{"id":22472,"date":"2022-07-08T20:27:53","date_gmt":"2022-07-08T20:27:53","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/?p=22472"},"modified":"2023-01-10T19:15:36","modified_gmt":"2023-01-10T19:15:36","slug":"disaster-recovery-solutions","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/products\/disaster-recovery-solutions\/","title":{"rendered":"8 Best Disaster Recovery Solutions"},"content":{"rendered":"\n<p>Disaster recovery (DR) and <a href=\"https:\/\/www.esecurityplanet.com\/products\/business-continuity-software\/\">business continuity<\/a> have been an essential aspect of enterprise IT for decades. Whether it&#8217;s earthquakes, floods, or power outages, DR is there to ensure operations can continue.<\/p>\n\n\n\n<p>But more recently, a lot more has been put on the DR plate. <a href=\"https:\/\/www.esecurityplanet.com\/threats\/ransomware-protection\/\">Ransomware<\/a> has now emerged as one of the key reasons to have a DR plan and DR technology in place. A massive disruption like <a href=\"https:\/\/www.esecurityplanet.com\/trends\/colonial-pipeline-ransomware-attack\/\">Colonial Pipeline<\/a> experienced can be enough to put a company out of business.<\/p>\n\n\n\n<p>\u201cVendors have traditionally been focused on protecting data from power failures, system failures, and natural disasters and have tended to concentrate on some perimeter-level network defenses,\u201d said Siamak Nazari, CEO and cofounder of Nebulon. \u201cWith a cyberattack, it\u2019s more than just data that needs protecting\u2014at risk is really the entire physical infrastructure from applications and operating systems down to low-level firmware and BIOS.<\/p>\n\n\n\n<p>\u201cOrganizations require even more sophisticated protection, response, and recovery solutions than what was available even two years ago.\u201d<\/p>\n\n\n\n<p>Also see the <a href=\"https:\/\/www.esecurityplanet.com\/products\/business-continuity-software\/\">Best Business Continuity Solutions<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What is Disaster Recovery?<\/h2>\n\n\n\n<p>DR consists of several facets. There are hardware elements such as having a redundant data center, where the enterprise can fail over during an event. In some cases, it consists of the same equipment in several locations, each replicating data to another similar unit. But it also requires software to orchestrate data movement, backup and restore technology to ensure a current copy of data is available, and the ability to recover systems and data rapidly.<\/p>\n\n\n\n<p>In this era of the cloud, the big cloud providers take care of the underlying infrastructure. All that is needed is a connection to the cloud. However it is done, the concept remains the same\u2014to bring systems back up in as speedy a manner as possible with as little data loss as possible.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Disaster Recovery and Ransomware<\/h2>\n\n\n\n<p>In the event of ransomware, the enterprise needs to have access to an uncorrupted copy of its data, so it can refuse to submit to cyber criminals\u2019 demands.<\/p>\n\n\n\n<p>&nbsp;\u201cThe current cyber landscape requires organizations to be as equipped as possible for ransomware attacks and other disaster events and must take measures to ensure their data can remain resilient,\u201d said Andrew Silva, technical marketing manager at Zerto, a Hewlett Packard Enterprise (HPE) company.<\/p>\n\n\n\n<p>A resilient approach, Silva added, requires a shift in the way IT thinks about ransomware\u2014from exclusive focus on preventing attacks to being prepared for the eventuality of an attack. It must also encompass a recovery solution that guarantees access to data, without gaps or data loss, in the event of attack, so operations are back up and running without delays.<\/p>\n\n\n\n<p>For example, snapshots have been used to improve recovery point objectives (RPOs) and recovery time objectives (RTOs). But this approach works like a still camera, taking a picture of an environment at a specific time. This type of backup and DR technology offers RPOs measured in hours.<\/p>\n\n\n\n<p>Instead, Silva recommends continuous data protection (CDP) as the best way to achieve real-time recovery from ransomware. That said, many vendors continue to utilize snapshots as one element of comprehensive DR and ransomware protection.<\/p>\n\n\n\n<p>\u201cThe explosive growth in ransomware that threatens virtually every company in every industry has heightened the importance of cyber resiliency as a key component of disaster recovery planning,\u201d said Sonya Duffin, a ransomware and data protection expert at Veritas Technologies. \u201c&#8230; The goal of ransomware is to bring operations to a standstill, much like a traditional disaster would.<\/p>\n\n\n\n<p>\u201cMaking matters worse, <a href=\"https:\/\/www.esecurityplanet.com\/threats\/ransomware-as-a-service-raas-ttp-protections\/\">ransomware as a service<\/a> has developed into a lucrative business model, and attackers are relentless in developing creative ways to infiltrate IT environments to capture data and hold it hostage.\u201d<\/p>\n\n\n\n<p>See the <a href=\"https:\/\/www.esecurityplanet.com\/products\/best-backup-solutions-for-ransomware-protection\/\">Best Backup Solutions for Ransomware Protection<\/a><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">DR trending toward increased data protection and resiliency<\/h3>\n\n\n\n<p>As a result, the disaster recovery market is changing to place an increased focus on data protection and resiliency that ensures an organization can get back up and running quickly following a ransomware attack and to do so without having to pay the ransom.<\/p>\n\n\n\n<p>This means today\u2019s disaster recovery solutions must fit into an organization-wide <a href=\"https:\/\/www.esecurityplanet.com\/trends\/zero-trust-hype-vs-reality\/\">zero-trust strategy<\/a> and include features like immutable and indelible storage with an internally managed compliance clock to keep backups safe, complete visibility of entire data environments, AI-driven anomaly detection to optimize for the fastest recovery possible and broad backup and recovery options across multicloud environments.<\/p>\n\n\n\n<p>In many ways, DR is playing catch up with the rise in effectiveness of cyber criminals. The global cost of ransomware has risen from $325 million to $20 billion from 2016 to 2021, and&nbsp;on average, <a href=\"https:\/\/urldefense.proofpoint.com\/v2\/url?u=https-3A__secure2.sophos.com_en-2Dus_medialibrary_pdfs_whitepaper_sophos-2Dstate-2Dof-2Dransomware-2D2021-2Dwp.pdf&amp;d=DwMFaQ&amp;c=gYbc-GKV5BQa9zrq1GFCVuYJE6W9xtxsD4gNvKoLfKg&amp;r=hg5JNdM8fr8Qi0dvm71R7-xZO-Cq9KhwlMe7u1G3R-o&amp;m=D9A79JjZYyYF1ZlXhaaVxiWMsENcp7EpQaO9nBEnP4IodCLMgMZl8XuJnvWfcV8r&amp;s=QKg9ENPtt7C3IHnSuUJBNbSnNdbuPkstbM-JQ8gzF1I&amp;e=\" target=\"_blank\" rel=\"noreferrer noopener\">only 65% of encrypted data was restored<\/a> after a ransom was paid.&nbsp;This means organizations need to rethink their DR strategy for ransomware use cases since traditional data protection solutions and DR plans may not work.<\/p>\n\n\n\n<p>\u201cCyber recovery is a different use case that requires a modern data protection solution; new DR plans and procedures; and multifaceted response team&nbsp;which could&nbsp;include IT, DR, security, legal, a third-party <a href=\"https:\/\/www.esecurityplanet.com\/products\/cyber-insurance-companies\/\">cyber insurance<\/a> company, and other third-party service providers,\u201d said Darpan Thaker, senior director of product management at&nbsp;Sungard Availability Services. \u201cOrganizations need to ensure that all these parties work as a cohesive team in order to fulfill their roles and responsibilities, which also increases the overall complexity of ransomware recovery.\u201d<\/p>\n\n\n\n<p>Also see the <a href=\"https:\/\/www.esecurityplanet.com\/products\/ransomware-removal-and-recovery-services\/\">Best Ransomware Removal and Recovery Services<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What is DR as a Service?<\/h2>\n\n\n\n<p>Another change in DR, of late, is that it is evolving into an on-demand service. Many vendors now offer disaster recovery as a service (DRaaS), which is a good way to integrate disaster recovery with advanced security and data protection solutions.<\/p>\n\n\n\n<p>Local backups are usually enough to recover IT systems from server failure and other common problems. But a site-wide disaster could destroy those backups and result in major downtime and data loss for a business. DRaaS solutions can help&nbsp;ensure complete and reliable business continuity.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Top DR Solutions Including Security Features&nbsp;<\/h2>\n\n\n\n<p><em>eSecurity Planet<\/em> evaluated many different disaster recovery solutions with a focus on security features. Here are our top picks based on our analysis of the DR market.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Zerto<\/h3>\n\n\n\n<p>Zerto\u2019s automated failover and failback is said to recover encrypted files, virtual machine (VM) applications, sites, and data within minutes of when an infection occurs. IT selects a checkpoint in the journal from before the attack and rolls back to the uninfected state.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Key Differentiators<\/h4>\n\n\n\n<ul class=\"wp-block-list\"><li>The Zerto approach favors continuous data protection over periodic backup.<\/li><li>Journaling technology helps users improve RPOs\/RTOs and eliminate the need for scheduling, backup windows, and snapshots.<\/li><li>Always-on replication ensures protection of every change to applications as they occur, continuously recording changes.<\/li><li>RPOs are measured in seconds.<\/li><\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Druva<\/h3>\n\n\n\n<p>Druva\u2019s cloud data protection and management system includes DR, backup, and ransomware protection. It provides a way to centrally protect and govern data across multiple software-as-a-service (SaaS) applications.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Key Differentiators<\/h4>\n\n\n\n<ul class=\"wp-block-list\"><li>Golden snapshots can quickly recover data.<\/li><li>Whether users have Microsoft 365, Google, or Salesforce, they can orchestrate SaaS data management, remove complexity, and reduce admin overhead.<\/li><li>Users can benefit from a 15-minute deployment with near-zero admin burden.<\/li><li>Druva\u2019s metadata-centric architecture supports management and security of data in the cloud with long-term retention, and <a href=\"https:\/\/www.esecurityplanet.com\/compliance\/gdpr-solutions\/\">regulatory compliance<\/a>.<\/li><li>Druva offers centralized visibility over globally distributed data.<\/li><li>Intelligent data classification and federated search are available for easy discovery.<\/li><li>There is no hardware to maintain or support.<\/li><\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Arcserve<\/h3>\n\n\n\n<p>Arcserve Cloud Services is Arcserve\u2019s DRaaS solution protecting both physical on-premises business systems and cloud-based data storage systems. Cloud Services includes integrated backup, storage, and data protection to deliver both disaster recovery and security capabilities on-demand. It is designed to streamline data backup and recovery management and to get systems back online with speed. Businesses can replicate backup images from OneXafe, ShadowXafe, OneXafe Solo, or ShadowProtect to Arcserve\u2019s Cloud Services, which provide the tools needed to keep business running.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Key Differentiators<\/h4>\n\n\n\n<ul class=\"wp-block-list\"><li>Fault-tolerant cloud is available for disaster recovery.<\/li><li>Cloud storage can be customized to fit the needs of IT environments of different shapes and sizes.<\/li><li>Cloud Services centrally manages and monitors all accounts, as well as failover in a disaster, without third-party intervention.<\/li><li>Networking features allow customers to run networks in Arcserve\u2019s cloud just as it would be run onsite.<\/li><li>Cloud Services works on platforms and in any location.<\/li><li>Unified data resilience enables all-in-one data protection and management.<\/li><li>The solution includes integrated cybersecurity and immutable storage options that cost-effectively scale-out.<\/li><\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Sungard AS<\/h3>\n\n\n\n<p>Sungard Availability Services (Sungard AS) has been in the DR game for decades. Its Cloud Recovery product suite delivers a fully managed, financial penalty-backed RTO service-level agreement (SLA) for physical, virtual, and IBM iSeries server platforms. It recently added a new&nbsp;Cyber Incident Recovery offering&nbsp;that improves customers\u2019 ability to successfully recover data that\u2019s been compromised from a&nbsp;cyberattack.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Key Differentiators<\/h4>\n\n\n\n<ul class=\"wp-block-list\"><li>There are three tiers of validated RTO SLA, ranging from two hours to eight hours, to align RTOs to business requirements and optimize recovery.<\/li><li>Tiered RTO SLA paired with DRVerify Automated Testing.<\/li><li>The solution supports physical x86 servers, virtual machines, and IBM iSeries servers.<\/li><li>The Cyber Incident Recovery offering provides immutable and air-gapped backup for data recovery with at least one offline backup copy.<\/li><li><a href=\"https:\/\/www.esecurityplanet.com\/products\/best-iam-software\/\">Identity and access management<\/a> with role-based access control and&nbsp;<a href=\"https:\/\/www.esecurityplanet.com\/mobile\/multi-factor-authentication\/\">multi-factor authentication<\/a> is available.<\/li><li>A clean room environment is possible for <a href=\"https:\/\/www.esecurityplanet.com\/products\/digital-forensics-software\/\">forensic analysis<\/a> and rapid identification of clean recovery points.<\/li><li>Cyber recovery simulation is available for validation of immutable and air-gapped backups and data recovery plans and procedures.<\/li><\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Veritas<\/h3>\n\n\n\n<p>Veritas NetBackup&nbsp;uses policies and elastic services to deliver data protection and simplified operations at scale across any workloads, including traditional, platform-as-a-service (PaaS), SaaS, and container-based applications. It provides secure delivery of workload protection at the edge, on-premises, and in the cloud, reducing data protection gaps.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Key Differentiators<\/h4>\n\n\n\n<ul class=\"wp-block-list\"><li>Integrated multicloud analytics and insights allow businesses to<strong>&nbsp;<\/strong>optimize performance, mitigate risk, and reduce cloud costs.<\/li><li>Kubernetes multicloud recovery allows users to recover the data they want to any Kubernetes distribution.<\/li><li>Cyber resiliency safeguards data with a unified platform approach, providing a multilayered solution with automatic malware scanning to ensure infection-free recovery of data.<\/li><li>Integrated SaaS application data protection provides a unified data management and protection solution.<\/li><li>Veritas Cloud Scale Technology that powers NetBackup provides cloud agility while enabling auto-scaling data management.<\/li><li>The solution autonomously provisions, optimizes, and repairs data management services, while empowering end users to enable self-service data protection and recovery.<\/li><\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Unitrends<\/h3>\n\n\n\n<p>Unitrends helps to minimize data loss and protect against ransomware in order to eliminate downtime. The Unitrends centralized platform provides data centers, servers, endpoints, cloud, and&nbsp;SaaS applications with access to backup and data recovery.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Key Differentiators<\/h4>\n\n\n\n<ul class=\"wp-block-list\"><li>Failed backups&nbsp;due to environmental issues are eliminated by Unitrends Helix.<\/li><li>Backup and DR are integrated with automation and security features.<\/li><li>Unitrends includes ransomware detection, dark web monitoring for stolen credentials, and phishing defense tools.<\/li><li>Options include the Recovery Series physical&nbsp;appliance&nbsp;or the Unitrends Backup virtual&nbsp;appliance.<\/li><li>The solution can run on VMware vSphere, Microsoft Hyper-V, and Nutanix.<\/li><li>Alternatively, Unitrends can be deployed as a VM within Amazon Web Services or Microsoft Azure.<\/li><\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Nebulon<\/h3>\n\n\n\n<p>Nebulon\u2019s TimeJump and ImmutableBoot solutions work together to apply a snapshot philosophy in a broader context. TimeJump recovers critical application data as well as the infected operating systems on which that data runs, offering physical infrastructure recovery in under four minutes. ImmutableBoot is a reboot-to-recover solution that enables companies to revert back to a frozen snapshot of a known, good version of the operating system with a server reboot.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Key Differentiators<\/h4>\n\n\n\n<ul class=\"wp-block-list\"><li>TimeJump and ImmutableBoot allow organizations to recover application data and the OS for thousands of servers dispersed across the globe in four minutes.<\/li><li>The solution contains a separate fault domain, which prevents ransomware-encrypted servers from infecting the data protection solution.<\/li><li>Users can freeze an immutable known, good server image with desired configurations that can be applied across a large server estate.<\/li><li>Nebulon automatically enforces centralized and consistent <a href=\"https:\/\/www.esecurityplanet.com\/products\/patch-management-software\/\">patch<\/a> and configuration management\u2014no reliance on device-by-device management.<\/li><li>The solutions are designed to reduce threat vectors in (deep) infrastructure.<\/li><li>Nebulon has an offsite (cloud-based) infrastructure control plane, similar to an AWS-like management console, but for on-premises workloads. The control plane monitors IO patterns and provides alerts on active ransomware attacks within minutes.<\/li><li>As the control plane is offsite, when an attack on the data center happens, management tools are not infected and can begin recovery immediately.<\/li><li>Nebulon segregates compute and storage into different security domains within the server.<\/li><\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Carbonite<\/h3>\n\n\n\n<p>Carbonite Backup for Microsoft 365 is aimed at backup and protection for Microsoft 365 productivity apps. Individual files and folders as well as permissions settings or complete sites can be recovered. The solution includes ransomware protection and up to four backups a day.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Key Differentiators<\/h4>\n\n\n\n<ul class=\"wp-block-list\"><li>Carbonite Backup protects SharePoint, OneDrive, email, Teams, and other Microsoft 365 elements.<\/li><li>Users can protect against human error, hardware failure, and ransomware.<\/li><li>The solution captures changes in Microsoft 365 applications and replicates them to a secondary instance in Microsoft Azure.<\/li><li>Site-level rollback or recovery of individual mailboxes, conversations, and files is available.<\/li><li>The search feature can be used to recover content from Teams, SharePoint, Email, Calendar, and OneDrive.<\/li><li>Content can be restored based on owner, subject line, content type, and more.<\/li><\/ul>\n\n\n\n<p>Read next: <a href=\"https:\/\/www.esecurityplanet.com\/networks\/best-incident-response-tools-services\/\">Best Incident Response Tools and Software<\/a><\/p>\n\n\n<div id=\"ta-campaign-widget-66d6f6dcf2288-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d6f6dcf2288\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d6f6dcf2288\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d6f6dcf2288\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d6f6dcf2288\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d6f6dcf2288\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d6f6dcf2288\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Disaster recovery (DR) and business continuity have been an essential aspect of enterprise IT for decades. Whether it&#8217;s earthquakes, floods, or power outages, DR is there to ensure operations can continue. But more recently, a lot more has been put on the DR plate. Ransomware has now emerged as one of the key reasons to [&hellip;]<\/p>\n","protected":false},"author":213,"featured_media":18965,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[17],"tags":[3753,9651,2478],"b2b_audience":[34],"b2b_industry":[],"b2b_product":[385,481,383,388,31790],"class_list":["post-22472","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-products","tag-disaster-recovery","tag-faq","tag-ransomware","b2b_audience-evaluation-and-selection","b2b_product-cloud-saas-and-hosted-security-services","b2b_product-disaster-recovery","b2b_product-encryption-data-loss-prevention","b2b_product-intellectual-property","b2b_product-ransomware"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>8 Best Disaster Recovery Solutions<\/title>\n<meta name=\"description\" content=\"Ransomware and cyber attacks have made disaster recovery a security issue too. Here are the best DR solutions for security use cases.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/products\/disaster-recovery-solutions\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"8 Best Disaster Recovery Solutions\" \/>\n<meta property=\"og:description\" content=\"Ransomware and cyber attacks have made disaster recovery a security issue too. Here are the best DR solutions for security use cases.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/products\/disaster-recovery-solutions\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2022-07-08T20:27:53+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-01-10T19:15:36+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/Backup-Continuity-Disaster-Recovery-03-1088x725-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1088\" \/>\n\t<meta property=\"og:image:height\" content=\"725\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Drew Robb\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Drew Robb\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"10 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/disaster-recovery-solutions\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/disaster-recovery-solutions\/\"},\"author\":{\"name\":\"Drew Robb\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/df930f1317eb05f959f8016777c920c2\"},\"headline\":\"8 Best Disaster Recovery Solutions\",\"datePublished\":\"2022-07-08T20:27:53+00:00\",\"dateModified\":\"2023-01-10T19:15:36+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/disaster-recovery-solutions\/\"},\"wordCount\":2217,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/disaster-recovery-solutions\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/Backup-Continuity-Disaster-Recovery-03-1088x725-1.jpg\",\"keywords\":[\"disaster recovery\",\"FAQ\",\"ransomware\"],\"articleSection\":[\"Products\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/disaster-recovery-solutions\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/products\/disaster-recovery-solutions\/\",\"name\":\"8 Best Disaster Recovery Solutions\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/disaster-recovery-solutions\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/disaster-recovery-solutions\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/Backup-Continuity-Disaster-Recovery-03-1088x725-1.jpg\",\"datePublished\":\"2022-07-08T20:27:53+00:00\",\"dateModified\":\"2023-01-10T19:15:36+00:00\",\"description\":\"Ransomware and cyber attacks have made disaster recovery a security issue too. Here are the best DR solutions for security use cases.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/disaster-recovery-solutions\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/products\/disaster-recovery-solutions\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/disaster-recovery-solutions\/#primaryimage\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/Backup-Continuity-Disaster-Recovery-03-1088x725-1.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/Backup-Continuity-Disaster-Recovery-03-1088x725-1.jpg\",\"width\":1088,\"height\":725,\"caption\":\"backup ransomware recovery\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/disaster-recovery-solutions\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"8 Best Disaster Recovery Solutions\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/df930f1317eb05f959f8016777c920c2\",\"name\":\"Drew Robb\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/0.jpg.256x256_q100_crop-smart-150x150.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/0.jpg.256x256_q100_crop-smart-150x150.jpg\",\"caption\":\"Drew Robb\"},\"description\":\"Drew Robb has contributed to eSecurity Planet and other TechnologyAdvice websites for more than twenty years. He's covered every aspect of enterprise IT in his career, from the latest trends to in-depth product analysis. He is also the editor-in-chief of an international engineering magazine.\",\"url\":\"https:\/\/www.esecurityplanet.com\/author\/drew-robb-esp\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"8 Best Disaster Recovery Solutions","description":"Ransomware and cyber attacks have made disaster recovery a security issue too. Here are the best DR solutions for security use cases.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/products\/disaster-recovery-solutions\/","og_locale":"en_US","og_type":"article","og_title":"8 Best Disaster Recovery Solutions","og_description":"Ransomware and cyber attacks have made disaster recovery a security issue too. Here are the best DR solutions for security use cases.","og_url":"https:\/\/www.esecurityplanet.com\/products\/disaster-recovery-solutions\/","og_site_name":"eSecurity Planet","article_published_time":"2022-07-08T20:27:53+00:00","article_modified_time":"2023-01-10T19:15:36+00:00","og_image":[{"width":1088,"height":725,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/Backup-Continuity-Disaster-Recovery-03-1088x725-1.jpg","type":"image\/jpeg"}],"author":"Drew Robb","twitter_card":"summary_large_image","twitter_creator":"@eSecurityPlanet","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Drew Robb","Est. reading time":"10 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/products\/disaster-recovery-solutions\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/products\/disaster-recovery-solutions\/"},"author":{"name":"Drew Robb","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/df930f1317eb05f959f8016777c920c2"},"headline":"8 Best Disaster Recovery Solutions","datePublished":"2022-07-08T20:27:53+00:00","dateModified":"2023-01-10T19:15:36+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/products\/disaster-recovery-solutions\/"},"wordCount":2217,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/products\/disaster-recovery-solutions\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/Backup-Continuity-Disaster-Recovery-03-1088x725-1.jpg","keywords":["disaster recovery","FAQ","ransomware"],"articleSection":["Products"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/products\/disaster-recovery-solutions\/","url":"https:\/\/www.esecurityplanet.com\/products\/disaster-recovery-solutions\/","name":"8 Best Disaster Recovery Solutions","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/products\/disaster-recovery-solutions\/#primaryimage"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/products\/disaster-recovery-solutions\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/Backup-Continuity-Disaster-Recovery-03-1088x725-1.jpg","datePublished":"2022-07-08T20:27:53+00:00","dateModified":"2023-01-10T19:15:36+00:00","description":"Ransomware and cyber attacks have made disaster recovery a security issue too. Here are the best DR solutions for security use cases.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/products\/disaster-recovery-solutions\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/products\/disaster-recovery-solutions\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/products\/disaster-recovery-solutions\/#primaryimage","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/Backup-Continuity-Disaster-Recovery-03-1088x725-1.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/Backup-Continuity-Disaster-Recovery-03-1088x725-1.jpg","width":1088,"height":725,"caption":"backup ransomware recovery"},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/products\/disaster-recovery-solutions\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"8 Best Disaster Recovery Solutions"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/df930f1317eb05f959f8016777c920c2","name":"Drew Robb","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/0.jpg.256x256_q100_crop-smart-150x150.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/0.jpg.256x256_q100_crop-smart-150x150.jpg","caption":"Drew Robb"},"description":"Drew Robb has contributed to eSecurity Planet and other TechnologyAdvice websites for more than twenty years. He's covered every aspect of enterprise IT in his career, from the latest trends to in-depth product analysis. He is also the editor-in-chief of an international engineering magazine.","url":"https:\/\/www.esecurityplanet.com\/author\/drew-robb-esp\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/22472"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/213"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=22472"}],"version-history":[{"count":0,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/22472\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media\/18965"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=22472"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=22472"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=22472"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=22472"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=22472"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=22472"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}