While we cannot build your BC plan for you*, we have extended our Communication FAILSAFE product to provide an interactive wizard to assist you in creating a plan that covers key areas, plus your CF tenant will be pre-populated with a set of Disaster Recover Templates.
*However, if you do require assistance, visit our partner page for experienced consultants who can assist you in your journey.
don't know your NIST from your ISO or NDRF? DOn't worry, the guide includes an overview of the standards, what they mean and why they matter.
The output of the Wizard is a document that which be shared with your stakeholders in the comfort of knowing this format has been successfully used by many organisations.
Build out contact tables and call trees utilizing pre-built email, WhatsApp and SMS templates, all delivered by Communication FAILSAFE.
Backup strategy, event classification, Alerts, Escalation Procedures, Media Tactics, Issue tracking and more.
DR in your Pocket is delivered in partnership between Nteraction and ZeroDown Software.
Please click the button below to ask your question or refer to our FAQs below.
Unfortunately Not. Whiel we can explain the different bodies and certifications, we cannot garner you automatic compliance. The Disaster Recovery plan and Communications platform are just a part of a fully compliant plan.
Communications FAILSAFE is a multi-channel communication platform external to your systems. It enables you to communicate with employees, vendors and customers via email, SMS and WhatsApp from a single interface.
There are many reasons. For a start, you may not have access to your email server at the time of a continuity event!
Secondarily, CF sends messages across multiple channels in parallel, so you are not restricted to email OR SMS.
CF doesn't send the rich content in the email or SMS, it instead send a link to a page, or even multiple pages, that you have built, starting from one of our templates. Far more information can be delivered on this page using video, text and image than can be contained in an email.
These pages can be secured using Two-Factor Authentication (2FA), ensuring the right recipient can see the correct information.
Lastly, CF tracks delivery, clicks, video plays, etc. down to the individual, so you know who has seen what and when.