Skip to content

Keepit 獲評 IDC MarketScape 2025-2026 年全球 SaaS 數據保護供應商評估領導者

丹麥哥本哈根 — 2025 年 12 月 16 日 — SaaS 數據保護公司 Keepit,今日宣布其在 IDC MarketScape:「2025-2026 年全球 SaaS 數據保護供應商評估」(文件編號 #US52971725,2025 年 12 月)中被評為領導者 (Leader)。

「我們建立 Keepit 是為了讓組織能夠控制他們的數據——無論發生什麼。我們相信被 IDC MarketScape 評為領導者,證實了我們架構的實力及其對客戶的影響。我們的獨立雲、不可變儲存以及對快速、直觀復原的專注,都反映了我們的信念:數據保護應該是簡單、安全並為未來做好準備的。」

— Frederik Schouboe,Keepit 聯合創始人兼首席遠見官 (Chief Visionary Officer)

Keepit 平台的覈心功能

Keepit 的定位植根於解決現代企業數據風險的關鍵平台差異化因素:

  • 供應商獨立的雲基礎設施: Keepit 在多個地區(歐盟、瑞士、英國、美國、加拿大、澳洲)營運其專用的雲中心。這確保了完全的數據主權,並消除了對公共雲供應商的儲存依賴。
  • 設計上不可變的架構: 專有的對象儲存使用類似區塊鏈的 Merkle 樹結構,保證了不可變的數據完整性。傳輸中和靜態數據的加密、邏輯氣隙隔離和異常偵測可進一步保護數據免受勒索軟體侵害。
  • 統一的多 SaaS 保護: 該平台為所有主要 SaaS 工作負載提供全面保護,包括 Microsoft 365、Entra ID、Salesforce、Google Workspace 和 Atlassian,所有這些都通過單一介面進行管理。
  • 進階復原和搜索: 諸如時間點快照、帶預覽的智能搜索以及跨用戶復原選項等功能旨在減少停機時間並在關鍵事件期間簡化災難復原。
  • 可預測、透明的定價: 基於席位的定價包括無限數據保留、零出口費用和無基於容量的收費。這消除了成本不確定性並簡化了預算編制。

專注於創新與獨立性

Keepit 通過擁有整個技術堆疊並避免第三方基礎設施來實現差異化。這種獨立性使公司能夠快速創新並滿足不斷變化的市場需求:

  • API 驅動、供應商中立的架構: 採用模組化設計,以便隨著業務需求的發展,快速接入新的 SaaS 應用程式。
  • 多租戶、MSP 就緒的功能: 包括針對託管服務供應商量身定制的白標和進階租戶管理功能,實現可擴展的服務交付。

Schouboe 補充道:「組織比以往任何時候都更依賴 SaaS,他們需要獨立、彈性且易於使用的保護。我們相信 IDC MarketScape 的認可強化了我們對提供一個滿足這些需求的平台的承諾——無論是在今天,還是在生態系統不斷演變的未來。」

 

關於 Keepit

Keepit 立足於為雲端時代提供新世代的 SaaS 資料保護。其核心理念是透過獨立於應用程式供應商的雲端儲存,為企業關鍵應用加上一道安全鎖,不僅強化網路韌性,更實現前瞻性的資料保護策略。其獨特、分隔且不可變的資料儲存設計,不涉及任何次級處理器,確保符合各地法規,有效抵禦勒索軟體等威脅,並保證關鍵資料隨時可存取、業務不中斷,以及快速高效的災難復原能力。總部位於丹麥哥本哈根的 Keepit,其辦公室與資料中心遍及全球,已贏得超過 15,000 家企業的深度信賴,客戶普遍讚譽其平台的直覺易用性,以及輕鬆、可靠的雲端資料備份與復原體驗。

About Version 2

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

ESET Threat Report: AI-driven attacks on the rise; NFC threats increase and evolve in sophistication

ESET Research has released its H2 2025 Threat Report with statistics from June through November 2025.
NFC threats have continued to evolve in scale and sophistication, with several notable upgrades and new malicious campaigns seen in H2 2025.
ESET observed several improvements in scams including higher-quality deepfakes, signs of AI-generated phishing sites, and short-lived ad campaigns to avoid detection.
Even though Lumma Stealer managed to come back after the May 2025 disruption, its detections declined by 86% in H2 2025.

BRATISLAVA — December 16, 2025 — ESET Research has released its latest Threat Report, which summarizes threat landscape trends seen in ESET telemetry and from the perspective of both ESET threat detection and research experts, from June through November 2025.  AI-powered malware moved from theory to reality in H2 2025, as ESET discovered PromptLock – the first known AI-driven ransomware, capable of generating malicious scripts on the fly. While AI is still mainly used for crafting convincing phishing and scam content, PromptLock – and the handful of other AI-driven threats identified to this day – signal a new era of threats.

“Fraudsters behind the Nomani investment scams have also refined their techniques – we have observed higher-quality deepfakes, signs of AI-generated phishing sites, and increasingly short-lived ad campaigns to avoid detection,” says Jiří Kropáč, Director of ESET Threat Prevention Labs. In ESET telemetry, detections of Nomani scams grew 62% year-over-year, with the trend declining slightly in H2 2025. Nomani scams have recently been expanding from Meta to other platforms, including YouTube.

On the ransomware scene, victim numbers surpassed 2024 totals well before year’s end, with ESET Research projections pointing to a 40% year-over-year increase. Akira and Qilin now dominate the ransomware-as-a-service market, while low-profile newcomer Warlock introduced innovative evasion techniques. EDR killers continued to proliferate, highlighting that endpoint detection and response tools remain a significant obstacle for ransomware operators.

On the mobile platform, NFC threats continued to grow in scale and sophistication, with an 87% increase in ESET telemetry and several notable upgrades and campaigns observed in H2 2025. NGate  – a pioneer among NFC threats, first discovered by ESET– received an upgrade in the form of contact stealing, likely laying the groundwork for future attacks. RatOn, entirely new malware on the NFC fraud scene, brought a rare fusion of remote access trojan (RAT) capabilities and NFC relay attacks, showing cybercriminals’ determination to pursue new attack avenues. RatOn was distributed through fake Google Play pages and ads mimicking an adult version of TikTok, and a digital bank ID service.  PhantomCard – new NGate-based malware adapted to the Brazilian market – was seen in multiple campaigns in Brazil in H2 2025.

Furthermore, after its global disruption in May, the Lumma Stealer infostealer managed to briefly resurface – twice – but its glory days are most likely over. Detections plummeted by 86% in H2 2025 compared to the first half of the year, and a significant distribution vector of Lumma Stealer – the HTML/FakeCaptcha trojan, used in ClickFix attacks – nearly vanished from ESET telemetry.

Meanwhile, CloudEyE, also known as GuLoader, surged into prominence, skyrocketing almost thirtyfold according to ESET telemetry. Distributed via malicious email campaigns, this malware-as-a-service downloader and cryptor is used to deploy other malware, including ransomware, as well as infostealer juggernauts such as Rescoms, Formbook, and Agent Tesla. Poland was most affected by this threat, with 32% of CloudEyE attack attempts in H2 2025 detected here.

For more information, check out the ESET Threat Report H2 2025 on WeLiveSecurity.com. Make sure to follow ESET Research on Twitter (today known as X), BlueSky, and Mastodon for the latest news from ESET Research.

 

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

FSLogix Deep Dive: The Ultimate VDI Configuration Guide (2025)

As a solution engineer who has been in the trenches with VDI and Terminal Servers since the days of Windows NT 4.0, I’ve seen profile management evolve from a chronic pain point to a solved problem. The solution? FSLogix.

Before Microsoft acquired it, FSLogix was the “secret weapon” that VDI architects used to fix the unfixable. Today, it’s the default, non-negotiable standard for any modern VDI or multi-session Windows deployment, especially Azure Virtual Desktop (AVD).

This deep-dive guide will cover its uses, advanced configurations, and best practices for building a resilient, high-performance deployment, including specific GPO settings for clustered environments.

The FSLogix Toolkit: What It Is and Why You Need It

At its core, FSLogix is a set of tools designed to decouple the user profile from the Windows operating system. In non-persistent VDI, where a user’s virtual machine is destroyed or reset at logoff, this is essential.

Instead of copying a roaming profile (which is slow, fragile, and a primary cause of slow logins), FSLogix mounts a user’s profile, stored in a VHDX (virtual disk) file on a network share, directly into the OS at login. It’s instant, seamless, and transparent to Windows.

The FSLogix suite includes:

  • Profile Container: This is the main component. It captures the entire user profile (C:\Users\<username>) and redirects it to the VHDX. This includes all app settings, registry keys (NTUSER.dat), and user data.
  • Office Container (ODFC): This component only redirects the data for Microsoft 365 apps (Outlook cache .ost, Teams data, OneDrive cache, etc.).
  • Application Masking: A powerful tool that allows you to “hide” applications, drivers, or fonts from specific users, even if they are installed on the base image. This dramatically simplifies “golden image” management.
  • Java Redirection: A niche component to manage multiple versions of Java for specific applications.

The Great Debate: Profile Container vs. ODFC

This is the most common point of confusion. Let’s be clear:

Best Practice: In 99% of new deployments, you should use only the Profile Container.

Do NOT use a separate Profile Container and a separate Office Container. This is a common-sense myth that adds complexity, doubles the VHDX files to manage, and increases points of failure.

The Profile Container already captures all Office data. The only reason ODFC exists as a separate component is for legacy environments that already have another profile solution (like Citrix UPM or VMware DEM) and just want to add FSLogix to fix Office performance.

In your Group Policy (GPO) or registry settings, you simply configure the Profile Container Enabled = 1 and ensure Office data is included.

FSLogix Cluster & GPO Configuration

FSLogix Clusters are fundamental for ensuring user profile persistence. In this model, each “cluster node” is typically a high-availability file server (like a Windows Server 2022 Scale-Out File Server) that provides dedicated, fault-tolerant storage for the dynamic profile VHDX files.

This guarantees session consistency across different VDI hosts. Configuration is applied and managed through GPOs (Group Policy Objects), ensuring standardization and centralized governance throughout the environment. Each VDI instance uses the FSLogix Agent to connect to the cluster share over SMB (port 445).

FSLogix Configuration Parameters (via GPO)

Here is a baseline set of GPO settings for a production environment. These settings are applied via GPO, which writes the corresponding values to the registry.

Find the detailed parameters on The following link: FSLogix Cluster Sizing and Configuration

Here is a copy-ready deep-dive on FSLogix, integrating your specific configuration parameters.

Advanced Optimization & Resilience

Getting the GPOs set is step one. Making it fly and never fail is step two.

1. Optimization: The Redirections.xml File

This is the most powerful optimization tool. The Redirections.xml file allows you to exclude “junk” data from being saved in the user’s profile container. By excluding data, you keep the VHDX small, logins fast, and network traffic low.

A good Redirections.xml file should exclude:

  • Browser caches (Chrome, Edge, Firefox)
  • Temp folders
  • Windows Search and Update logs
  • Teams cache (FSLogix now handles Teams data very well natively, but some still exclude the media-stack folder).

You place this file on your network share and point to it in your GPO using the RedirectionXMLSourceFolder setting.

2. Resilience: Antivirus Exclusions (Non-Negotiable)

This is the #1 cause of profile corruption and performance issues. Your VDI session hosts must exclude the FSLogix processes and file locations from real-time antivirus scanning.

Process Exclusions:

  • frxsvc.exe
  • frxshell.exe
  • frxccd.exe (if using Cloud Cache)

File/Directory Exclusions:

  • %ProgramFiles%\FSLogix
  • %APDATA%\FSLogix
  • The network share(s) where your VHDX files are stored.
  • File Extensions: .vhd, .vhdx

3. High Availability: Cloud Cache vs. Storage-Level HA

You have two main ways to achieve high availability.

Storage-Level HA (Your “Cluster” Model):

This is the easiest and most reliable method. You use a storage solution that is already highly available (like a Windows Server 2022 Scale-Out File Server, a cluster, or Azure Files ZRS). You then set a single path in VHDLocations. If a storage node fails, the storage cluster handles it transparently.

FSLogix Cloud Cache (Recommended for DR):

Cloud Cache is the FSLogix-native HA solution. You configure multiple storage locations (e.g., one on-prem, one in Azure). FSLogix writes to a local cache on the VDI host first, then asynchronously replicates changes to all storage locations. This is more complex but provides true active-active access and disaster recovery.

4. Network Settings: The Unsung Hero

Your VDI session hosts and your file server must be as close as possible.

  • Same Datacenter/Region: Never route core FSLogix traffic over a WAN.
  • Same Subnet (Zero Latency): FSLogix traffic (SMB/445) is highly sensitive to latency. Place your VDI session hosts (clients) and your FSLogix file share on the same subnet. This eliminates any firewall, router, or traffic inspection device from the data path. Even a tiny delay from a firewall policy check can cause login slowdowns and profile hangs.
  • Enable SMB Multichannel: Allows Windows to use multiple network connections to your file share, increasing throughput and resiliency.

Expert Tips: FSLogix with Thinfinity VDI on OCI

This is a great, modern stack. Thinfinity is a VDI broker that is “infrastructure agnostic,” meaning it can manage session hosts anywhere—including OCI. FSLogix is the agent on those OCI session hosts.

Here’s how to make them work together perfectly.

  • Thinfinity and FSLogix are Partners: Thinfinity manages the connection, and FSLogix manages the profile inside the session. They don’t conflict; they complement each other. The Thinfinity non-persistent/multi-session model requires a solution like FSLogix.
  • Authentication is King (Active Directory): FSLogix requires Active Directory. Your OCI-based VDI session hosts must be joined to an Active Directory domain. This means you must have Domain Controllers running on OCI Compute instances or have a line-of-sight connection (via OCI FastConnect or VPN) back to your on-prem AD.
  • Storage on OCI: Your best bet is OCI File Storage. It’s a managed, zonal, high-performance file service that supports the SMB protocol.
    1. Create a File System in OCI.
    2. Create a Mount Target in the same VCN and Availability Domain as your Thinfinity session hosts.
    3. Configure the VCN Security Lists (firewall) to allow SMB (TCP/445) traffic only from your session host subnet to the File Storage subnet.
  • OCI Network Latency: The “same AD” principle is critical in OCI. OCI’s Availability Domains are physically separate datacenters. While cross-AD latency is low, for the absolute best performance, your session host pools and your OCI File Storage mount target should reside in the same Availability Domain.

Conclusion: It Is Not an Add-On

FSLogix is not merely a “feature” or an “add-on” for a VDI deployment; it is the cornerstone of the modern user experience. It has single-handedly solved the decades-old problem of profile management, transforming non-persistent VDI from a compromise into a high-performance, user-centric solution.

However, as this guide has demonstrated, a successful FSLogix deployment is an exercise in precision. The difference between a high-performance environment and a support-ticket nightmare lies not in if you use FSLogix, but how.

Success is built on a foundation of three pillars:

  • Low-Latency, High-Availability Storage: Your profile solution is only as reliable as the file cluster it runs on.
  • An Unobstructed Network Path: Placing VDI hosts and storage on the same subnet, free from inspection, is the single most effective way to guarantee fast logins.
  • Intelligent Configuration: From GPOs to Redirections.xml, optimization is about what you exclude as much as what you include.

When architected correctly—with the same engineering rigor you apply to your VDI hosts and network—FSLogix becomes the silent, invisible hero of your virtual desktop infrastructure. It delivers the one thing that matters most: a user experience that is fast, resilient, and never gets in the way.

About Cybele Software Inc.
We help organizations extend the life and value of their software. Whether they are looking to improve and empower remote work or turn their business-critical legacy apps into modern SaaS, our software enables customers to focus on what’s most important: expanding and evolving their business.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

×

Hello!

Click one of our contacts below to chat on WhatsApp

×