Skip to content

Keepit 獲評 IDC MarketScape 2025-2026 年全球 SaaS 數據保護供應商評估領導者

丹麥哥本哈根 — 2025 年 12 月 16 日 — SaaS 數據保護公司 Keepit,今日宣布其在 IDC MarketScape:「2025-2026 年全球 SaaS 數據保護供應商評估」(文件編號 #US52971725,2025 年 12 月)中被評為領導者 (Leader)。

「我們建立 Keepit 是為了讓組織能夠控制他們的數據——無論發生什麼。我們相信被 IDC MarketScape 評為領導者,證實了我們架構的實力及其對客戶的影響。我們的獨立雲、不可變儲存以及對快速、直觀復原的專注,都反映了我們的信念:數據保護應該是簡單、安全並為未來做好準備的。」

— Frederik Schouboe,Keepit 聯合創始人兼首席遠見官 (Chief Visionary Officer)

Keepit 平台的覈心功能

Keepit 的定位植根於解決現代企業數據風險的關鍵平台差異化因素:

  • 供應商獨立的雲基礎設施: Keepit 在多個地區(歐盟、瑞士、英國、美國、加拿大、澳洲)營運其專用的雲中心。這確保了完全的數據主權,並消除了對公共雲供應商的儲存依賴。
  • 設計上不可變的架構: 專有的對象儲存使用類似區塊鏈的 Merkle 樹結構,保證了不可變的數據完整性。傳輸中和靜態數據的加密、邏輯氣隙隔離和異常偵測可進一步保護數據免受勒索軟體侵害。
  • 統一的多 SaaS 保護: 該平台為所有主要 SaaS 工作負載提供全面保護,包括 Microsoft 365、Entra ID、Salesforce、Google Workspace 和 Atlassian,所有這些都通過單一介面進行管理。
  • 進階復原和搜索: 諸如時間點快照、帶預覽的智能搜索以及跨用戶復原選項等功能旨在減少停機時間並在關鍵事件期間簡化災難復原。
  • 可預測、透明的定價: 基於席位的定價包括無限數據保留、零出口費用和無基於容量的收費。這消除了成本不確定性並簡化了預算編制。

專注於創新與獨立性

Keepit 通過擁有整個技術堆疊並避免第三方基礎設施來實現差異化。這種獨立性使公司能夠快速創新並滿足不斷變化的市場需求:

  • API 驅動、供應商中立的架構: 採用模組化設計,以便隨著業務需求的發展,快速接入新的 SaaS 應用程式。
  • 多租戶、MSP 就緒的功能: 包括針對託管服務供應商量身定制的白標和進階租戶管理功能,實現可擴展的服務交付。

Schouboe 補充道:「組織比以往任何時候都更依賴 SaaS,他們需要獨立、彈性且易於使用的保護。我們相信 IDC MarketScape 的認可強化了我們對提供一個滿足這些需求的平台的承諾——無論是在今天,還是在生態系統不斷演變的未來。」

 

關於 Keepit

Keepit 立足於為雲端時代提供新世代的 SaaS 資料保護。其核心理念是透過獨立於應用程式供應商的雲端儲存,為企業關鍵應用加上一道安全鎖,不僅強化網路韌性,更實現前瞻性的資料保護策略。其獨特、分隔且不可變的資料儲存設計,不涉及任何次級處理器,確保符合各地法規,有效抵禦勒索軟體等威脅,並保證關鍵資料隨時可存取、業務不中斷,以及快速高效的災難復原能力。總部位於丹麥哥本哈根的 Keepit,其辦公室與資料中心遍及全球,已贏得超過 15,000 家企業的深度信賴,客戶普遍讚譽其平台的直覺易用性,以及輕鬆、可靠的雲端資料備份與復原體驗。

關於Version 2

Version 2 Digital 是立足亞洲的增值代理商及IT開發者。公司在網絡安全、雲端、數據保護、終端設備、基礎設施、系統監控、存儲、網絡管理、商業生產力和通信產品等各個領域代理發展各種 IT 產品。透過公司龐大的網絡、通路、銷售點、分銷商及合作夥伴,Version 2 提供廣被市場讚賞的產品及服務。Version 2 的銷售網絡包括台灣、香港、澳門、中國大陸、新加坡、馬來西亞等各亞太地區,客戶來自各行各業,包括全球 1000 大跨國企業、上市公司、公用事業、醫療、金融、教育機構、政府部門、無數成功的中小企及來自亞洲各城市的消費市場客戶。

ESET Threat Report: AI-driven attacks on the rise; NFC threats increase and evolve in sophistication

ESET Research has released its H2 2025 Threat Report with statistics from June through November 2025.
NFC threats have continued to evolve in scale and sophistication, with several notable upgrades and new malicious campaigns seen in H2 2025.
ESET observed several improvements in scams including higher-quality deepfakes, signs of AI-generated phishing sites, and short-lived ad campaigns to avoid detection.
Even though Lumma Stealer managed to come back after the May 2025 disruption, its detections declined by 86% in H2 2025.

BRATISLAVA — December 16, 2025 — ESET Research has released its latest Threat Report, which summarizes threat landscape trends seen in ESET telemetry and from the perspective of both ESET threat detection and research experts, from June through November 2025.  AI-powered malware moved from theory to reality in H2 2025, as ESET discovered PromptLock – the first known AI-driven ransomware, capable of generating malicious scripts on the fly. While AI is still mainly used for crafting convincing phishing and scam content, PromptLock – and the handful of other AI-driven threats identified to this day – signal a new era of threats.

“Fraudsters behind the Nomani investment scams have also refined their techniques – we have observed higher-quality deepfakes, signs of AI-generated phishing sites, and increasingly short-lived ad campaigns to avoid detection,” says Jiří Kropáč, Director of ESET Threat Prevention Labs. In ESET telemetry, detections of Nomani scams grew 62% year-over-year, with the trend declining slightly in H2 2025. Nomani scams have recently been expanding from Meta to other platforms, including YouTube.

On the ransomware scene, victim numbers surpassed 2024 totals well before year’s end, with ESET Research projections pointing to a 40% year-over-year increase. Akira and Qilin now dominate the ransomware-as-a-service market, while low-profile newcomer Warlock introduced innovative evasion techniques. EDR killers continued to proliferate, highlighting that endpoint detection and response tools remain a significant obstacle for ransomware operators.

On the mobile platform, NFC threats continued to grow in scale and sophistication, with an 87% increase in ESET telemetry and several notable upgrades and campaigns observed in H2 2025. NGate  – a pioneer among NFC threats, first discovered by ESET– received an upgrade in the form of contact stealing, likely laying the groundwork for future attacks. RatOn, entirely new malware on the NFC fraud scene, brought a rare fusion of remote access trojan (RAT) capabilities and NFC relay attacks, showing cybercriminals’ determination to pursue new attack avenues. RatOn was distributed through fake Google Play pages and ads mimicking an adult version of TikTok, and a digital bank ID service.  PhantomCard – new NGate-based malware adapted to the Brazilian market – was seen in multiple campaigns in Brazil in H2 2025.

Furthermore, after its global disruption in May, the Lumma Stealer infostealer managed to briefly resurface – twice – but its glory days are most likely over. Detections plummeted by 86% in H2 2025 compared to the first half of the year, and a significant distribution vector of Lumma Stealer – the HTML/FakeCaptcha trojan, used in ClickFix attacks – nearly vanished from ESET telemetry.

Meanwhile, CloudEyE, also known as GuLoader, surged into prominence, skyrocketing almost thirtyfold according to ESET telemetry. Distributed via malicious email campaigns, this malware-as-a-service downloader and cryptor is used to deploy other malware, including ransomware, as well as infostealer juggernauts such as Rescoms, Formbook, and Agent Tesla. Poland was most affected by this threat, with 32% of CloudEyE attack attempts in H2 2025 detected here.

For more information, check out the ESET Threat Report H2 2025 on WeLiveSecurity.com. Make sure to follow ESET Research on Twitter (today known as X), BlueSky, and Mastodon for the latest news from ESET Research.

 

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

FSLogix Deep Dive: The Ultimate VDI Configuration Guide (2025)

As a solution engineer who has been in the trenches with VDI and Terminal Servers since the days of Windows NT 4.0, I’ve seen profile management evolve from a chronic pain point to a solved problem. The solution? FSLogix.

Before Microsoft acquired it, FSLogix was the “secret weapon” that VDI architects used to fix the unfixable. Today, it’s the default, non-negotiable standard for any modern VDI or multi-session Windows deployment, especially Azure Virtual Desktop (AVD).

This deep-dive guide will cover its uses, advanced configurations, and best practices for building a resilient, high-performance deployment, including specific GPO settings for clustered environments.

The FSLogix Toolkit: What It Is and Why You Need It

At its core, FSLogix is a set of tools designed to decouple the user profile from the Windows operating system. In non-persistent VDI, where a user’s virtual machine is destroyed or reset at logoff, this is essential.

Instead of copying a roaming profile (which is slow, fragile, and a primary cause of slow logins), FSLogix mounts a user’s profile, stored in a VHDX (virtual disk) file on a network share, directly into the OS at login. It’s instant, seamless, and transparent to Windows.

The FSLogix suite includes:

  • Profile Container: This is the main component. It captures the entire user profile (C:\Users\<username>) and redirects it to the VHDX. This includes all app settings, registry keys (NTUSER.dat), and user data.
  • Office Container (ODFC): This component only redirects the data for Microsoft 365 apps (Outlook cache .ost, Teams data, OneDrive cache, etc.).
  • Application Masking: A powerful tool that allows you to “hide” applications, drivers, or fonts from specific users, even if they are installed on the base image. This dramatically simplifies “golden image” management.
  • Java Redirection: A niche component to manage multiple versions of Java for specific applications.

The Great Debate: Profile Container vs. ODFC

This is the most common point of confusion. Let’s be clear:

Best Practice: In 99% of new deployments, you should use only the Profile Container.

Do NOT use a separate Profile Container and a separate Office Container. This is a common-sense myth that adds complexity, doubles the VHDX files to manage, and increases points of failure.

The Profile Container already captures all Office data. The only reason ODFC exists as a separate component is for legacy environments that already have another profile solution (like Citrix UPM or VMware DEM) and just want to add FSLogix to fix Office performance.

In your Group Policy (GPO) or registry settings, you simply configure the Profile Container Enabled = 1 and ensure Office data is included.

FSLogix Cluster & GPO Configuration

FSLogix Clusters are fundamental for ensuring user profile persistence. In this model, each “cluster node” is typically a high-availability file server (like a Windows Server 2022 Scale-Out File Server) that provides dedicated, fault-tolerant storage for the dynamic profile VHDX files.

This guarantees session consistency across different VDI hosts. Configuration is applied and managed through GPOs (Group Policy Objects), ensuring standardization and centralized governance throughout the environment. Each VDI instance uses the FSLogix Agent to connect to the cluster share over SMB (port 445).

FSLogix Configuration Parameters (via GPO)

Here is a baseline set of GPO settings for a production environment. These settings are applied via GPO, which writes the corresponding values to the registry.

Find the detailed parameters on The following link: FSLogix Cluster Sizing and Configuration

Here is a copy-ready deep-dive on FSLogix, integrating your specific configuration parameters.

Advanced Optimization & Resilience

Getting the GPOs set is step one. Making it fly and never fail is step two.

1. Optimization: The Redirections.xml File

This is the most powerful optimization tool. The Redirections.xml file allows you to exclude “junk” data from being saved in the user’s profile container. By excluding data, you keep the VHDX small, logins fast, and network traffic low.

A good Redirections.xml file should exclude:

  • Browser caches (Chrome, Edge, Firefox)
  • Temp folders
  • Windows Search and Update logs
  • Teams cache (FSLogix now handles Teams data very well natively, but some still exclude the media-stack folder).

You place this file on your network share and point to it in your GPO using the RedirectionXMLSourceFolder setting.

2. Resilience: Antivirus Exclusions (Non-Negotiable)

This is the #1 cause of profile corruption and performance issues. Your VDI session hosts must exclude the FSLogix processes and file locations from real-time antivirus scanning.

Process Exclusions:

  • frxsvc.exe
  • frxshell.exe
  • frxccd.exe (if using Cloud Cache)

File/Directory Exclusions:

  • %ProgramFiles%\FSLogix
  • %APDATA%\FSLogix
  • The network share(s) where your VHDX files are stored.
  • File Extensions: .vhd, .vhdx

3. High Availability: Cloud Cache vs. Storage-Level HA

You have two main ways to achieve high availability.

Storage-Level HA (Your “Cluster” Model):

This is the easiest and most reliable method. You use a storage solution that is already highly available (like a Windows Server 2022 Scale-Out File Server, a cluster, or Azure Files ZRS). You then set a single path in VHDLocations. If a storage node fails, the storage cluster handles it transparently.

FSLogix Cloud Cache (Recommended for DR):

Cloud Cache is the FSLogix-native HA solution. You configure multiple storage locations (e.g., one on-prem, one in Azure). FSLogix writes to a local cache on the VDI host first, then asynchronously replicates changes to all storage locations. This is more complex but provides true active-active access and disaster recovery.

4. Network Settings: The Unsung Hero

Your VDI session hosts and your file server must be as close as possible.

  • Same Datacenter/Region: Never route core FSLogix traffic over a WAN.
  • Same Subnet (Zero Latency): FSLogix traffic (SMB/445) is highly sensitive to latency. Place your VDI session hosts (clients) and your FSLogix file share on the same subnet. This eliminates any firewall, router, or traffic inspection device from the data path. Even a tiny delay from a firewall policy check can cause login slowdowns and profile hangs.
  • Enable SMB Multichannel: Allows Windows to use multiple network connections to your file share, increasing throughput and resiliency.

Expert Tips: FSLogix with Thinfinity VDI on OCI

This is a great, modern stack. Thinfinity is a VDI broker that is “infrastructure agnostic,” meaning it can manage session hosts anywhere—including OCI. FSLogix is the agent on those OCI session hosts.

Here’s how to make them work together perfectly.

  • Thinfinity and FSLogix are Partners: Thinfinity manages the connection, and FSLogix manages the profile inside the session. They don’t conflict; they complement each other. The Thinfinity non-persistent/multi-session model requires a solution like FSLogix.
  • Authentication is King (Active Directory): FSLogix requires Active Directory. Your OCI-based VDI session hosts must be joined to an Active Directory domain. This means you must have Domain Controllers running on OCI Compute instances or have a line-of-sight connection (via OCI FastConnect or VPN) back to your on-prem AD.
  • Storage on OCI: Your best bet is OCI File Storage. It’s a managed, zonal, high-performance file service that supports the SMB protocol.
    1. Create a File System in OCI.
    2. Create a Mount Target in the same VCN and Availability Domain as your Thinfinity session hosts.
    3. Configure the VCN Security Lists (firewall) to allow SMB (TCP/445) traffic only from your session host subnet to the File Storage subnet.
  • OCI Network Latency: The “same AD” principle is critical in OCI. OCI’s Availability Domains are physically separate datacenters. While cross-AD latency is low, for the absolute best performance, your session host pools and your OCI File Storage mount target should reside in the same Availability Domain.

Conclusion: It Is Not an Add-On

FSLogix is not merely a “feature” or an “add-on” for a VDI deployment; it is the cornerstone of the modern user experience. It has single-handedly solved the decades-old problem of profile management, transforming non-persistent VDI from a compromise into a high-performance, user-centric solution.

However, as this guide has demonstrated, a successful FSLogix deployment is an exercise in precision. The difference between a high-performance environment and a support-ticket nightmare lies not in if you use FSLogix, but how.

Success is built on a foundation of three pillars:

  • Low-Latency, High-Availability Storage: Your profile solution is only as reliable as the file cluster it runs on.
  • An Unobstructed Network Path: Placing VDI hosts and storage on the same subnet, free from inspection, is the single most effective way to guarantee fast logins.
  • Intelligent Configuration: From GPOs to Redirections.xml, optimization is about what you exclude as much as what you include.

When architected correctly—with the same engineering rigor you apply to your VDI hosts and network—FSLogix becomes the silent, invisible hero of your virtual desktop infrastructure. It delivers the one thing that matters most: a user experience that is fast, resilient, and never gets in the way.

About Cybele Software Inc.
We help organizations extend the life and value of their software. Whether they are looking to improve and empower remote work or turn their business-critical legacy apps into modern SaaS, our software enables customers to focus on what’s most important: expanding and evolving their business.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

如何通過角色型存取控制賦予 MSP 靈活的安全性

在 MSP 領域,對客戶組織中的每個人應用相同的存取安全策略——例如相同的密碼長度、輪換週期和 MFA 要求——通常帶來的問題多於解決的問題。這迫使需要嚴格保護的高風險 IT 人員遵循與低風險一線用戶相同的基本策略。不可避免的結果是:策略對於關鍵角色而言過於薄弱,或者過於繁瑣以至於標準用戶會尋找規避方法,從而產生管理摩擦和危險的安全漏洞。

什麼是角色型存取控制(RBAC)?

角色型存取控制(RBAC)是根據工作職能而非個人身份來定義用戶存取的機制。管理員不再需要手動為每個員工授予存取權限,而是根據他們的職責將人員分配到角色中(例如,「財務部門」、「二級支援技術人員」)。每個角色都帶有一組預定義的權限,指定用戶可以存取哪些系統、數據或資源。

對於 MSP 而言,RBAC 的真正價值在於一致性和自動化。您只需定義一次角色——例如「二級支援技術人員」——並為其分配一組特定且高度安全的權限(例如,存取客戶 A 的系統,並有權為客戶 B 的系統自動填寫憑證,但不能查看原始密碼)。這簡化了複雜的多客戶存取管理,使入職和離職等流程幾乎自動化、可稽核且一致。

NordPass RBAC 為管理員帶來了什麼變化?

NordPass 的角色型存取控制為 MSP 管理員提供了對安全策略應用的精細控制。管理員不再受限於一個通用的公司政策;他們可以為不同的用戶群組客製化密碼策略,精確地將安全級別與其角色及其處理的數據相匹配。

  • 高風險優化: 您可以專門針對 IT 管理員或財務團隊等高風險群組,強制執行更嚴格的策略——要求更高的複雜性、更快的密碼輪換或強制多重因素驗證 (MFA)。
  • 簡化高階主管存取: 相反,RBAC 允許您簡化高階主管(如 CEO)的存取,他們只需要存取少量任務關鍵型、低輪換頻率的密碼,避免不必要的摩擦,同時保持強大的基礎安全。

這種平衡意味著您不再需要在強大的安全性和滿意的用戶之間做出選擇;透過 NordPass 提供的精確性和細緻度,您可以兩者兼得。

集中管理與客製化安全

NordPass 之所以超越競爭對手(他們通常依賴僵化、統一的政策),在於它提供了兩全其美的優勢。有了 NordPass MSP 管理面板,您可以獲得最大的益處:

  • 集中化效率: 從一個整合的儀表板查看所有客戶、管理許可證並監控使用數據。
  • 精確控制: 該面板充當安全網關,允許您無需切換工具即可存取和應用客戶個別管理面板中的特定角色型安全更改。

這種雙重優勢對於擴展業務至關重要。當客戶重組或招募新部門時,NordPass 確保您可以即時更新其安全策略,保證無縫過渡,而不會犧牲管理效率。

以靈活性滿足合規要求

對於服務於高度監管客戶(金融、醫療保健、法律)的 MSP 來說,合規性是業務成本。幸運的是,RBAC 與稽核員的要求完美契合,特別是安全性的黃金標準:最小權限原則(PoLP)。

由於策略是由角色定義並集中執行的,NordPass 為您提供了清晰、不可否認的稽核證據。您無需手忙腳亂地證明臨時員工無法存取受保護的健康資訊 (PHI),或實習生無法匯出客戶數據。您的已定義角色型設定會自動處理這些問題,從而簡化合規負擔,並確保在保留靈活管理控制的同時,客戶組織的存取協議是安全且完全可稽核的。

「管理存取權限不必是令人頭痛的難題。有了 NordPass 作為 MSP 密碼管理器,您可以快速為客戶組織中的新部門佈建存取權限,簡化高階主管的登入流程而不損害合規性,並從一個集中式儀表板管理所有權限。」

關於 NordPass
NordPass 由領先全球網路安全產品市場的 Nord Security 公司開發。網路已成為一個混亂的空間,網路犯罪和資料保護問題損害了安全和信任。因此,我們團隊的全球使命是為世界各地的人們塑造一個更值得信賴、更和平的線上未來。

關於Version 2

Version 2 Digital 是立足亞洲的增值代理商及IT開發者。公司在網絡安全、雲端、數據保護、終端設備、基礎設施、系統監控、存儲、網絡管理、商業生產力和通信產品等各個領域代理發展各種 IT 產品。透過公司龐大的網絡、通路、銷售點、分銷商及合作夥伴,Version 2 提供廣被市場讚賞的產品及服務。Version 2 的銷售網絡包括台灣、香港、澳門、中國大陸、新加坡、馬來西亞等各亞太地區,客戶來自各行各業,包括全球 1000 大跨國企業、上市公司、公用事業、醫療、金融、教育機構、政府部門、無數成功的中小企及來自亞洲各城市的消費市場客戶。

×

Hello!

Click one of our contacts below to chat on WhatsApp

×