Skip to content

Keepit’s intelligent platform named “Data Security Solution of the Year” in 2025 Data Breakthrough Awards Program

The Data Breakthrough Awards recognizes outstanding data technology products and companies

COPENHAGEN, Denmark – April 3 – Keepit, a global provider of a comprehensive cloud backup and recovery platform, today announced that it has been selected as winner of the “Data Security Solution of the Year” award in the 6th annual Data Breakthrough Awards program conducted by Data Breakthrough, an independent market intelligence organization that recognizes the top companies, technologies and products in the global data technology market today.

Keepit’s breakthrough platform protects all key SaaS applications, including Microsoft 365, Microsoft Entra ID, Salesforce, Google Workspace, and more. By having a true third-party backup in a resilient, independent cloud safeguards against threats, ensuring that every backup is accessible when needed.

“Unlike other solutions, we keep your data out of the SaaS vendor’s cloud, ensuring uninterrupted access and protection, even during SaaS vendor downtime. We purpose built our intelligent platform to ensure business continuity,” said Michele Hayes, CMO at Keepit. “We’re grateful to Data Breakthrough for this recognition that underscores our commitment to helping our clients focus on what matters most while also ensuring your data remains secure, compliant, and easily recoverable — all with minimal effort.”

The annual Data Breakthrough Awards is the premier awards program founded to recognize the

data technology innovators, leaders and visionaries from around the world in a range of categories, including DataOps, Data Analytics, AI, Business Intelligence, Data Privacy, Data Storage and many more. The 6th annual Data Breakthrough Award program attracted thousands of nominations from across the globe.

“Keepit offers intelligent SaaS data protection with unmatched security, seamless integration, and flexible data retention built for modern enterprise needs. The continued move to store and secure data in the cloud has resulted in huge amounts of business-critical cloud data that is vulnerable to human error, ransomware attacks, or service provider downtime,” said Steve Johansson, Managing Director, Data Breakthrough. “Keepit offers comprehensive and easy, guaranteed access to backups, and by isolating backups, ensures full data integrity. Keepit keeps your business resilient, no matter what. We’re proud to award them with ‘Data Security Solution of the Year!’”

Keepit ensures the highest operational security standards with ISO/IEC 27001 and SAE 3402-II certification along with helping to meet demanding regulatory requirements. Keepit’s platform is scalable with API-driven backup solutions and a per seat pricing structure. Keepit runs its own data centers in seven regions, guaranteeing data sovereignty and compliance.

 

About Data Breakthrough
Part of the Tech Breakthrough organization, a leading global provider of market intelligence and recognition platforms for technology innovation and leadership, the Data Breakthrough Awards program is devoted to honoring innovation and market disruption in data technologies, services, companies and products. The global Data Breakthrough Awards program provides a forum for public recognition around the achievements of data companies and solutions in categories including data analytics, DataOps, data management, infrastructure and hardware, storage, Business Intelligence and more. For more information visit DataBreakthroughAwards.com.

Tech Breakthrough LLC does not endorse any vendor, product or service depicted in our recognition programs, and does not advise technology users to select only those vendors with award designations. Tech Breakthrough LLC recognition consists of the opinions of the Tech Breakthrough LLC organization and should not be construed as statements of fact. Tech Breakthrough LLC disclaims all warranties, expressed or implied, with respect to this recognition program, including any warranties of merchantability or fitness for a particular purpose.

Download the report

 

Defining data governance and data classification

So, what is data governance and how does it relate to cyber resilience?

Existing under the broad umbrella of data management, data governance is a program — implemented via policies and standards — intended to ensure the availability, quality, and security of an organization’s data in accordance with applicable regulations and obligations (e.g., adhering to industry standards, fulfilling requirements for certifications, etc.).

Within data governance, data classification is the process of separating and organizing data into relevant groups (“classes”) based on their shared characteristics, such as the level of sensitivity, risks they present, and the compliance regulations that protect them.

Data governance underpins cyber resilience plans

An intelligent data governance program delivers several beneficial outcomes for organizations:

  • It helps to ensure the availability, quality, and security of an organization’s data, making it a foundational pillar of business continuity.
  • Data governance helps improve overall data accuracy and impacts outcomes based on that data — which can range from comparatively simple day-to-day business decisions and operations to more complex, forward-looking initiatives including AI-focused programs.
  • It helps to support organizational efforts to comply with regulations and other obligations, making it a cornerstone of compliance.
  • An effective data governance program also permeates the entire organization, increasing data literacy, data accessibility, and data scalability.

Do you know where your data is?

Of course, disaster recovery planning cannot start without a clear understanding and mapping of your data and its significance to your business. What data is crucial for us to continue running our operations? Who needs access to which data to do their job? Where do we store all of this critical data?

Knowing the answers to these questions will start your journey towards ensuring continuity in cases of data loss or cyberattacks. This is achieved through an efficient and effective data governance framework.

I hope that, with our new report in hand, CISOs and CIOs will be able to future-proof their modern, data-driven enterprises through effective data governance.

About Keepit’s new report, “Intelligent data governance: Why taking control of your data is key for operational continuity and innovation.”

Our report takes a practical approach to data governance by offering a resource to organizations for creating or adopting a framework that works best for them.

Key takeaways from the report:

-Major trends shaping enterprise IT

-The importance of “always-on” data

-Resilience against data loss and corruption

-Data governance as an investment

-A practical approach to data governance

-10 questions for board discussions

Get the full report

About Keepit
At Keepit, we believe in a digital future where all software is delivered as a service. Keepit’s mission is to protect data in the cloud Keepit is a software company specializing in Cloud-to-Cloud data backup and recovery. Deriving from +20 year experience in building best-in-class data protection and hosting services, Keepit is pioneering the way to secure and protect cloud data at scale.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

Even searching for protection can be dangerous. Stay informed about new risks with ESET Threat Intelligence

Threat Intelligence can save money, and it doesn’t need to be hard to understand.

Even people living thousands of years ago understood that “knowledge is power”, and amidst the digital era’s rapid developments in technology, including both cyber threats and cyber defense, this ancient wisdom applies more than ever.

A poignant  example, recent ESET research about the newly discovered China-aligned APT group PlushDaemon presented by ESET Malware Researcher Facundo Muñoz at JSAC 2025 conference. This research demonstrates how various users who were seeking protection in the form of a legitimate South-Korean VPN service but, alas, what they attempted to install was in fact trojanized VPN software that delivered spyware.

ESET endpoint protection stopped the malware, but for those who additionally field ESET Threat intelligence and its diversity of feeds, an even more powerful tool lays at their disposal – knowledge. Knowledge about the new threat, the compromised but legitimate URL, and Indicators of compromise (IoC). Using this knowledge, they could readily avoid the threat and check their defenses against the documented PlushDaemon tools.

PlushDaemon

In May 2024, ESET researchers noticed detections of malicious code in an NSIS installer for Windows that users from South Korea had downloaded from the website of a legitimate South Korean VPN company. This installer deployed both the legitimate software and the malicious implant that ESET researchers named SlowStepper.

Another attack vector for PlushDaemon is to intercept network traffic, hijack update protocols, redirect traffic to attacker-controlled servers, and deliver its SlowStepper implant.

However, SlowStepper is a backdoor that attempts to establish communication with a C&C server to receive further instructions. Once communication is established, SlowStepper can process multiple commands such as:

  • Collecting information from the compromised machine such as computer name, list of running processes, list of installed applications, whether cameras or microphones are connected, and more.
  • Executing a Python module from its toolkit; the output and any files created by the module are sent to the server.
  • Deleting the specified file.
  • Process various commands such as creating a complete report about the specified file or deleting the specified file, directory, or all files in a directory.
  • Uninstalls SlowStepper by removing its persistence mechanism and removing its files.

Dangers of data breaches

Going through the list of SlowStepper’s capabilities, it becomes clear that supply-chain attacks pose significant risks to businesses including financial losses due to system downtime, lost revenue, remediation costs, and reputational damage.

These attacks can also lead to data breaches and consequences can be ruinous. The average cost of a data breach jumped to USD 4.88 million from USD 4.45 million in 2023, according to IBM’s Cost of a Data Breach Report 2024. In fact, third-party breaches including supply chain breaches are among the top 3 factors that amplified breach costs.

On top of that, supply-chain attacks are not rare. Verizon’s 2024 Data Breach Investigations Report (DBIR) saw a 68% year-over-year growth in supply-chain attacks.

Yet, these attacks are only a fraction of cyber threats out there. See this list of most frequent attack vectors, according to IBM’s report:

  • Stolen or compromised credentials – 16 %
  • Phishing – 15 %
  • Cloud misconfiguration – 12%
  • Unknown zero-day vulnerability – 11 %
  • Business Email Compromise – 10 %
  • Malicious insider – 7 %

Threat intelligence – knowledge that saves money

Seeing these increasingly sophisticated attacks and how businesses are growing concerned about their cybersecurity, there is no surprise that the global threat intelligence market is projected to grow from USD 5.80 billion in 2024 to USD 24.05 billion by 2032.

IBM’s report calculated that a threat intelligence solution decreases average data breach cost by more than USD 240,000.

At the ESET WORLD 2024 conference, Tope Olufon, senior analyst at Forrester, a leading global market research company, stressed the importance of threat intelligence claiming that organizations need to understand the threat landscape and be prepared for upcoming threats.

However, organizations should also be smart about how they use the provided information – threat intelligence is not about counting detected samples but putting them into context and identifying the right stakeholders, according to Mr. Olufon.

What is ESET Threat intelligence?

Thanks to ESET LiveGrid technology, there are more than 110 million endpoints acting as sensors detecting malware. Combine this data with knowledge of ESET award-wining researchers, and you get a powerful tool that keeps users informed about the current threat landscape, adversaries, malicious programs and their properties, the servers used to propagate them, and even the URLs and domains which spread them.

A threat intelligence feed is an ongoing stream of data related to potential or current threats to an organization’s security that can be easily integrated to SIEM and TIP platforms. Instead of receiving a large amount of non-curated data, ESET shares a curated feed that features top-notch categorization and is pre-filtered for customers to use according to their preferences. Filtering is done by ESET researchers, who understand the internal data intimately.

Such filtering has multiple advantages for users. ESET feeds may be smaller in quantity, but all of the data are relevant and come with a very low rate of false positives. They also come with a significant amount of additional contextual data.

APT Reports provide contextual information about various adversaries, the latest APTs, technical analysis of threats, and activity summaries of the threat landscape. If a new threat is spreading quickly, ESET sends activity alert reports. Users can secure access to both human-readable reports and machine-readable Indicators of Compromise (IoCs).

If you are interested in ESET research blogs like PlushDaemon, or publicly available ESET APT Activity Reports and Threat Reports, bear in mind that these are just the tip of the iceberg of what you can see in documents received from ESET Threat Intelligence.

Now ESET has updated its Threat Intelligence service which consists of 15 feeds and has restructured the ESET APT reports into 3 tiers. Thus, businesses can choose what’s right for them. For example, while a large enterprise can get all the feeds and the highest tier APT report, some other businesses may opt just for a few feeds that are essential to secure their operations.

Users of the ESET Threat Intelligence APT Reports’ Advanced and Ultimate tiers can reduce complexity further with ESET AI Advisor, a specialized AI chatbot designed to provide information about APTs.

Here is the list of feeds:

  1. Malicious files feed
  2. Domain feed
  3. URL feed
  4. IP feed
  5. Botnet feed with two subfeeds:
    a) Botnet – C&C feed
    b) Botnet – Targets feed
  6. APT IoC feed
  7. Android infostealer feed
  8. Android threats feed
  9. Cryptoscam feed
  10. Malicious email attachments feed
  11. Phishing URL feed
  12. Ransomware feed
  13. Scam URL feed
  14. Smishing feed
  15. SMS scam feed

Feed your knowledge

As the world of cybercrime evolves rapidly, new threats are more sophisticated and agile, having access to intelligence about the threat landscape becomes a necessity. ESET Threat Intelligence and its data feeds can set businesses’ minds at ease knowing that they regularly receive the latest information about specific dangers.

What’s more, ESET works tirelessly to make this service as simple-to-use as possible. With APT reports enhanced by AI, curated intelligence feeds, filtering, and seamless integration, businesses can have the current threat landscape for breakfast.

 

 

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

視覺陷阱無所遁形:利用增強版 ESET Cloud Office Security 迎戰詐欺性數碼攻擊

ESET Cloud Office Security 新增功能,有效偵測郵件詐騙與同形異義字攻擊。

人被視為網絡安全中最弱的一環,尤其容易落入網絡釣魚攻擊的陷阱。企業通常透過網絡安全意識培訓來應對此問題,這雖然相當實用,卻難以涵蓋員工在數碼世界中面臨的所有威脅。

例如,識別釣魚郵件的技巧通常建議使用者檢查寄件者名稱是否正確無誤。但若攻擊者利用視覺技巧,讓偽冒的寄件者郵件看似合法呢?又或者,若寄件者電郵地址遭偽冒(Spoofed),即使再細心也難辨真偽?

為了保護企業及其員工免受郵件詐騙和同形異義字攻擊的侵害,ESET 為其 ESET Cloud Office Security 配備了「反郵件詐騙」(Anti-Spoofing)與「同形異義字防護」(Homoglyph Protection)功能。這些功能能夠識別出人眼難以察覺的惡意郵件細微差異。

新版 ESET Cloud Office Security 亦整合了「電子郵件回收」(Email Clawback)功能,簡化了郵件隔離區的管理作業。同時,它提供了改良的儀表板,讓企業能迅速概覽其 Microsoft 365 或 Google Workspace 的整體安全態勢。

 

驚人的損失

根據 Verizon 的《2024 年資料外洩調查報告》,高達 68% 的外洩事件涉及非惡意的人為因素。這些攻擊大多是透過電郵進行的網絡釣魚(誘騙使用者提供敏感資訊或下載惡意內容)或藉口誘騙(Pretexting)(使用捏造的故事或藉口來騙取受害者信任)。

這些攻擊可能導致重大的財務損失。由 Ponemon Institute 執行的 IBM《2024 年資料外洩成本報告》指出,受訪企業因網絡釣魚攻擊蒙受的平均業務損失高達 488 萬美元。

ESET 的研究一再表明,網絡犯罪分子不斷透過多種方式改進其釣魚手法,包括利用視覺欺騙手法,避開典型警訊的攻擊。在這些情況下,員工通常面臨同形異義字攻擊,或是結合了精心撰寫郵件內文的偽冒郵件。拜現今高品質自動翻譯器與 AI 聊天機器人普及所賜,後者並不難達成。

 

以下是一些常見、需要留意的視覺欺騙網絡威脅:

電郵寄件者偽冒(Email Sender Spoofing)– 這是一種網絡釣魚技術,攻擊者竄改郵件中的「寄件者」(From)地址,使其看似來自可信來源。網絡犯罪分子的常見做法還包括同時設定「回覆至」(Reply-To)欄位,使其貌似合法地址,但回覆郵件實際上會寄給攻擊者。

同形異義字攻擊(Homoglyph Attack)– 此類攻擊利用了許多字元外觀極為相似的特點。要理解這種技術,試檢查網域名稱「℮s℮t.com」,乍看之下毫無破綻,對吧?但這並非真正的 ESET 網域名稱,因為當中使用了外觀相似的符號「℮」,而非真正的字母「e」。

域名仿冒 / 輸入錯誤(Typosquatting)– 與同形異義字攻擊類似,這種手法同樣利用視覺詭計讓釣魚連結看似合法。它並非替換字元,而是依賴微小的拼寫錯誤,例如使用「eseet.com」而非「eset.com」。

 

提高警覺:技術防護不可或缺

審視這些真實案例後,顯然,僅靠典型的網絡安全意識課程並不足夠,必須輔以能偵測人眼所不及之威脅的網絡安全技術。

最新版的 ESET Cloud Office Security 透過「反郵件詐騙」(Anti-spoofing) 與「同形異義字防護」(Homoglyph Protection)這兩項新功能應對上述挑戰,同時也簡化了其電子郵件管理系統。

所有這些變革均體現了 ESET 的「預防優先」策略,旨在降低進階威脅的相關風險,並大幅縮短安全團隊耗費在事件應變與補救措施上的時間。

 

ESET Cloud Office Security 的主要改進:

反郵件詐騙(Anti-Spoofing)- 用以識別並阻止攻擊者冒充可信來源。企業可為收到的郵件設定基於業界標準驗證工具(如 DKIM, SPF, DMARC)的驗證規則 — DomainKeys Identified Mail (DKIM)檢查郵件簽章,Sender Policy Framework(SPF)檢查寄件者伺服器,以及 Domain-based Message Authentication, Reporting & Conformance(DMARC) ,後者賦予寄件者網域權力,告知收件方,若郵件未能通過前述兩項驗證,應如何處置。

例如,若一封收到的郵件看似合法,卻缺乏來自合法網域的有效數碼簽章(DKIM 檢查失敗),該郵件將被移至隔離區。即使攻擊者劫持了合法的電郵帳戶並用其發送惡意郵件,ESET Cloud Office Security 也能識別威脅,因為郵件伺服器的 IP 位址與其 SPF 記錄中所列的不符(SPF 檢查失敗)。

同形異義字防護(Homoglyph Protection)- 用以識別透過替換字母(使用外觀相似字元或不同字母系統字元)來仿冒合法網域的惡意郵件網域。受 ESET Cloud Office Security 保護的企業可以設定規則,僅放行來自正確拼寫網域名稱的郵件。此功能會識別出偽冒的網域名稱「℮s℮t.com」,因為外觀相似符號「℮」的 Unicode 編碼與字母「e」不同。

電子郵件回收(Email Clawback)– 此功能簡化了隔離郵件的管理流程。使用者可輕易隔離任何已送達的可疑郵件,若證實郵件為誤判,只需單次點擊即可還原。

改良的儀表板(Improved Dashboard)– ESET Cloud Office Security 儀表板提供關鍵資訊概覽,包括受保護用戶總數、授權使用情況、接收最多垃圾郵件、惡意郵件及釣魚郵件的用戶,以及風險最高的 OneDrive、Google Drive、SharePoint 與 Teams 帳戶或群組 / 網站。管理員亦可查看 Exchange Online、Gmail、OneDrive、Google Drive、SharePoint 和 Teams 的偵測詳情,涵蓋垃圾郵件、惡意軟件和釣魚郵件。

改良後的儀表板提供完全可自訂的分頁與元件,以滿足管理員或不同規模企業包括中小型企業、託管服務供應商(MSP)及大型企業的特定需求。

 

著眼長遠防護

隨著威脅行為者不斷精進其釣魚技倆,儘管有網絡安全意識培訓,員工成功識別惡意郵件的機率正日益降低。為了有效緩解這些威脅,企業極需能偵測並攔截那些真假難辨郵件的進階網絡安全工具。ESET Cloud Office Security 在此領域表現卓越,它能在郵件詐騙與同形異義字攻擊到達用戶前便有效攔截。如此一來,它協助企業防範潛在的財務損失、聲譽損害與營運中斷。擁有 ESET Cloud Office Security,助您領先網絡犯罪份子一步,守護企業的未來。

關於ESET
ESET成立於1992年,是一家面向企業與個人用戶的全球性的電腦安全軟件提供商,其獲獎產品 — NOD32防病毒軟件系統,能夠針對各種已知或未知病毒、間諜軟件 (spyware)、rootkits和其他惡意軟件為電腦系統提供實時保護。ESET NOD32佔用 系統資源最少,偵測速度最快,可以提供最有效的保護,並且比其他任何防病毒產品獲得了更多的Virus Bulletin 100獎項。ESET連續五年被評為“德勤高科技快速成長500 強”(Deloitte’s Technology Fast 500)公司,擁有廣泛的合作夥伴網絡,包括佳能、戴爾、微軟等國際知名公司,在布拉迪斯拉發(斯洛伐克)、布裏斯托爾(英國 )、布宜諾斯艾利斯(阿根廷)、布拉格(捷克)、聖地亞哥(美國)等地均設有辦事處,代理機構覆蓋全球超過100個國家。

關於 Version 2 Digital
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

Saily vs. Airalo: which eSIM service is better for travelers?

Whether you’re taking a short trip to an industry event or embarking on the adventure of a lifetime, you almost certainly have a checklist to cover before you depart. Passport, visa, and the usual travel essentials are probably already covered, but there’s one small thing you might overlook in all the planning stress—mobile data connection. To help you stay in the network without worries, we want to see how two eSIM providers—Saily vs. Airalo—stack up against each other.

What is an eSIM?

In case you haven’t used eSIMs before, they’re a digital version of a typical physical SIM card. Instead of inserting it into your phone, you download software—usually an app—to activate and use it on your phone. An eSIM may have a phone number attached to it, but its most common use is for data connection to avoid costly roaming charges.

Since eSIMs have only been around for just under a decade, with the first eSIM-compatible smartphones released around 2017 and 2018, their usage is still somewhat restricted. Before investing in an eSIM, check if your phone’s build is recent enough to be compatible with the service. Some compatible devices can support several eSIMs at once, allowing you to try different services yourself.

What is Saily?

On one side of today’s eSIM comparison ring, you’ll find Saily—the eSIM provider developed by Nord Security, the company that’s also behind NordPass. Launched in the spring of 2024, Saily offers local and international eSIM services on iOS and Android devices. Saily is available as a dedicated app, providing mobile data coverage in over 190 countries and territories.

What is Airalo?

Our second subject today is Airalo. Launched in 2019 and seizing the title of the world’s first eSIM store, Airalo offers mobile data coverage in over 200 countries and territories. Airalo’s mobile app is available on iOS and Android devices.

Plans and network coverage

Let’s start our Saily vs. Airalo comparison by looking at the core service they offer—network coverage. After all, if you’re traveling to a different continent, you want to be sure that your selected eSIM provider works there and offers a plan that satisfies your needs.

With Saily, you can select a 7-day, 15-day, 30-day, or 365-day plan, starting at 1 GB of data for a week. The amount of data you receive may vary in different countries. However, in some countries, you may have the option to buy unlimited data for 15 days. Plans are sorted by country and region, with over 190 countries and 8 regions to pick from. For instance, if you’re planning a vacation in Thailand, you can opt for the Thailand plan, or if you’re setting out on a European road trip, you can purchase the Europe plan.

Saily has a global plan with up to 20 GB of data for a full year, allowing you to trek around the world to your heart’s content. A nice perk is that you can reuse the same Saily eSIM for multiple locations—you can simply buy a new plan without having to install a different eSIM.

Airalo offers 1-day, 7-day, 15-day, and 30-day plans, starting at 1 GB of data for a day, and 3 types of eSIMS—local, regional, and global. The local eSIMS are available for over 200 countries and territories. Depending on your destination, the availability of plans may vary. Although most regional plans are valid for 30 days, the Europe and Asia plans offer up to 180 days of data.

Airalo also offers a 365-day, 20 GB global plan for the long-haulers. However, unlike Saily, Airalo doesn’t support the same eSIM for different countries or regions. If you’re hopping from country to country, especially if they don’t fall under the same region, you have to install a new eSIM for each one.

So, if you’re planning a quick journey, Airalo can be a good pick. However, if you plan to travel more extensively and cover several regions, Saily offers more flexibility with its monthly and yearly plans.

Pricing and value for money

Next, let’s talk money. Even if you’re a budget traveler, expenses can build up quickly. So, when you’re looking for a cellular data service, you want to make sure you’re getting the value for money and don’t have to worry about looking for a new provider when you’re in a rush. Let’s see how the Saily eSIM and Airalo’s store compare in terms of pricing.

Region/countrySailyAiralo
Global 7 days1 GB – $8.991 GB – $9
Global 180 days10 GB – $56.9910 GB – $59
Global 365 days20 GB – $66.9920 GB – $69
Europe 7 days1 GB – $4.991 GB – $5
Europe 30 days10 GB – $35.9910 GB – $37
Europe 180 days100 GB – $179.99100 GB – $185
Asia* 7 days1 GB – $4.991 GB – $5
Asia* 30 days10 GB – $35.9910 GB – $37
Asia* 180 days100 GB – $179.99100 GB – $185
USA 7 days1 GB – $3.991 GB – $4.50
USA 15 daysUnlimited – $49.992 GB – $8
USA 30 days20 GB – $36.9920 GB – $42

*Saily offers a joint regional plan for Asia and Oceania.

Note: The information in this comparison was last verified on eSIM providers’ official websites on April 1, 2025, and is subject to change.

While the pricing for shorter plans is similar, Saily has a slight edge over Airalo, with its 7-day USA plan being nearly a dollar cheaper. Airalo does offer 1-day plans and provides new users with a complimentary free eSIM with 1 GB of data, making it a good choice for weekend trips or to quickly top up when a plan runs out.

The real disparity is in longer-term plans, where Saily appears to be the more budget-friendly option. The standout is the 15-day USA plan—while Airalo only offers 2 GB of mobile data, Saily has an unlimited option that offers more flexibility and keeps travelers from worrying about running out of data before their journey’s over.

In addition to the main plans, both Saily and Airalo allow you to top up your current balance. This means you don’t need to scramble for a new eSIM if you’re running short on data.

The difference in pricing and Airalo’s requirement to set up a new eSIM for each region makes Saily the more budget-friendly option.

Ease of use and setup process

Setting up a regular SIM card is straightforward—you just insert it into your phone and can use cellular data pretty much right away. Setting up an eSIM should not be much more complicated. So, how easy is it to set up and get started with Saily and Airalo?

Firstly, both eSIM providers score points in terms of compatibility. They work with all iOS and Android devices that support eSIMs, as well as laptops and tablets. If you’re looking for a smartwatch-compatible service, though, Saily takes the win here, as its eSIM service is fully supported by Apple, Xiaomi, Samsung, and other brands. As mentioned prior, ensure your device is eSIM-compatible before you sign up for either service.

Once you download the app, and before you even create an account or log in, Saily lets you preview all available plans in the app for different countries and regions. That means you can firmly settle on a plan first before you create an account and buy it.

To sign up, you can use your Google or Apple account. Saily offers easy in-app instructions to get you started with your eSIM. In case you encounter any issues with the setup, Saily offers 24/7 live customer support via live chat and email.

Likewise, Airalo lets you preview the plans as soon as you download the app. With some plans, you may have the option to receive a free Welcome eSIM, which covers 1 GB of data for 1 day. To create a new account, you can use your email address or Facebook and Google accounts. Some issues may arise when purchasing new eSIM plans for different regions, as each card will have to be removed and added manually.

In terms of payment options, Airalo is more flexible here. Both eSIM providers accept credit and debit cards, Google Pay, and PayPal. However, Airalo also supports payments via Apple Pay, Alipay, and AirMoney, which might make it more convenient for iOS users. Airalo’s customer support is available via email and WhatsApp.

Overall, both apps are easy to set up and get started with.

Speed and performance

You can have as many gigabytes in your plan as you want, but without the right network speed, they’re as good as expired. Network speed ensures you can connect and share your adventures in real time and is essential for video calls or livestreams. So, how do Saily and Airalo match up in terms of speed?

Turns out, they are pretty evenly matched. Both eSIM providers offer speeds up to 5G in regions that support it. However, due to local restrictions, network speeds may not exceed 4G in some regions.

Hotspot sharing can also be essential for some travelers. While Airalo puts a daily cap on how much data you can share, Saily’s hotspot sharing is unlimited. Both Airalo and Saily alert you with a notification if you’re running low on data. Saily sends a notification at the 80% cap, while Airalo lets you customize your preferred warning threshold.

Overall, both Saily and Airalo are solid options in terms of network speed and performance, but if you plan to share your data with other devices, Saily might be more convenient.

Additional features

Picking the right eSIM provider can be difficult. With similar price ranges and network features, how do you know you’ve made the right choice? Extra features can play a key role in that final decision. So, do Saily and Airalo offer more than just international network connection to their customers?

For Saily, the answer is an assured yes. As a Nord Security product, Saily is more than just an eSIM provider. It comes equipped with additional security features, like virtual locations for private browsing, a built-in ad blocker to get around those pesky interferences and save your data, and web protection to block any malicious sites and browse faster.

Airalo’s edge, on the other hand, is in providing mobile calls and texting in addition to data. Airalo’s select global plans offer up to 200 minutes of calls and up to 200 SMS.

So, if you’re interested in maintaining a higher level of security for your devices and data, Saily is a firm choice, but if you’re interested in making offline calls, Airalo offers a solution.

Customer reviews and ratings

Finally, it’d be amiss not to take practical user experience into consideration. What do users and reviewers have to say about Saily’s performance compared to Airalo’s?

On both Apple’s App Store and Android’s Play Store, the ratings go toe to toe, varying at just a small margin in Saily’s favor—4.7 to Airalo’s 4.6 on the Play Store and 4.7 to Airalo’s 4.6 on the App Store. Airalo does have more ratings overall, but that’s to be expected, as it’s been around for 5 years longer than Saily.

On Trustpilot, the difference between Saily’s and Airalo’s ratings is much bigger, with Saily boasting a 4.0-star rating to Airalo’s 2.6.

Saily received positive reviews for its customer support, quick setup, and reliable speed. Likewise, ease of setup, reliable data connection, as well as budget-friendliness were listed as some of Airalo’s highlights.

In terms of Saily’s negatives, some customers reported occasional issues with data coverage and eSIM activation, as well as a lack of support for local mobile calls. Criticism toward Airalo was due to signal issues, inconsistent network speed, and poor customer service.

Note: The ratings in this comparison were last verified on April 1, 2025, on the App Store, Play Store, and the respective Saily and Airalo Trustpilot pages, and are subject to change.

Conclusion: which one should you choose?

The Saily vs. Airalo match-up is a tough one. Both services have their strengths and offer a budget-friendly solution for travelers. Saily is a solid option for budget-friendly traveling, offering flexibility with multi-region support using a single eSIM, as well as security-focused additional features. Airalo provides broad worldwide coverage with plans suitable for both long-term and short-term travelers, more flexible payment options, and the ability to add a phone number to your eSIM. While Saily holds a slight advantage in terms of its pricing, eSIM usage flexibility, and extra perks, the choice may ultimately come down to your personal preference and device compatibility options.

We hope this guide helps you pick the right eSIM provider for your next adventure. Enjoy your travels, stay safe, and stay connected!

 

About NordPass
NordPass is developed by Nord Security, a company leading the global market of cybersecurity products.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

Interactive Shared Gateways map: more insights and better control


Summary:
NordLayer’s interactive Shared Gateways map provides better visibility helping admins monitor activity, detect anomalies, and enhance network security.

Organization admins need actionable insights to manage connections, monitor device types, track failed logins, and ensure overall security.

We’re working on that.

With our latest update, we’re improving the Dashboards section in the NordLayer Control Panel. The Shared Gateways usage data chart provides admins with a new, interactive tool for deeper visibility into how their organization uses shared gateways.

Now, admins can monitor shared gateway activity, detect anomalies, and make data-driven decisions to optimize performance and security.

Feature characteristics: What to expect

With this update, the interactive Shared Gateways map is now part of the Dashboards section. It sits alongside other key graphs that display important security and usage metrics.

This new feature includes:

  • An interactive map displaying shared gateway locations and usage patterns
  • A usage data list showing how many users access each shared gateway
  • Predefined filters for quick data views and options to refine results based on specific criteria
  • Percentage-based insights comparing a gateway’s usage to other shared gateways within the same organization
All graphs

Admins using Core, Lite, and Premium plans already benefit from a range of insights that enhance security and network visibility. The Dashboards provide data on Two-Factor Authentication (2FA) adoption rates, allowing admins to monitor how many users have enabled this critical security measure. It also includes a device OS distribution breakdown, helping identify potential security risks associated with unsupported operating systems.

Additionally, the Dashboards track NordLayer application versions in use, ensuring admins can detect and address outdated software that may pose vulnerabilities. Lastly, browser type analytics offer insight into how users access secured resources via the NordLayer extension, contributing to overall network security.

With the introduction of the Shared Gateways usage data chart, admins now gain a more complete picture of their organization’s network activity. This latest addition provides detailed visibility into shared gateway usage, allowing for smarter decision-making in both security and performance management.

How it works: Shared Gateway usage data in action

The Shared Gateways usage data chart is designed to be intuitive, interactive, and visually engaging, allowing admins to quickly grasp key network trends.

  • The interactive map visually represents the distribution of shared gateways and their usage rates
  • The percentage-based comparison ensures admins can see which gateways are most popular in relation to others
  • The filtering options enable refined analysis based on location and time periods

This feature is not just about visibility—it helps detect security anomalies, such as unexpected spikes in activity to unfamiliar locations, which may indicate unauthorized access attempts. Additionally, geographic insights support performance optimization, allowing businesses to strategically plan their network infrastructure.

 

Why do dashboards matter?

With deeper, nearly real-time insights, admins can now make faster, smarter decisions regarding security and network management. Key benefits of the updated Dashboards with Shared Gateways usage data chart:

  • Improved visibility – Monitor shared gateway usage and identify popular access points
  • Enhanced security – Detect unusual access patterns that may indicate potential threats
  • Regulatory compliance – Maintain audit logs for compliance with security regulations
  • Optimized network performance – Use geographic insights to better manage shared gateway resources

 

Conclusion

With this latest Dashboards upgrade, NordLayer empowers admins with the tools they need to strengthen security, optimize resources, and gain deeper insights into shared gateway usage.

The Shared Gateways usage data chart is rolling out to all plans in March 2025.

Explore the updated Dashboards today and take control of your organization’s security.

 

About NordLayer
NordLayer is an adaptive network access security solution for modern businesses – from the world’s most trusted cybersecurity brand, Nord Security.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

×

Hello!

Click one of our contacts below to chat on WhatsApp

×