019MPLGN3D-0b0ff98bdebd-512-150x150.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/09\/T039FL812-U019MPLGN3D-0b0ff98bdebd-512-150x150.jpg\",\"caption\":\"Jenn Fulmer\"},\"description\":\"Jenn Fulmer is a writer for TechnologyAdvice, IT Business Edge, Channel Insider, and eSecurity Planet currently based in Lexington, KY. Using detailed, research-based content, she aims to help businesses find the technology they need to maximize their success and protect their data.\",\"url\":\"https:\/\/www.esecurityplanet.com\/author\/jenn-fulmer\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"8 Best Business Continuity Software Solutions","description":"Business continuity software helps businesses manage their plan for when a crisis happens. Explore the best BCP software now.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/products\/business-continuity-software\/","og_locale":"en_US","og_type":"article","og_title":"8 Best Business Continuity Software Solutions","og_description":"Business continuity software helps businesses manage their plan for when a crisis happens. Explore the best BCP software now.","og_url":"https:\/\/www.esecurityplanet.com\/products\/business-continuity-software\/","og_site_name":"eSecurity Planet","article_published_time":"2022-05-10T15:12:48+00:00","article_modified_time":"2023-01-10T19:15:36+00:00","og_image":[{"width":1400,"height":933,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/05\/Business-Continuity-Planning.jpeg","type":"image\/jpeg"}],"author":"Jenn Fulmer","twitter_card":"summary_large_image","twitter_creator":"@eSecurityPlanet","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Jenn Fulmer","Est. reading time":"10 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/products\/business-continuity-software\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/products\/business-continuity-software\/"},"author":{"name":"Jenn Fulmer","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/246026b2372e81da9f4360516d4eb75e"},"headline":"8 Best Business Continuity Software Solutions","datePublished":"2022-05-10T15:12:48+00:00","dateModified":"2023-01-10T19:15:36+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/products\/business-continuity-software\/"},"wordCount":1757,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/products\/business-continuity-software\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/05\/Business-Continuity-Planning.jpeg","keywords":["disaster recovery","Disaster Recovery Plan"],"articleSection":["Products"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/products\/business-continuity-software\/","url":"https:\/\/www.esecurityplanet.com\/products\/business-continuity-software\/","name":"8 Best Business Continuity Software Solutions","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/products\/business-continuity-software\/#primaryimage"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/products\/business-continuity-software\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/05\/Business-Continuity-Planning.jpeg","datePublished":"2022-05-10T15:12:48+00:00","dateModified":"2023-01-10T19:15:36+00:00","description":"Business continuity software helps businesses manage their plan for when a crisis happens. Explore the best BCP software now.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/products\/business-continuity-software\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/products\/business-continuity-software\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/products\/business-continuity-software\/#primaryimage","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/05\/Business-Continuity-Planning.jpeg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/05\/Business-Continuity-Planning.jpeg","width":1400,"height":933,"caption":"Three business people escaping an office fire with business continuity plans."},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/products\/business-continuity-software\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"8 Best Business Continuity Software Solutions"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/246026b2372e81da9f4360516d4eb75e","name":"Jenn Fulmer","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/09\/T039FL812-U019MPLGN3D-0b0ff98bdebd-512-150x150.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/09\/T039FL812-U019MPLGN3D-0b0ff98bdebd-512-150x150.jpg","caption":"Jenn Fulmer"},"description":"Jenn Fulmer is a writer for TechnologyAdvice, IT Business Edge, Channel Insider, and eSecurity Planet currently based in Lexington, KY. Using detailed, research-based content, she aims to help businesses find the technology they need to maximize their success and protect their data.","url":"https:\/\/www.esecurityplanet.com\/author\/jenn-fulmer\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/21896"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/158"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=21896"}],"version-history":[{"count":0,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/21896\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media\/21897"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=21896"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=21896"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=21896"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=21896"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=21896"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=21896"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}