Select Page

Key Considerations When Looking for a Cloud Services Provider

If you are going to create an RFP today what should be in it, how are the services packaged, Recovery objective capabilities, what are the range of RTO and RPO capabilities. Application and platform support, can the provider support your IT environment? We take a quick look to understand DR as a Service (DRaaS) offering.

Key Considerations When Looking for a Cloud Services Provider

Data transfer technologies

 

What are the replication and backup and disaster recovery solutions, how do you seed the initial copies to the production data. Are you throwing up a line, are you sending it all over, are they nailing you an appliance and then you are going to backup to that and then you send it to your DR as a service provider. How is that going to work – It is important to understand that.

 

Data resiliency

 

How does the provider ensure data in the cloud is not lost, corrupted etc.? Risk mitigation – How does the provider mitigate oversubscription risk? How does the provider deal with the fact that they have thousands of customers and one geographical location, what is they do if their datacenter goes down, can those thousand feeds be repurposed in less than a minute? You better understand if the vendor can actually meet these requirements.

“How does the provider deal with the fact that they have thousands of  customers and one geographical location, how does the provider protect sensitive data? What new enhancements are on the horizon? Can the provider support your IT environment? What is their level of expertise in failovers and failbacks? Can the provider support all the regions where you operate?”

Security

How does the provider protect sensitive data? That is important if you are in heavily regulated environment or even not; Sony wasn’t a heavily regulated environment, but there was probably some stuff that they wanted to keep private. That wasn’t there third party that did that, it was their own fault.

Planned service enhancements

What new enhancements are on the horizon? That is always a good question to ask.

Pricing, SLAs and Contract Terms

What are the range of RTO and RPO capabilities? Scale – again can the provider support your IT environment. Supporting declarations – What is their level of expertise in failovers and failbacks? What is their success level? It is a relevant question to ask, “how good are you at this”.

Install base and Growth

How many customers do they have? Geographical Location – What are the regions in which the provider operates, can the provider support all the regions where you operate?

Finally Partnerships

What are the provider’s technology and business partnerships? Because from a third-party risk management perspective they are now responsible for your ability to recover from a catastrophic event. If they are not, or if they are outsourcing that from another third-party provider, you want to make sure that they have a sound third party risk management program. You can’t reach into their providers and say “I’m coming to audit you”, and in some regulatory cases such as banking, healthcare it is imperative that you do it.

 

Want new articles before they get published?
Subscribe to our Awesome Newsletter.

The Spear Phishing Survival Guide

The Spear Phishing Survival Guide

Spear phishing stands as the favored gateway for ransomware delivery and infiltrating corporate networks. Shockingly, 36% of data breaches in 2022 involved phishing, with 25% utilizing email as the ransomware attack vector. Guarding against cyber threats and...

Understanding Detection and Response: EDR vs MDR vs XDR vs NDR

Understanding Detection and Response: EDR vs MDR vs XDR vs NDR

In a digitally transformed landscape fraught with ever-evolving cyber threats, the acronyms EDR (Endpoint Detection and Response), XDR (Extended Detection and Response), MDR (Managed Detection and Response), and NDR (Network Detection and Response) have become...

Trigona Ransomware: What is it and How to Defend Against it

Trigona Ransomware: What is it and How to Defend Against it

In an ever-evolving digital landscape, the specter of ransomware looms large, and Trigona stands as a significant player in the realm of cyber threats. This blog delves into the multifaceted world of Trigona ransomware, unraveling its origins, unique characteristics,...

Lockbit Ransomware: Inside the Cyberthreat and Defense Strategies

Lockbit Ransomware: Inside the Cyberthreat and Defense Strategies

In the constantly evolving arena of cybersecurity, the digital landscape is fraught with adversaries lurking in the shadows, ready to exploit vulnerabilities and disrupt the operations of organizations. Among these threats, LockBit ransomware has emerged as a...

What Defending Against Ransomware-as-a-Service (RaaS) Entails

What Defending Against Ransomware-as-a-Service (RaaS) Entails

Ransomware has evolved, becoming a thriving business model for cybercriminals. Ransomware-as-a-Service (RaaS) exemplifies this transformation—a lethal alliance between the creators and distributors of ransomware. It’s no longer a threat relegated to tech...

You May Also Like

WordPress PopUp Plugin

Subscribe To Our Newsletter

Join our mailing list to receive the latest news, updates, and promotions from StoneFly.

Please Confirm your subscription from the email