<img height="1" width="1" style="display: none" alt="" src="https://px.ads.linkedin.com/collect/?pid=1098858&amp;fmt=gif">
Back to all videos
What Is Continuity Escrow?

Discover what Continuity Escrow is and how it keeps your essential services online when payment disruptions threaten to take them offline. Codekeeper steps in to cover payments on your behalf — giving you up to 12 months of protected runway to resolve the issue without your customers ever noticing. Book a free consultation today.
Transcript
  1. 00:01 When your critical systems are at risk of going down, you have two options: recover after the failure, or prevent the failure from happening in the first place. Most companies plan for recovery. But what if you could guarantee continuity instead?
  2. 00:17 Our Continuity Escrow provides an operational continuity service that keeps your essential systems online when payment disruptions on hosting platforms, APIs, and third-party services threaten to take them offline.
  3. 00:28 It’s as simple as reporting a disruption, and we’ll activate your payment coverage. That way, you avoid service downtime altogether, no recovery necessary.
  4. 00:37 Let’s take a look at how Continuity Escrow works.
  5. 00:41 Step one: You and your vendors go over which hosted services and supporting dependencies are critical to your operations, and then agree on what will be covered under the arrangement. This ensures no crucial service gets left out, and that your business's future operational continuity is fully assured.
  6. 00:57 Step two: All relevant parties sign a coverage agreement with Codekeeper to lock in the discussed terms of the arrangement. The agreement defines exactly what services are covered, what qualifies as a payment disruption, and the full terms under which Codekeeper can step in. After an event is triggered, coverage runs for three months as standard, or up to twelve months with the extended plan. The goal is to give you enough time to resolve the underlying issue without any pressure to rush into a contract with a new provider.
  7. 01:24 Step three: The vendor, or technical team, uploads hosting environments and access materials to Codekeeper's secure vault. Depending on your situation, that normally covers cloud platforms, dedicated servers, containers, and deployment pipelines on one side, and login credentials, authentication tokens, admin permissions, and API keys on the other. You can also bring your critical upstream dependencies into the arrangement, so no missed payments outside of your infrastructure can cause a domino effect on your operations. 
  8. 01:56 Step four: Once your credentials and access materials are in our vault, we confirm that all provider details and account information are present and accounted for. This is included at no extra cost under our Validated tier, and you receive a certificate as proof. With Verified added, we’ll test admin login access to confirm your credentials will work when the need arises. And if you need more assurance, you can opt for our Certified tier, where we simulate service restoration to offer complete peace of mind.
  9. 02:23 Step five: When a payment disruption hits, you report it as soon as possible to Codekeeper. We then verify the disruption against the agreement terms and access the deposited credentials for the affected services. Simply put: We take over payments. Your services keep running. You never go offline.
  10. 02:42 Continuity Escrow keeps your business running through payment disruptions that would otherwise take you offline. It gives you a protected runway to look for long-term solutions without your customers ever noticing a dip in your services. Global regulatory frameworks including DORA, NIS2, and CPS 230 all require documented service continuity measures, and with Continuity Escrow you can meet them all.
  11. 03:04 If your business depends on external service uptime, Continuity Escrow is the right decision. Talk to our escrow specialists today about keeping your critical services protected.
  12. 03:16 Codekeeper — Software Resilience.

Let's build bulletproof software resilience together.