{"id":98079,"date":"2024-11-27T11:36:19","date_gmt":"2024-11-27T03:36:19","guid":{"rendered":"https:\/\/version-2.com\/?p=98079"},"modified":"2024-11-22T11:42:29","modified_gmt":"2024-11-22T03:42:29","slug":"are-you-confident-in-your-saas-data-protection","status":"publish","type":"post","link":"https:\/\/version-2.com\/en\/2024\/11\/are-you-confident-in-your-saas-data-protection\/","title":{"rendered":"Are you confident in your SaaS data protection?"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"98079\" class=\"elementor elementor-98079\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-24c3f9c1 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"24c3f9c1\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-4c6ecd87\" data-id=\"4c6ecd87\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-123ce05e elementor-widget elementor-widget-text-editor\" data-id=\"123ce05e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><img fetchpriority=\"high\" decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/images.prismic.io\/keep-it\/Zz2nDa8jQArT1D1U_blog115-protecting-your-saas-data.png?auto=format,compress&amp;rect=0,0,2536,2536&amp;w=800&amp;h=800\" width=\"800\" height=\"800\" \/><\/p><div class=\"section\"><h2>Here\u2019s why you might want to double check\u00a0<\/h2><p>How confident are you that your organization\u2019s critical SaaS data is fully protected? If you\u2019re not entirely sure, you\u2019re not alone. A recent survey by Gatepoint Research of executive- and director-level respondents revealed that only 28% of IT and security executives feel fully confident in their current SaaS data protection and resilience measures. With SaaS applications like Microsoft 365 and Salesforce now essential to business operations across industries, ensuring SaaS data backup and recovery is crucial \u2014 and it\u2019s becoming more challenging.<\/p><p>In a recent webinar, I talked about what these survey findings show about the state of SaaS data protection today \u2014 and why businesses need to rethink their approach to keeping their SaaS data secure. This article highlights the biggest takeaways from that conversation to help guide you on what your SaaS backup strategy should cover.<\/p><p><img decoding=\"async\" data-attachment-id=\"98081\" data-permalink=\"https:\/\/version-2.com\/en\/zz2uma8jqart1d9j_confidence-in-s\/\" data-orig-file=\"https:\/\/version-2.com\/wp-content\/uploads\/2024\/11\/Zz2uMa8jQArT1D9j_confidence-in-s.png\" data-orig-size=\"1640,909\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Zz2uMa8jQArT1D9j_confidence-in-s\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/version-2.com\/wp-content\/uploads\/2024\/11\/Zz2uMa8jQArT1D9j_confidence-in-s-1024x568.png\" class=\"alignleft size-full wp-image-98081\" src=\"https:\/\/version-2.com\/wp-content\/uploads\/2024\/11\/Zz2uMa8jQArT1D9j_confidence-in-s.png\" alt=\"\" width=\"1640\" height=\"909\" srcset=\"https:\/\/version-2.com\/wp-content\/uploads\/2024\/11\/Zz2uMa8jQArT1D9j_confidence-in-s.png 1640w, https:\/\/version-2.com\/wp-content\/uploads\/2024\/11\/Zz2uMa8jQArT1D9j_confidence-in-s-300x166.png 300w, https:\/\/version-2.com\/wp-content\/uploads\/2024\/11\/Zz2uMa8jQArT1D9j_confidence-in-s-1024x568.png 1024w, https:\/\/version-2.com\/wp-content\/uploads\/2024\/11\/Zz2uMa8jQArT1D9j_confidence-in-s-768x426.png 768w, https:\/\/version-2.com\/wp-content\/uploads\/2024\/11\/Zz2uMa8jQArT1D9j_confidence-in-s-1536x851.png 1536w, https:\/\/version-2.com\/wp-content\/uploads\/2024\/11\/Zz2uMa8jQArT1D9j_confidence-in-s-18x10.png 18w\" sizes=\"(max-width: 1640px) 100vw, 1640px\" \/><\/p><h2>The shared responsibility model: Who\u2019s really responsible for SaaS data protection?<\/h2><p>When businesses move data to the cloud, many assume that providers like <a href=\"https:\/\/learn.microsoft.com\/en-us\/azure\/security\/fundamentals\/shared-responsibility?utm_source=chatgpt.com\" target=\"_self\" rel=\"noopener\">Microsoft<\/a>, <a href=\"https:\/\/cloud.google.com\/architecture\/framework\/security\/shared-responsibility-shared-fate?utm_source=chatgpt.com\" target=\"_blank\" rel=\"noopener\">Google<\/a>, or <a href=\"https:\/\/www.salesforce.com\/blog\/shared-responsibility-model\/?utm_source=chatgpt.com\" target=\"_blank\" rel=\"noopener\">Salesforce <\/a>have them covered. It\u2019s a reasonable expectation \u2014 after all, if they\u2019re securing the infrastructure, shouldn\u2019t they also be responsible for protecting the data?<\/p><p>In reality, SaaS providers all operate under a shared responsibility model: They protect the application, but the responsibility for complete data backup falls squarely on the customer. The SaaS provider generally promises not to lose all your data at once, but they don\u2019t necessarily protect your critical business data from deletion, corruption, encryption, or loss. It\u2019s up to <i>you<\/i> to have a backup plan in place for your cyber resilience. Without an independent backup and recovery solution in place, data can be lost, leading to operational disruptions, compliance issues, and reputational damage.<\/p><p><img decoding=\"async\" data-attachment-id=\"98082\" data-permalink=\"https:\/\/version-2.com\/en\/e358ddd5-986c-4d89-920f-ed2641a1\/\" data-orig-file=\"https:\/\/version-2.com\/wp-content\/uploads\/2024\/11\/e358ddd5-986c-4d89-920f-ed2641a1.png\" data-orig-size=\"1340,271\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"e358ddd5-986c-4d89-920f-ed2641a1\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/version-2.com\/wp-content\/uploads\/2024\/11\/e358ddd5-986c-4d89-920f-ed2641a1-1024x207.png\" class=\"alignleft size-full wp-image-98082\" src=\"https:\/\/version-2.com\/wp-content\/uploads\/2024\/11\/e358ddd5-986c-4d89-920f-ed2641a1.png\" alt=\"\" width=\"1340\" height=\"271\" srcset=\"https:\/\/version-2.com\/wp-content\/uploads\/2024\/11\/e358ddd5-986c-4d89-920f-ed2641a1.png 1340w, https:\/\/version-2.com\/wp-content\/uploads\/2024\/11\/e358ddd5-986c-4d89-920f-ed2641a1-300x61.png 300w, https:\/\/version-2.com\/wp-content\/uploads\/2024\/11\/e358ddd5-986c-4d89-920f-ed2641a1-1024x207.png 1024w, https:\/\/version-2.com\/wp-content\/uploads\/2024\/11\/e358ddd5-986c-4d89-920f-ed2641a1-768x155.png 768w, https:\/\/version-2.com\/wp-content\/uploads\/2024\/11\/e358ddd5-986c-4d89-920f-ed2641a1-18x4.png 18w\" sizes=\"(max-width: 1340px) 100vw, 1340px\" \/><\/p><p>Misunderstanding the shared responsibility model can lead to disastrous consequences, and the complexities around SaaS data protection underscores one of the reasons why so many executives express low confidence in their SaaS data protection measures.<\/p><h2>Confidence crisis: Why so many executives are concerned about their SaaS data<\/h2><p>The survey results show that 31% of executives weren\u2019t confident in their SaaS data protection measures. This low confidence stems from several factors, including:<\/p><ul><li><b>Compliance and regulatory pressures<\/b>: Global compliance regulations, from GDPR to <a href=\"\/en\/blog\/nis2-backup-vendor-checklist\/\" target=\"_blank\" rel=\"noopener\">NIS2<\/a> and <a href=\"\/en\/blog\/what-is-dora\/\" target=\"_blank\" rel=\"noopener\">DORA<\/a>, demand that organizations maintain control over their data and prove that it\u2019s secure. This is challenging, as regulations are evolving faster than many companies can adapt, increasing pressure on data governance and compliance. For example, <a href=\"\/en\/blog\/dora-compliance-backup\/\" target=\"_blank\" rel=\"noopener\">DORA<\/a> mandates that businesses in the financial industry maintain backup environments segregated from production environments to reduce risk.<\/li><li><b>Increased risks from external factors:<\/b> The frequency and severity of cyberthreats, such as ransomware, only continues to grow. With the advent of <a href=\"\/en\/blog\/ransomware-as-a-service\/\" target=\"_blank\" rel=\"noopener\">ransomware as a service<\/a> (RaaS), the number of threat actors only stands to increase.<\/li><li><b>Data growth and scalability<\/b>: As more companies adopt SaaS applications, the volume of data continues to grow exponentially, making traditional backup strategies insufficient and underscoring the need for scalable solutions.<\/li><li><b>Complexities in SaaS data backup<\/b>: Many organizations rely on built-in SaaS backup tools that may not offer the robustness needed to guarantee data integrity and protection from threats like ransomware or accidental deletion, such as data immutability and air gapping.<\/li><\/ul><h2>Key challenges organizations face with SaaS data protection<\/h2><p>The survey also delved into some of the key challenges executives say they face. Some of these are related to the reasons they don\u2019t feel confident, but I was interested to see a couple of unique challenges reflected in their answers:<\/p><ul><li><b>Increasing compliance demands<\/b>: Regulations like GDPR, NIS2, and DORA are forcing organizations to implement rigorous data protection measures. These compliance requirements are constantly evolving, leaving companies racing to keep up.<\/li><li><b>Rapid growth of data<\/b>: As SaaS usage increases, so does the volume of data, creating scalability challenges for organizations. Traditional backup solutions often fall short when managing the vast amount of data in today\u2019s SaaS environments.<\/li><li><b>Managing multiple backup vendors<\/b>: Many companies juggle multiple backup providers across different SaaS platforms. This fragmented approach can make it difficult to enforce consistent data protection policies, and it increases the risk of gaps in coverage. The average number of SaaS apps used by \u201cworkplaces in transition\u201d is more than 120, according to <a href=\"https:\/\/www.bettercloud.com\/monitor\/the-2024-state-of-saasops-report\/\" target=\"_blank\" rel=\"noopener\">BetterCloud<\/a>.<\/li><\/ul><p>These issues compound the challenges organizations face in securing their SaaS data, especially when operating without a clear strategy or dedicated backup vendor.<\/p><p><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"98083\" data-permalink=\"https:\/\/version-2.com\/en\/zz2um68jqart1d9k_top-challenges\/\" data-orig-file=\"https:\/\/version-2.com\/wp-content\/uploads\/2024\/11\/Zz2uM68jQArT1D9k_top-challenges.png\" data-orig-size=\"1640,836\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Zz2uM68jQArT1D9k_top-challenges\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/version-2.com\/wp-content\/uploads\/2024\/11\/Zz2uM68jQArT1D9k_top-challenges-1024x522.png\" class=\"alignleft size-full wp-image-98083\" src=\"https:\/\/version-2.com\/wp-content\/uploads\/2024\/11\/Zz2uM68jQArT1D9k_top-challenges.png\" alt=\"\" width=\"1640\" height=\"836\" srcset=\"https:\/\/version-2.com\/wp-content\/uploads\/2024\/11\/Zz2uM68jQArT1D9k_top-challenges.png 1640w, https:\/\/version-2.com\/wp-content\/uploads\/2024\/11\/Zz2uM68jQArT1D9k_top-challenges-300x153.png 300w, https:\/\/version-2.com\/wp-content\/uploads\/2024\/11\/Zz2uM68jQArT1D9k_top-challenges-1024x522.png 1024w, https:\/\/version-2.com\/wp-content\/uploads\/2024\/11\/Zz2uM68jQArT1D9k_top-challenges-768x391.png 768w, https:\/\/version-2.com\/wp-content\/uploads\/2024\/11\/Zz2uM68jQArT1D9k_top-challenges-1536x783.png 1536w, https:\/\/version-2.com\/wp-content\/uploads\/2024\/11\/Zz2uM68jQArT1D9k_top-challenges-18x9.png 18w\" sizes=\"(max-width: 1640px) 100vw, 1640px\" \/><\/p><h2>What\u2019s true SaaS data backup and what should it include?<\/h2><p>To overcome these challenges, organizations need reliable backup solutions that are purpose-built for SaaS data. In this case, \u201cpurpose-built\u201d really means that they\u2019re built on an independent cloud infrastructure that ensures your data is protected, accessible, <i>and separated from the production environment<\/i> of the SaaS provider. This approach provides the ultimate safety net, enabling you to recover and restore data independently of your SaaS provider\u2019s infrastructure. It\u2019s why I call such a system a <i>true <\/i>backup, not just another copy of the data.<\/p><p>True backup also means maintaining immutable copies \u2014 versions of your data that can\u2019t be altered, even by the most sophisticated threats. In recent years, ransomware attacks and malicious insiders have targeted cloud data, leading to data loss or corruption. A truly immutable backup, stored independently, can withstand these threats, ensuring that your data is always recoverable.<\/p><p>\u00a0<\/p><p>Of course, this isn\u2019t a comprehensive list. If you\u2019d like to read more about the top considerations for backup and recovery solutions, read our <a href=\"\/en\/blog\/esg-vendor-selection-top-10\/\" target=\"_blank\" rel=\"noopener\">top 10 for RFP blog.<\/a><\/p><h2>The ROI of backup and recovery<\/h2><p>A dedicated SaaS data backup solution might seem like just another expense, but it brings considerable return on investment. Data loss or downtime can lead to significant financial impacts, both directly and indirectly. From potential fines for non-compliance to revenue loss due to service interruptions, the costs of not having a backup far outweigh the investment in a robust solution. You can also leverage cost avoidance in SaaS licensing fees with some backup providers. A comprehensive SaaS data backup strategy also protects your organization against reputational damage by ensuring uninterrupted service.<\/p><h2>Practical steps to increase SaaS data protection confidence<\/h2><p>Regular testing and clear data classification are crucial parts of any backup strategy. Here are a few takeaways for organizations looking to improve their SaaS data protection:<\/p><ul><li><b>Identify and classify your data<\/b>: Identify what data is critical to your business and prioritize its protection. Knowing what information is most essential enables you to focus on securing the assets that would be most damaging to lose.<\/li><li><b>Test and verify backup and recovery processes<\/b>: Confidence in data protection comes from testing, so schedule regular recovery tests to ensure backups are complete and easily recoverable. Make sure multiple team members are trained to handle recovery to avoid dependence on a single individual.<\/li><li><b>Evaluate your current backup solution<\/b>: Check if your current backup solution meets modern standards of immutability, independence, and compliance. If your SaaS data is only partially covered or stored in the same environment as production data, it might be time to look for a more comprehensive solution.<\/li><\/ul><p><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"98084\" data-permalink=\"https:\/\/version-2.com\/en\/zz2una8jqart1d9l_which-saas-app\/\" data-orig-file=\"https:\/\/version-2.com\/wp-content\/uploads\/2024\/11\/Zz2uNa8jQArT1D9l_which-saas-app.png\" data-orig-size=\"1640,880\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Zz2uNa8jQArT1D9l_which-saas-app\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/version-2.com\/wp-content\/uploads\/2024\/11\/Zz2uNa8jQArT1D9l_which-saas-app-1024x549.png\" class=\"alignleft size-full wp-image-98084\" src=\"https:\/\/version-2.com\/wp-content\/uploads\/2024\/11\/Zz2uNa8jQArT1D9l_which-saas-app.png\" alt=\"\" width=\"1640\" height=\"880\" srcset=\"https:\/\/version-2.com\/wp-content\/uploads\/2024\/11\/Zz2uNa8jQArT1D9l_which-saas-app.png 1640w, https:\/\/version-2.com\/wp-content\/uploads\/2024\/11\/Zz2uNa8jQArT1D9l_which-saas-app-300x161.png 300w, https:\/\/version-2.com\/wp-content\/uploads\/2024\/11\/Zz2uNa8jQArT1D9l_which-saas-app-1024x549.png 1024w, https:\/\/version-2.com\/wp-content\/uploads\/2024\/11\/Zz2uNa8jQArT1D9l_which-saas-app-768x412.png 768w, https:\/\/version-2.com\/wp-content\/uploads\/2024\/11\/Zz2uNa8jQArT1D9l_which-saas-app-1536x824.png 1536w, https:\/\/version-2.com\/wp-content\/uploads\/2024\/11\/Zz2uNa8jQArT1D9l_which-saas-app-18x10.png 18w\" sizes=\"(max-width: 1640px) 100vw, 1640px\" \/><\/p><h2>Moving forward with a proactive approach to SaaS data protection<\/h2><p>Ultimately, the goal is to be able to move from a state of \u201cmoderate confidence\u201d to one of complete assurance. Data breaches and regulatory penalties are on the rise, and so investing in a robust, independent backup strategy is no longer optional. A true backup solution (one which stores backup data copies in a cloud independent from the production data) will not only help you meet compliance standards but will also provide the resilience and continuity your organization needs to thrive. Read more about <a href=\"\/en\/blog\/cyber-insurance-cybersecurity-framework\/\" target=\"_blank\" rel=\"noopener\">creating a cybersecurity framework<\/a>.<\/p><p>Another key takeaway is this: If your backup data is stored in the same place as your production data, it\u2019s not really a backup. By investing in a purpose-built solution, you\u2019re protecting data AND you\u2019re strengthening your organization\u2019s resilience by creating a safety net that keeps your business running smoothly, even in a crisis or SaaS provider outage. <a href=\"\/en\/blog\/air-gapping-for-backup-data-resilience\/\" target=\"_blank\" rel=\"noopener\">Learn more about air gapping.<\/a><\/p><p>In the end, confidence in your SaaS data protection isn\u2019t just a nice-to-have; it&#8217;s a competitive advantage. Take the steps today to make sure your data is secure, accessible, and always within reach.<\/p><h2>Takeaway: Backup isn\u2019t just a safety net; it\u2019s a strategic investment<\/h2><p>Ultimately, having a true backup strategy for SaaS applications is not just about preventing worst-case scenarios. It\u2019s a proactive step that empowers your organization to maintain control over its data, ensure regulatory compliance, and prevent costly downtime. By implementing a reliable SaaS data backup solution, you\u2019re investing in resilience and building confidence that your business can withstand unexpected events, from cyberattacks to accidental deletions.<\/p><p>The lesson is clear: Don\u2019t wait for a crisis to rethink your data protection. Take action today to safeguard your SaaS data with a robust, purpose-built backup solution that keeps your organization\u2019s data secure, compliant, and always within reach.<\/p><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-0c5768c elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"0c5768c\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;9abbb0a&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-e987c36\" data-id=\"e987c36\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-73b3a92 elementor-widget elementor-widget-shortcode\" data-id=\"73b3a92\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"50842\" class=\"elementor elementor-50842\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-c1043a3 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"c1043a3\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-c911d7d\" data-id=\"c911d7d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-026fa41 elementor-widget elementor-widget-text-editor\" data-id=\"026fa41\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>About Keepit<\/strong><br \/>At Keepit, we believe in a digital future where all software is delivered as a service. Keepit\u2019s mission is to protect data in the cloud Keepit is a software company specializing in Cloud-to-Cloud data backup and recovery. Deriving from +20 year experience in building best-in-class data protection and hosting services, Keepit is pioneering the way to secure and protect cloud data at scale.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18103\" class=\"elementor elementor-18103\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a437045 elementor-widget elementor-widget-image-box\" data-id=\"a437045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">About Version 2 Digital<\/h3><p class=\"elementor-image-box-description\">Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.\n<br><br>\nThrough an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Here\u2019s why you might want to double check\u00a0 How confiden [&hellip;]<\/p>","protected":false},"author":149011790,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[853,1273,61],"tags":[854,1272],"class_list":["post-98079","post","type-post","status-publish","format-standard","hentry","category-keepit","category-1273","category-press-release","tag-keepit","tag-1272"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Are you confident in your SaaS data protection? - Version 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.keepit.com\/blog\/protecting-saas-data-confidently\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Are you confident in your SaaS data protection? - Version 2\" \/>\n<meta property=\"og:description\" content=\"Here\u2019s why you might want to double check\u00a0 How confiden [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.keepit.com\/blog\/protecting-saas-data-confidently\/\" \/>\n<meta property=\"og:site_name\" content=\"Version 2\" \/>\n<meta property=\"article:published_time\" content=\"2024-11-27T03:36:19+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/images.prismic.io\/keep-it\/Zz2nDa8jQArT1D1U_blog115-protecting-your-saas-data.png?auto=format,compress&amp;rect=0,0,2536,2536&amp;w=800&amp;h=800\" \/>\n<meta name=\"author\" content=\"tracylamv2\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"tracylamv2\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.keepit.com\\\/blog\\\/protecting-saas-data-confidently\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2024\\\/11\\\/are-you-confident-in-your-saas-data-protection\\\/\"},\"author\":{\"name\":\"tracylamv2\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\"},\"headline\":\"Are you confident in your SaaS data protection?\",\"datePublished\":\"2024-11-27T03:36:19+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2024\\\/11\\\/are-you-confident-in-your-saas-data-protection\\\/\"},\"wordCount\":1509,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.keepit.com\\\/blog\\\/protecting-saas-data-confidently\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/images.prismic.io\\\/keep-it\\\/Zz2nDa8jQArT1D1U_blog115-protecting-your-saas-data.png?auto=format,compress&amp;rect=0,0,2536,2536&amp;w=800&amp;h=800\",\"keywords\":[\"Keepit\",\"2024\"],\"articleSection\":[\"Keepit\",\"2024\",\"Press Release\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.keepit.com\\\/blog\\\/protecting-saas-data-confidently\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2024\\\/11\\\/are-you-confident-in-your-saas-data-protection\\\/\",\"url\":\"https:\\\/\\\/www.keepit.com\\\/blog\\\/protecting-saas-data-confidently\\\/\",\"name\":\"Are you confident in your SaaS data protection? - Version 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.keepit.com\\\/blog\\\/protecting-saas-data-confidently\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.keepit.com\\\/blog\\\/protecting-saas-data-confidently\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/images.prismic.io\\\/keep-it\\\/Zz2nDa8jQArT1D1U_blog115-protecting-your-saas-data.png?auto=format,compress&amp;rect=0,0,2536,2536&amp;w=800&amp;h=800\",\"datePublished\":\"2024-11-27T03:36:19+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.keepit.com\\\/blog\\\/protecting-saas-data-confidently\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.keepit.com\\\/blog\\\/protecting-saas-data-confidently\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.keepit.com\\\/blog\\\/protecting-saas-data-confidently\\\/#primaryimage\",\"url\":\"https:\\\/\\\/images.prismic.io\\\/keep-it\\\/Zz2nDa8jQArT1D1U_blog115-protecting-your-saas-data.png?auto=format,compress&amp;rect=0,0,2536,2536&amp;w=800&amp;h=800\",\"contentUrl\":\"https:\\\/\\\/images.prismic.io\\\/keep-it\\\/Zz2nDa8jQArT1D1U_blog115-protecting-your-saas-data.png?auto=format,compress&amp;rect=0,0,2536,2536&amp;w=800&amp;h=800\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.keepit.com\\\/blog\\\/protecting-saas-data-confidently\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\\\/\\\/version-2.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Are you confident in your SaaS data protection?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"name\":\"Version 2\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/version-2.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\",\"name\":\"Version 2\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"width\":1795,\"height\":335,\"caption\":\"Version 2\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\",\"name\":\"tracylamv2\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"caption\":\"tracylamv2\"},\"url\":\"https:\\\/\\\/version-2.com\\\/en\\\/author\\\/tracylamv2\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Are you confident in your SaaS data protection? - Version 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.keepit.com\/blog\/protecting-saas-data-confidently\/","og_locale":"en_US","og_type":"article","og_title":"Are you confident in your SaaS data protection? - Version 2","og_description":"Here\u2019s why you might want to double check\u00a0 How confiden [&hellip;]","og_url":"https:\/\/www.keepit.com\/blog\/protecting-saas-data-confidently\/","og_site_name":"Version 2","article_published_time":"2024-11-27T03:36:19+00:00","og_image":[{"url":"https:\/\/images.prismic.io\/keep-it\/Zz2nDa8jQArT1D1U_blog115-protecting-your-saas-data.png?auto=format,compress&amp;rect=0,0,2536,2536&amp;w=800&amp;h=800","type":"","width":"","height":""}],"author":"tracylamv2","twitter_card":"summary_large_image","twitter_misc":{"Written by":"tracylamv2","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.keepit.com\/blog\/protecting-saas-data-confidently\/#article","isPartOf":{"@id":"https:\/\/version-2.com\/2024\/11\/are-you-confident-in-your-saas-data-protection\/"},"author":{"name":"tracylamv2","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365"},"headline":"Are you confident in your SaaS data protection?","datePublished":"2024-11-27T03:36:19+00:00","mainEntityOfPage":{"@id":"https:\/\/version-2.com\/2024\/11\/are-you-confident-in-your-saas-data-protection\/"},"wordCount":1509,"commentCount":0,"publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"image":{"@id":"https:\/\/www.keepit.com\/blog\/protecting-saas-data-confidently\/#primaryimage"},"thumbnailUrl":"https:\/\/images.prismic.io\/keep-it\/Zz2nDa8jQArT1D1U_blog115-protecting-your-saas-data.png?auto=format,compress&amp;rect=0,0,2536,2536&amp;w=800&amp;h=800","keywords":["Keepit","2024"],"articleSection":["Keepit","2024","Press Release"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.keepit.com\/blog\/protecting-saas-data-confidently\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/version-2.com\/2024\/11\/are-you-confident-in-your-saas-data-protection\/","url":"https:\/\/www.keepit.com\/blog\/protecting-saas-data-confidently\/","name":"Are you confident in your SaaS data protection? - Version 2","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.keepit.com\/blog\/protecting-saas-data-confidently\/#primaryimage"},"image":{"@id":"https:\/\/www.keepit.com\/blog\/protecting-saas-data-confidently\/#primaryimage"},"thumbnailUrl":"https:\/\/images.prismic.io\/keep-it\/Zz2nDa8jQArT1D1U_blog115-protecting-your-saas-data.png?auto=format,compress&amp;rect=0,0,2536,2536&amp;w=800&amp;h=800","datePublished":"2024-11-27T03:36:19+00:00","breadcrumb":{"@id":"https:\/\/www.keepit.com\/blog\/protecting-saas-data-confidently\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.keepit.com\/blog\/protecting-saas-data-confidently\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.keepit.com\/blog\/protecting-saas-data-confidently\/#primaryimage","url":"https:\/\/images.prismic.io\/keep-it\/Zz2nDa8jQArT1D1U_blog115-protecting-your-saas-data.png?auto=format,compress&amp;rect=0,0,2536,2536&amp;w=800&amp;h=800","contentUrl":"https:\/\/images.prismic.io\/keep-it\/Zz2nDa8jQArT1D1U_blog115-protecting-your-saas-data.png?auto=format,compress&amp;rect=0,0,2536,2536&amp;w=800&amp;h=800"},{"@type":"BreadcrumbList","@id":"https:\/\/www.keepit.com\/blog\/protecting-saas-data-confidently\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/version-2.com\/"},{"@type":"ListItem","position":2,"name":"Are you confident in your SaaS data protection?"}]},{"@type":"WebSite","@id":"https:\/\/version-2.com\/zh\/#website","url":"https:\/\/version-2.com\/zh\/","name":"Version 2","description":"","publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/version-2.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/version-2.com\/zh\/#organization","name":"Version 2","url":"https:\/\/version-2.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","contentUrl":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","width":1795,"height":335,"caption":"Version 2"},"image":{"@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365","name":"tracylamv2","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","caption":"tracylamv2"},"url":"https:\/\/version-2.com\/en\/author\/tracylamv2\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQRKm-pvV","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/98079","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/users\/149011790"}],"replies":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/comments?post=98079"}],"version-history":[{"count":7,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/98079\/revisions"}],"predecessor-version":[{"id":98090,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/98079\/revisions\/98090"}],"wp:attachment":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/media?parent=98079"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/categories?post=98079"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/tags?post=98079"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}