{"id":85734,"date":"2024-08-24T16:25:52","date_gmt":"2024-08-24T08:25:52","guid":{"rendered":"https:\/\/version-2.com\/?p=85734"},"modified":"2024-08-20T16:29:22","modified_gmt":"2024-08-20T08:29:22","slug":"top-10-considerations-for-a-recovery-solution-rfp","status":"publish","type":"post","link":"https:\/\/version-2.com\/en\/2024\/08\/top-10-considerations-for-a-recovery-solution-rfp\/","title":{"rendered":"Top 10 considerations for a recovery solution RFP"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"85734\" class=\"elementor elementor-85734\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-24c3f9c1 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"24c3f9c1\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-4c6ecd87\" data-id=\"4c6ecd87\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-123ce05e elementor-widget elementor-widget-text-editor\" data-id=\"123ce05e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><img fetchpriority=\"high\" decoding=\"async\" class=\"alignnone size-medium\" src=\"https:\/\/images.prismic.io\/keep-it\/ZrskeEaF0TcGI4vt_backup-checklist-rfp-esg-75.png?auto=format,compress&amp;rect=0,0,1203,1203&amp;w=800&amp;h=800\" width=\"800\" height=\"800\" \/><\/p><div class=\"section\"><p>As we all know, the threat of ransomware continues to grow, and so does the importance of ensuring that your business remains resilient and prepared to respond to and recover from ransomware attacks. To help you with your ransomware readiness, ESG (Enterprise Strategy Group) has created \u201cThe Ransomware Preparedness Top Ten Recovery Solution RFP\u201d in their report focused on ransomware readiness and cyber resilience.<\/p><p>Here\u2019s what they find are the 10 most important considerations when selecting solutions for data recovery, which will help you shortlist potential data backup and recovery platforms.<\/p><p><b>Vendor selection checklist key considerations:<\/b><\/p><p>1.\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Data encryption (at rest and\/or in flight)<\/p><p>2.\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Ability to protect SaaS data<\/p><p>3.\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Ability to detect ransomware in data copies\/backups<\/p><p>4.\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Integrated cloud services capabilities<\/p><p>5.\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Ability to recover to any point or location<\/p><p>6.\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Ability to protect endpoint devices<\/p><p>7.\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Ability to protect virtual machines<\/p><p>8.\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 End-to-end recovery services<\/p><p>9.\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Protected\/immutable data copies\/backups<\/p><p>10.\u00a0\u00a0 Continuous data protection\/replication\/journaling<\/p><p><img decoding=\"async\" class=\"alignnone size-medium\" src=\"https:\/\/images.prismic.io\/keep-it\/ZrsmCUaF0TcGI4wz_top-10.png?auto=format,compress&amp;w=1640\" width=\"1640\" height=\"613\" \/><\/p><p>Understanding these factors will help guide you toward writing a more effective proposal and to evaluate and select the most effective backup and recovery services for your organization&#8217;s needs. Let\u2019s look a bit more deeply into each of them.<\/p><p><a href=\"https:\/\/lp.keepit.com\/esg-ransomware-study?&amp;_gl=1*onlab1*_gcl_au*NzA0MDE1NjI0LjE3MTg2OTU4MzY.*_ga*MTA3NzI3MjY1Mi4xNzE4Njk1ODM2*_ga_QN4TJ1NCZ3*MTcyNDE0MjMwOC4xOS4xLjE3MjQxNDI0NDEuNjAuMC4w*_fplc*U29ydmRRUDFQWU8yNDZMWEUyMDBxRk43V2dpakNEbjUyVlZUMGVXWXE0dUdTUDJtbTBsbmdLb3AzeE9rcm1XRyUyRjdJRVpKMHQ2bXlieGVXWlRHMGhVMXlIYlVqSzI4YTZUbEh1NlV0aTI5UjRyd0Q0RmFKcXVQMnd4YTNmS2clM0QlM0Q.\" target=\"_blank\" rel=\"noopener\"><strong>Read the full ESG report<\/strong><\/a><\/p><p>\u00a0<\/p><\/div><div class=\"section\"><h2>Top 10 considerations for ransomware recovery solutions<\/h2><p>Creating an RFP (request for proposal) for ransomware recovery solutions is a critical task, so let&#8217;s expand a bit on why each pointer ESG has identified is important and also add some key considerations that can be included to help you build the best protection portfolio for your specific needs.<\/p><p>Of course, before you can do so, you need to evaluate which data has value to your business and is most critical to back up since no single solution does everything. For instance, those solutions focusing on on-prem VM aren\u2019t going to be able to cover all SaaS. Likewise, if a solution is optimized for cloud data, it\u2019s not going to be strong for on-prem configurations. So, considering your specific data protection needs beforehand will help you have the right tool for the right job:<\/p><h4><b>1. Data encryption (at rest and\/or in flight)<\/b><\/h4><p><b>Importance:<\/b> Data encryption is crucial for protecting sensitive information from unauthorized access and ensuring data integrity. Encryption at rest protects data stored on disks and storage devices, while encryption in flight secures data during transmission.<\/p><p><b>Considerations:<\/b><\/p><p>\u2022 Encryption standards: Specify the encryption algorithms (e.g., AES-256) and protocols (e.g., TLS, SSL) that the solution must support.<\/p><p>\u2022 Key management: Detail the requirements for key management practices, including generation, storage, rotation, and destruction.<\/p><p>\u2022 Compliance: Ensure the solution meets industry standards and regulatory requirements (e.g., GDPR, HIPAA).<\/p><p>\u2022 Performance impact: Evaluate the impact of encryption on system performance and backup\/recovery speeds.<\/p><h4><b>2. Ability to protect SaaS data<\/b><\/h4><p><b>Importance: <\/b>With the increasing adoption of SaaS applications, more and more business-essential data is stored in SaaS applications, therefore ensuring the protection and backup of data hosted in the cloud is vital for business continuity, compliance, and more.<\/p><p><b>Considerations:<\/b><\/p><p>\u2022 SaaS integrations: Identify specific SaaS applications (e.g., Office 365, Salesforce) and ensure the solution supports seamless integration.<\/p><p>\u2022 API support: Ensure the solution can interact with SaaS APIs for automated backup and recovery.<\/p><p>\u2022 Data ownership: Clarify data ownership and access rights in the context of SaaS providers&#8217; terms of service.<\/p><p>\u2022 Recovery options: Provide details on how data can be restored, including granularity (e.g., individual items vs. entire datasets).<\/p><h4><b>3. Ability to detect ransomware in data copies\/backups<\/b><\/h4><p><b>Importance: <\/b>Early detection of ransomware within backup data can prevent the spread and mitigate damage.<\/p><p><b>Considerations:<\/b><\/p><p>\u2022 Anomaly detection: Ensure the solution includes advanced anomaly detection techniques to identify unusual patterns indicative of ransomware.<\/p><p>\u2022 Scanning tools: Integrate with malware scanning tools to analyze backup data.<\/p><p>\u2022 Monitoring\/notification systems: Set up real-time alerts for detected anomalies or potential ransomware activity.<\/p><p>\u2022 Historical analysis: Implement capabilities to review historical backup data for signs of previously undetected ransomware.<\/p><h4><b>4. Integrated cloud services capabilities<\/b><\/h4><p><b>Importance: <\/b>Leveraging cloud services for backup and recovery enhances scalability, reliability, and accessibility.<\/p><p><b>Considerations:<\/b><\/p><p>\u2022 Cloud providers: Specify preferred cloud providers (e.g., AWS, Azure, Google Cloud) and their service offerings, while also considering data protection best practices, such as air gapping in line with the 3-2-1 backup rule.<\/p><p>\u2022 Cost management: Tools for monitoring and managing cloud storage costs. Many providers have additional costs based on, e.g., consumption, egress\/ingress, retention, archiving departed users, and more.<\/p><p>\u2022 Disaster recovery: Utilize cloud for disaster recovery solutions with geographically dispersed data centers.<\/p><h4><b>5. Ability to recover to any point or location<\/b><\/h4><p><b>Importance:<\/b> Flexibility in recovery options ensures that data can be restored to different points in time or alternate locations as needed.<\/p><p><b>Considerations:<\/b><\/p><p>\u2022 Granularity: Support for granular recovery points (e.g., hourly, daily) to minimize data loss.<\/p><p>\u2022 Flexibility: The ability to prioritize and recover the most critical data first is vital for ensuring business continuity.<\/p><p>\u2022 Cross-platform recovery: Ensure compatibility across different platforms and environments. Multi-workload coverage from a single provider provides additional value.<\/p><p>\u2022 Testing: Regularly test recovery processes to ensure reliability.<\/p><p>\u2022 Failover mechanisms: Include automatic failover options for critical systems.<\/p><h4><b>6. Ability to protect endpoint devices<\/b><\/h4><p><b>Importance:<\/b> Endpoint devices are often the entry points for ransomware attacks. Protecting them is essential for overall security.<\/p><p><b>Considerations:<\/b><\/p><p>\u2022 Endpoint agents: Deploy lightweight agents on endpoints to monitor and protect against ransomware.<\/p><p>\u2022 Centralized management: Centralized dashboard for managing and monitoring endpoints.<\/p><p>\u2022 Data encryption: Ensure data on endpoints is encrypted.<\/p><p>\u2022 Backup frequency: Define how often endpoint data should be backed up.<\/p><h4><b>7. Ability to protect virtual machines<\/b><\/h4><p><b>Importance: <\/b>Virtual machines (VMs) are integral to modern IT environments. Their protection is critical for maintaining business continuity.<\/p><p><b>Considerations:<\/b><\/p><p>\u2022 Hypervisor compatibility: Ensure support for major hypervisors (e.g., VMware, Hyper-V).<\/p><p>\u2022 Snapshot management: Use VM snapshots for efficient backup and recovery.<\/p><p>\u2022 Performance: Minimize performance impact during backup operations.<\/p><p>\u2022 Disaster recovery: Integrate with DR solutions for automated VM recovery.<\/p><h4><b>8. End-to-end recovery services<\/b><\/h4><p><b>Importance: <\/b>Comprehensive recovery services ensure that all aspects of data and system restoration are covered.<\/p><p><b>Considerations:<\/b><\/p><p>\u2022 Service levels: Define SLAs for recovery time and recovery point objectives.<\/p><p>\u2022 Support: 24\/7 support and clear escalation paths.<\/p><p>\u2022 Testing and validation: Regularly test recovery processes and validate data integrity.<\/p><p>\u2022 Documentation: Detailed documentation of recovery procedures and guidelines.<\/p><h4><b>9. Protected\/immutable data copies\/backups<\/b><\/h4><p><b>Importance: <\/b>Immutable backups cannot be altered, deleted, or encrypted by ransomware, ensuring data safety.<\/p><p><b>Considerations:<\/b><\/p><p>\u2022 Immutability features: Implement write-once-read-many (WORM) technology.<\/p><p>\u2022 Retention policies: Define retention periods for immutable backups.<\/p><p>\u2022 Access controls: Restrict access to backup data to prevent tampering.<\/p><p>\u2022 Storage solutions: Use storage solutions that support immutability.<\/p><h4><b>10. Continuous data protection\/replication\/journaling<\/b><\/h4><p><b>Importance: <\/b>Continuous data protection (CDP) and replication ensure minimal data loss and quick recovery.<\/p><p><b>Considerations:<\/b><\/p><p>\u2022 Replication methods: Choose between synchronous and asynchronous replication based on requirements.<\/p><p>\u2022 Data journaling: Implement journaling to track and store changes for quick rollback.<\/p><p>\u2022 Network bandwidth: Optimize replication processes to minimize network bandwidth usage.<\/p><p>\u2022 Recovery flexibility: Provide options for rolling back to specific points in time.<\/p><h2>Conclusion<\/h2><p>By addressing these key areas in your RFP, you&#8217;ll be better equipped to evaluate vendors and select a ransomware recovery solution that meets your organization&#8217;s specific needs. This comprehensive approach will help ensure the robustness and reliability of your data protection strategies. Ultimately, understanding your overall security structure will help you understand which tools you\u2019ll need to use.<\/p><p>\u00a0<\/p><p>This blog article is part of a series of articles on ransomware resilience and the key role data protection plays in ensuring business continuity. Below are the three other related articles in the series for further reading.<\/p><p>To continue learning more about ransomware backup protection, watch our on-demand webinar.<\/p><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-0c5768c elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"0c5768c\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;9abbb0a&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-e987c36\" data-id=\"e987c36\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-73b3a92 elementor-widget elementor-widget-shortcode\" data-id=\"73b3a92\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18103\" class=\"elementor elementor-18103\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a437045 elementor-widget elementor-widget-image-box\" data-id=\"a437045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">About Version 2 Digital<\/h3><p class=\"elementor-image-box-description\">Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.\n<br><br>\nThrough an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"50842\" class=\"elementor elementor-50842\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-c1043a3 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"c1043a3\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-c911d7d\" data-id=\"c911d7d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-026fa41 elementor-widget elementor-widget-text-editor\" data-id=\"026fa41\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>About Keepit<\/strong><br \/>At Keepit, we believe in a digital future where all software is delivered as a service. Keepit\u2019s mission is to protect data in the cloud Keepit is a software company specializing in Cloud-to-Cloud data backup and recovery. Deriving from +20 year experience in building best-in-class data protection and hosting services, Keepit is pioneering the way to secure and protect cloud data at scale.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-6b9e9a6 elementor-section-stretched elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"6b9e9a6\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;2f005fd&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}],&quot;background_background&quot;:&quot;classic&quot;,&quot;stretch_section&quot;:&quot;section-stretched&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-061e906\" data-id=\"061e906\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8c30adc elementor-widget elementor-widget-spacer\" data-id=\"8c30adc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>As we all know, the threat of ransomware continues to g [&hellip;]<\/p>","protected":false},"author":149011790,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[853,1273,61],"tags":[854,1272],"class_list":["post-85734","post","type-post","status-publish","format-standard","hentry","category-keepit","category-1273","category-press-release","tag-keepit","tag-1272"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Top 10 considerations for a recovery solution RFP - Version 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.keepit.com\/blog\/esg-vendor-selection-top-10\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Top 10 considerations for a recovery solution RFP - Version 2\" \/>\n<meta property=\"og:description\" content=\"As we all know, the threat of ransomware continues to g [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.keepit.com\/blog\/esg-vendor-selection-top-10\/\" \/>\n<meta property=\"og:site_name\" content=\"Version 2\" \/>\n<meta property=\"article:published_time\" content=\"2024-08-24T08:25:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/images.prismic.io\/keep-it\/ZrskeEaF0TcGI4vt_backup-checklist-rfp-esg-75.png?auto=format,compress&amp;rect=0,0,1203,1203&amp;w=800&amp;h=800\" \/>\n<meta name=\"author\" content=\"tracylamv2\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"tracylamv2\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.keepit.com\\\/blog\\\/esg-vendor-selection-top-10\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2024\\\/08\\\/top-10-considerations-for-a-recovery-solution-rfp\\\/\"},\"author\":{\"name\":\"tracylamv2\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\"},\"headline\":\"Top 10 considerations for a recovery solution RFP\",\"datePublished\":\"2024-08-24T08:25:52+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2024\\\/08\\\/top-10-considerations-for-a-recovery-solution-rfp\\\/\"},\"wordCount\":1254,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.keepit.com\\\/blog\\\/esg-vendor-selection-top-10\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/images.prismic.io\\\/keep-it\\\/ZrskeEaF0TcGI4vt_backup-checklist-rfp-esg-75.png?auto=format,compress&amp;rect=0,0,1203,1203&amp;w=800&amp;h=800\",\"keywords\":[\"Keepit\",\"2024\"],\"articleSection\":[\"Keepit\",\"2024\",\"Press Release\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.keepit.com\\\/blog\\\/esg-vendor-selection-top-10\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2024\\\/08\\\/top-10-considerations-for-a-recovery-solution-rfp\\\/\",\"url\":\"https:\\\/\\\/www.keepit.com\\\/blog\\\/esg-vendor-selection-top-10\\\/\",\"name\":\"Top 10 considerations for a recovery solution RFP - Version 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.keepit.com\\\/blog\\\/esg-vendor-selection-top-10\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.keepit.com\\\/blog\\\/esg-vendor-selection-top-10\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/images.prismic.io\\\/keep-it\\\/ZrskeEaF0TcGI4vt_backup-checklist-rfp-esg-75.png?auto=format,compress&amp;rect=0,0,1203,1203&amp;w=800&amp;h=800\",\"datePublished\":\"2024-08-24T08:25:52+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.keepit.com\\\/blog\\\/esg-vendor-selection-top-10\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.keepit.com\\\/blog\\\/esg-vendor-selection-top-10\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.keepit.com\\\/blog\\\/esg-vendor-selection-top-10\\\/#primaryimage\",\"url\":\"https:\\\/\\\/images.prismic.io\\\/keep-it\\\/ZrskeEaF0TcGI4vt_backup-checklist-rfp-esg-75.png?auto=format,compress&amp;rect=0,0,1203,1203&amp;w=800&amp;h=800\",\"contentUrl\":\"https:\\\/\\\/images.prismic.io\\\/keep-it\\\/ZrskeEaF0TcGI4vt_backup-checklist-rfp-esg-75.png?auto=format,compress&amp;rect=0,0,1203,1203&amp;w=800&amp;h=800\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.keepit.com\\\/blog\\\/esg-vendor-selection-top-10\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\\\/\\\/version-2.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Top 10 considerations for a recovery solution RFP\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"name\":\"Version 2\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/version-2.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\",\"name\":\"Version 2\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"width\":1795,\"height\":335,\"caption\":\"Version 2\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\",\"name\":\"tracylamv2\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"caption\":\"tracylamv2\"},\"url\":\"https:\\\/\\\/version-2.com\\\/en\\\/author\\\/tracylamv2\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Top 10 considerations for a recovery solution RFP - Version 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.keepit.com\/blog\/esg-vendor-selection-top-10\/","og_locale":"en_US","og_type":"article","og_title":"Top 10 considerations for a recovery solution RFP - Version 2","og_description":"As we all know, the threat of ransomware continues to g [&hellip;]","og_url":"https:\/\/www.keepit.com\/blog\/esg-vendor-selection-top-10\/","og_site_name":"Version 2","article_published_time":"2024-08-24T08:25:52+00:00","og_image":[{"url":"https:\/\/images.prismic.io\/keep-it\/ZrskeEaF0TcGI4vt_backup-checklist-rfp-esg-75.png?auto=format,compress&amp;rect=0,0,1203,1203&amp;w=800&amp;h=800","type":"","width":"","height":""}],"author":"tracylamv2","twitter_card":"summary_large_image","twitter_misc":{"Written by":"tracylamv2","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.keepit.com\/blog\/esg-vendor-selection-top-10\/#article","isPartOf":{"@id":"https:\/\/version-2.com\/2024\/08\/top-10-considerations-for-a-recovery-solution-rfp\/"},"author":{"name":"tracylamv2","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365"},"headline":"Top 10 considerations for a recovery solution RFP","datePublished":"2024-08-24T08:25:52+00:00","mainEntityOfPage":{"@id":"https:\/\/version-2.com\/2024\/08\/top-10-considerations-for-a-recovery-solution-rfp\/"},"wordCount":1254,"commentCount":0,"publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"image":{"@id":"https:\/\/www.keepit.com\/blog\/esg-vendor-selection-top-10\/#primaryimage"},"thumbnailUrl":"https:\/\/images.prismic.io\/keep-it\/ZrskeEaF0TcGI4vt_backup-checklist-rfp-esg-75.png?auto=format,compress&amp;rect=0,0,1203,1203&amp;w=800&amp;h=800","keywords":["Keepit","2024"],"articleSection":["Keepit","2024","Press Release"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.keepit.com\/blog\/esg-vendor-selection-top-10\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/version-2.com\/2024\/08\/top-10-considerations-for-a-recovery-solution-rfp\/","url":"https:\/\/www.keepit.com\/blog\/esg-vendor-selection-top-10\/","name":"Top 10 considerations for a recovery solution RFP - Version 2","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.keepit.com\/blog\/esg-vendor-selection-top-10\/#primaryimage"},"image":{"@id":"https:\/\/www.keepit.com\/blog\/esg-vendor-selection-top-10\/#primaryimage"},"thumbnailUrl":"https:\/\/images.prismic.io\/keep-it\/ZrskeEaF0TcGI4vt_backup-checklist-rfp-esg-75.png?auto=format,compress&amp;rect=0,0,1203,1203&amp;w=800&amp;h=800","datePublished":"2024-08-24T08:25:52+00:00","breadcrumb":{"@id":"https:\/\/www.keepit.com\/blog\/esg-vendor-selection-top-10\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.keepit.com\/blog\/esg-vendor-selection-top-10\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.keepit.com\/blog\/esg-vendor-selection-top-10\/#primaryimage","url":"https:\/\/images.prismic.io\/keep-it\/ZrskeEaF0TcGI4vt_backup-checklist-rfp-esg-75.png?auto=format,compress&amp;rect=0,0,1203,1203&amp;w=800&amp;h=800","contentUrl":"https:\/\/images.prismic.io\/keep-it\/ZrskeEaF0TcGI4vt_backup-checklist-rfp-esg-75.png?auto=format,compress&amp;rect=0,0,1203,1203&amp;w=800&amp;h=800"},{"@type":"BreadcrumbList","@id":"https:\/\/www.keepit.com\/blog\/esg-vendor-selection-top-10\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/version-2.com\/"},{"@type":"ListItem","position":2,"name":"Top 10 considerations for a recovery solution RFP"}]},{"@type":"WebSite","@id":"https:\/\/version-2.com\/zh\/#website","url":"https:\/\/version-2.com\/zh\/","name":"Version 2","description":"","publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/version-2.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/version-2.com\/zh\/#organization","name":"Version 2","url":"https:\/\/version-2.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","contentUrl":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","width":1795,"height":335,"caption":"Version 2"},"image":{"@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365","name":"tracylamv2","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","caption":"tracylamv2"},"url":"https:\/\/version-2.com\/en\/author\/tracylamv2\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQRKm-miO","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/85734","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/users\/149011790"}],"replies":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/comments?post=85734"}],"version-history":[{"count":4,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/85734\/revisions"}],"predecessor-version":[{"id":85738,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/85734\/revisions\/85738"}],"wp:attachment":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/media?parent=85734"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/categories?post=85734"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/tags?post=85734"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}