SlideShare a Scribd company logo
1 of 2
Download to read offline
3) How long has the vendor been providing cloud based services?
Checklist For Choosing Digital
Disaster Recovery Service Providers
When beginning the search for an information management vendor, it pays off in the long run to keep your
needs at the forefront of the conversation. To help with this goal, The Data Vault has put together a handy
checklist of some of the most common requirements we see on a regular basis; hopefully it will allow you to
easily compare and contrast the various options available on the market.
1) Where are the vendor’s physical servers located?
4) Can the vendor provide international diversification, with hubs in geographical locations?
2) How long has the vendor been in business?
5) Can the vendor provide public, private, and hybrid cloud environments?
6) Can the vendor separate data depending on the data type?
8) Is data encrypted when using a public cloud environment?
7) Does the vendor have a firewall that will adequately address security needs?
Yes No
Public Private Hybrid
Yes No
Yes No
Yes No
9) Does the vendor offer redundant systems?
Yes No
12) Is the data center location secure with system to provide authorized access?
10) Does the vendor have redundant internet connections?
Yes No
13) Is the data center located near known or potential hazards?
14) Will data be stored so that it is segregated from other organization’s data?
15) Has the vendor’s backup strategy been reviewed?
16) Is backup done using disk to disk or magnetic tapes or other methods?
17) Can the vendor demonstrate a business continuity plan?
18) Are business critical applications being hosted?
19) Is the data center designed around a virtualized environment?
20) Are the data on virtualized servers?
Yes No
Yes No
Yes No
Yes No
Yes No
Yes No
Yes No
Yes No
Tape Hard Drive Other
Excerpts taken from “Guidelines for Outsourcing Records Storage To The Cloud” by ARMA International

More Related Content

What's hot

Repositories for long-term preservation - certification
Repositories for long-term preservation - certificationRepositories for long-term preservation - certification
Repositories for long-term preservation - certificationEOSC-hub project
 
Complying with EPSRC policy: An LSHTM case study
Complying with EPSRC policy: An LSHTM case studyComplying with EPSRC policy: An LSHTM case study
Complying with EPSRC policy: An LSHTM case studyGarethKnight
 
Managing Your Research Data for Maximum Impact -Rob Daley 300616_Shared
Managing Your Research Data for Maximum Impact -Rob Daley 300616_SharedManaging Your Research Data for Maximum Impact -Rob Daley 300616_Shared
Managing Your Research Data for Maximum Impact -Rob Daley 300616_SharedRob Daley
 
A privacy leakage upper bound constraint based approach for cost-effective pr...
A privacy leakage upper bound constraint based approach for cost-effective pr...A privacy leakage upper bound constraint based approach for cost-effective pr...
A privacy leakage upper bound constraint based approach for cost-effective pr...JPINFOTECH JAYAPRAKASH
 
Data sharing in EOSC-hub: perspectives on “sensitive” data
Data sharing in EOSC-hub: perspectives on “sensitive” dataData sharing in EOSC-hub: perspectives on “sensitive” data
Data sharing in EOSC-hub: perspectives on “sensitive” dataEOSC-hub project
 
Keynote session – Mitigate risks and stay compliant with Chris Bridgland and ...
Keynote session – Mitigate risks and stay compliant with Chris Bridgland and ...Keynote session – Mitigate risks and stay compliant with Chris Bridgland and ...
Keynote session – Mitigate risks and stay compliant with Chris Bridgland and ...Veritas Technologies LLC
 
Securing, storing and enabling safe access to data
Securing, storing and enabling safe access to dataSecuring, storing and enabling safe access to data
Securing, storing and enabling safe access to dataRobin Rice
 
Protecting Innovation Through Next Generation Enterprise File Sharing
Protecting Innovation Through Next Generation Enterprise File SharingProtecting Innovation Through Next Generation Enterprise File Sharing
Protecting Innovation Through Next Generation Enterprise File SharingIntralinks
 
Expanded top ten_big_data_security_and_privacy_challenges
Expanded top ten_big_data_security_and_privacy_challengesExpanded top ten_big_data_security_and_privacy_challenges
Expanded top ten_big_data_security_and_privacy_challengesTom Kirby
 
Design and implementation of a solution for remote data protection in safety-...
Design and implementation of a solution for remote data protection in safety-...Design and implementation of a solution for remote data protection in safety-...
Design and implementation of a solution for remote data protection in safety-...davidepiccardi
 
eDiscovery platform EMEA user conference 2017
eDiscovery platform EMEA user conference 2017eDiscovery platform EMEA user conference 2017
eDiscovery platform EMEA user conference 2017Veritas Technologies LLC
 
II-PIC 2017: Patent Information User Group PIUG
II-PIC 2017: Patent Information User Group PIUGII-PIC 2017: Patent Information User Group PIUG
II-PIC 2017: Patent Information User Group PIUGDr. Haxel Consult
 

What's hot (14)

Repositories for long-term preservation - certification
Repositories for long-term preservation - certificationRepositories for long-term preservation - certification
Repositories for long-term preservation - certification
 
LocationTech Data Commons
LocationTech Data CommonsLocationTech Data Commons
LocationTech Data Commons
 
Complying with EPSRC policy: An LSHTM case study
Complying with EPSRC policy: An LSHTM case studyComplying with EPSRC policy: An LSHTM case study
Complying with EPSRC policy: An LSHTM case study
 
Managing Your Research Data for Maximum Impact -Rob Daley 300616_Shared
Managing Your Research Data for Maximum Impact -Rob Daley 300616_SharedManaging Your Research Data for Maximum Impact -Rob Daley 300616_Shared
Managing Your Research Data for Maximum Impact -Rob Daley 300616_Shared
 
DDI Data Description Statistics Protection Software
DDI Data Description Statistics Protection SoftwareDDI Data Description Statistics Protection Software
DDI Data Description Statistics Protection Software
 
A privacy leakage upper bound constraint based approach for cost-effective pr...
A privacy leakage upper bound constraint based approach for cost-effective pr...A privacy leakage upper bound constraint based approach for cost-effective pr...
A privacy leakage upper bound constraint based approach for cost-effective pr...
 
Data sharing in EOSC-hub: perspectives on “sensitive” data
Data sharing in EOSC-hub: perspectives on “sensitive” dataData sharing in EOSC-hub: perspectives on “sensitive” data
Data sharing in EOSC-hub: perspectives on “sensitive” data
 
Keynote session – Mitigate risks and stay compliant with Chris Bridgland and ...
Keynote session – Mitigate risks and stay compliant with Chris Bridgland and ...Keynote session – Mitigate risks and stay compliant with Chris Bridgland and ...
Keynote session – Mitigate risks and stay compliant with Chris Bridgland and ...
 
Securing, storing and enabling safe access to data
Securing, storing and enabling safe access to dataSecuring, storing and enabling safe access to data
Securing, storing and enabling safe access to data
 
Protecting Innovation Through Next Generation Enterprise File Sharing
Protecting Innovation Through Next Generation Enterprise File SharingProtecting Innovation Through Next Generation Enterprise File Sharing
Protecting Innovation Through Next Generation Enterprise File Sharing
 
Expanded top ten_big_data_security_and_privacy_challenges
Expanded top ten_big_data_security_and_privacy_challengesExpanded top ten_big_data_security_and_privacy_challenges
Expanded top ten_big_data_security_and_privacy_challenges
 
Design and implementation of a solution for remote data protection in safety-...
Design and implementation of a solution for remote data protection in safety-...Design and implementation of a solution for remote data protection in safety-...
Design and implementation of a solution for remote data protection in safety-...
 
eDiscovery platform EMEA user conference 2017
eDiscovery platform EMEA user conference 2017eDiscovery platform EMEA user conference 2017
eDiscovery platform EMEA user conference 2017
 
II-PIC 2017: Patent Information User Group PIUG
II-PIC 2017: Patent Information User Group PIUGII-PIC 2017: Patent Information User Group PIUG
II-PIC 2017: Patent Information User Group PIUG
 

Similar to Vendor-Checklist

Shared responsibility - a model for good cloud security
Shared responsibility - a model for good cloud securityShared responsibility - a model for good cloud security
Shared responsibility - a model for good cloud securityJisc
 
Finding Your Ideal Data Architecture: Data Fabric, Data Mesh or Both?
Finding Your Ideal Data Architecture: Data Fabric, Data Mesh or Both?Finding Your Ideal Data Architecture: Data Fabric, Data Mesh or Both?
Finding Your Ideal Data Architecture: Data Fabric, Data Mesh or Both?Denodo
 
Gdpr questions for compliance difficulties
Gdpr questions for compliance difficultiesGdpr questions for compliance difficulties
Gdpr questions for compliance difficultiesSteven Meister
 
Shared responsibility - a model for good cloud security
Shared responsibility - a model for good cloud securityShared responsibility - a model for good cloud security
Shared responsibility - a model for good cloud securityAndy Powell
 
Your Data is Waiting. What are the Top 5 Trends for Data in 2022? (ASEAN)
Your Data is Waiting. What are the Top 5 Trends for Data in 2022? (ASEAN)Your Data is Waiting. What are the Top 5 Trends for Data in 2022? (ASEAN)
Your Data is Waiting. What are the Top 5 Trends for Data in 2022? (ASEAN)Denodo
 
How the Journey to Modern Data Management is Paved with an Inclusive Edge-to-...
How the Journey to Modern Data Management is Paved with an Inclusive Edge-to-...How the Journey to Modern Data Management is Paved with an Inclusive Edge-to-...
How the Journey to Modern Data Management is Paved with an Inclusive Edge-to-...Dana Gardner
 
A proposed Solution: Data Availability and Error Correction in Cloud Computing
A proposed Solution: Data Availability and Error Correction in Cloud ComputingA proposed Solution: Data Availability and Error Correction in Cloud Computing
A proposed Solution: Data Availability and Error Correction in Cloud ComputingCSCJournals
 
The most trusted, proven enterprise-class Cloud:Closer than you think
The most trusted, proven enterprise-class Cloud:Closer than you think The most trusted, proven enterprise-class Cloud:Closer than you think
The most trusted, proven enterprise-class Cloud:Closer than you think Uni Systems S.M.S.A.
 
How Global Data Availability Accelerates Collaboration And Delivers Business ...
How Global Data Availability Accelerates Collaboration And Delivers Business ...How Global Data Availability Accelerates Collaboration And Delivers Business ...
How Global Data Availability Accelerates Collaboration And Delivers Business ...Dana Gardner
 
State of the Cloud and Data Centers 2014
State of the Cloud and Data Centers 2014State of the Cloud and Data Centers 2014
State of the Cloud and Data Centers 2014Digital Realty
 
PROTECT YOUR DIGITAL ASSETS WITH DRM CONTROLS!
 PROTECT YOUR DIGITAL ASSETS WITH DRM CONTROLS! PROTECT YOUR DIGITAL ASSETS WITH DRM CONTROLS!
PROTECT YOUR DIGITAL ASSETS WITH DRM CONTROLS!Home
 
Streamline your data security with user-friendly DRM controls.
Streamline your data security with user-friendly DRM controls.Streamline your data security with user-friendly DRM controls.
Streamline your data security with user-friendly DRM controls.Home
 
Effortless Data Security: Unlock the Power of DRM in Virtual Data Rooms
Effortless Data Security: Unlock the Power of DRM in Virtual Data RoomsEffortless Data Security: Unlock the Power of DRM in Virtual Data Rooms
Effortless Data Security: Unlock the Power of DRM in Virtual Data RoomsHome
 
Elevate Data Protection: Embrace DRM in Virtual Data Rooms
Elevate Data Protection: Embrace DRM in Virtual Data RoomsElevate Data Protection: Embrace DRM in Virtual Data Rooms
Elevate Data Protection: Embrace DRM in Virtual Data RoomsHome
 
Achieve regulatory compliance effortlessly with DRM controls. Simplify your c...
Achieve regulatory compliance effortlessly with DRM controls. Simplify your c...Achieve regulatory compliance effortlessly with DRM controls. Simplify your c...
Achieve regulatory compliance effortlessly with DRM controls. Simplify your c...Home
 

Similar to Vendor-Checklist (20)

Shared responsibility - a model for good cloud security
Shared responsibility - a model for good cloud securityShared responsibility - a model for good cloud security
Shared responsibility - a model for good cloud security
 
Finding Your Ideal Data Architecture: Data Fabric, Data Mesh or Both?
Finding Your Ideal Data Architecture: Data Fabric, Data Mesh or Both?Finding Your Ideal Data Architecture: Data Fabric, Data Mesh or Both?
Finding Your Ideal Data Architecture: Data Fabric, Data Mesh or Both?
 
Gdpr questions for compliance difficulties
Gdpr questions for compliance difficultiesGdpr questions for compliance difficulties
Gdpr questions for compliance difficulties
 
Shared responsibility - a model for good cloud security
Shared responsibility - a model for good cloud securityShared responsibility - a model for good cloud security
Shared responsibility - a model for good cloud security
 
Your Data is Waiting. What are the Top 5 Trends for Data in 2022? (ASEAN)
Your Data is Waiting. What are the Top 5 Trends for Data in 2022? (ASEAN)Your Data is Waiting. What are the Top 5 Trends for Data in 2022? (ASEAN)
Your Data is Waiting. What are the Top 5 Trends for Data in 2022? (ASEAN)
 
How the Journey to Modern Data Management is Paved with an Inclusive Edge-to-...
How the Journey to Modern Data Management is Paved with an Inclusive Edge-to-...How the Journey to Modern Data Management is Paved with an Inclusive Edge-to-...
How the Journey to Modern Data Management is Paved with an Inclusive Edge-to-...
 
Today's Need To Manage The Storage Polymorphism
Today's Need To Manage The Storage PolymorphismToday's Need To Manage The Storage Polymorphism
Today's Need To Manage The Storage Polymorphism
 
A proposed Solution: Data Availability and Error Correction in Cloud Computing
A proposed Solution: Data Availability and Error Correction in Cloud ComputingA proposed Solution: Data Availability and Error Correction in Cloud Computing
A proposed Solution: Data Availability and Error Correction in Cloud Computing
 
Netmagic the-storage-matrix
Netmagic the-storage-matrixNetmagic the-storage-matrix
Netmagic the-storage-matrix
 
The storage matrix netmagic
The storage matrix   netmagicThe storage matrix   netmagic
The storage matrix netmagic
 
The most trusted, proven enterprise-class Cloud:Closer than you think
The most trusted, proven enterprise-class Cloud:Closer than you think The most trusted, proven enterprise-class Cloud:Closer than you think
The most trusted, proven enterprise-class Cloud:Closer than you think
 
How Global Data Availability Accelerates Collaboration And Delivers Business ...
How Global Data Availability Accelerates Collaboration And Delivers Business ...How Global Data Availability Accelerates Collaboration And Delivers Business ...
How Global Data Availability Accelerates Collaboration And Delivers Business ...
 
Disaster recovery toolkit final version
Disaster recovery toolkit final versionDisaster recovery toolkit final version
Disaster recovery toolkit final version
 
State of the Cloud and Data Centers 2014
State of the Cloud and Data Centers 2014State of the Cloud and Data Centers 2014
State of the Cloud and Data Centers 2014
 
Data Fabrics.pptx
Data Fabrics.pptxData Fabrics.pptx
Data Fabrics.pptx
 
PROTECT YOUR DIGITAL ASSETS WITH DRM CONTROLS!
 PROTECT YOUR DIGITAL ASSETS WITH DRM CONTROLS! PROTECT YOUR DIGITAL ASSETS WITH DRM CONTROLS!
PROTECT YOUR DIGITAL ASSETS WITH DRM CONTROLS!
 
Streamline your data security with user-friendly DRM controls.
Streamline your data security with user-friendly DRM controls.Streamline your data security with user-friendly DRM controls.
Streamline your data security with user-friendly DRM controls.
 
Effortless Data Security: Unlock the Power of DRM in Virtual Data Rooms
Effortless Data Security: Unlock the Power of DRM in Virtual Data RoomsEffortless Data Security: Unlock the Power of DRM in Virtual Data Rooms
Effortless Data Security: Unlock the Power of DRM in Virtual Data Rooms
 
Elevate Data Protection: Embrace DRM in Virtual Data Rooms
Elevate Data Protection: Embrace DRM in Virtual Data RoomsElevate Data Protection: Embrace DRM in Virtual Data Rooms
Elevate Data Protection: Embrace DRM in Virtual Data Rooms
 
Achieve regulatory compliance effortlessly with DRM controls. Simplify your c...
Achieve regulatory compliance effortlessly with DRM controls. Simplify your c...Achieve regulatory compliance effortlessly with DRM controls. Simplify your c...
Achieve regulatory compliance effortlessly with DRM controls. Simplify your c...
 

Vendor-Checklist

  • 1. 3) How long has the vendor been providing cloud based services? Checklist For Choosing Digital Disaster Recovery Service Providers When beginning the search for an information management vendor, it pays off in the long run to keep your needs at the forefront of the conversation. To help with this goal, The Data Vault has put together a handy checklist of some of the most common requirements we see on a regular basis; hopefully it will allow you to easily compare and contrast the various options available on the market. 1) Where are the vendor’s physical servers located? 4) Can the vendor provide international diversification, with hubs in geographical locations? 2) How long has the vendor been in business? 5) Can the vendor provide public, private, and hybrid cloud environments? 6) Can the vendor separate data depending on the data type? 8) Is data encrypted when using a public cloud environment? 7) Does the vendor have a firewall that will adequately address security needs? Yes No Public Private Hybrid Yes No Yes No Yes No 9) Does the vendor offer redundant systems? Yes No
  • 2. 12) Is the data center location secure with system to provide authorized access? 10) Does the vendor have redundant internet connections? Yes No 13) Is the data center located near known or potential hazards? 14) Will data be stored so that it is segregated from other organization’s data? 15) Has the vendor’s backup strategy been reviewed? 16) Is backup done using disk to disk or magnetic tapes or other methods? 17) Can the vendor demonstrate a business continuity plan? 18) Are business critical applications being hosted? 19) Is the data center designed around a virtualized environment? 20) Are the data on virtualized servers? Yes No Yes No Yes No Yes No Yes No Yes No Yes No Yes No Tape Hard Drive Other Excerpts taken from “Guidelines for Outsourcing Records Storage To The Cloud” by ARMA International