Skip to content

Keepit presents roadmap for the future of data protection

Data backup and recovery capabilities have not kept pace with the rapid adoption of SaaS applications in businesses. Keepit is changing that.

Copenhagen, Denmark — April 2, 2025 — Keepit, the world’s only independent, cloud-native data protection, backup and recovery provider, today announced a product roadmap designed to future-proof the cyber resilience of organizations navigating an increasingly complex threat landscape.

As companies rapidly adopt SaaS applications, backup and recovery capabilities have not kept pace, leaving critical business data vulnerable to outages, cyber threats, and compliance risks. In effect, companies are onboarding numerous applications without proper backup and recovery solutions. The average enterprise uses approximately 112 SaaS applications, according to BetterCloud research.

This means a significant amount of business data—critical and otherwise—is not being backed up and, therefore, cannot be recovered or restored. This poses serious risks to business continuity, security, and compliance.

And organizations are clearly concerned about and focusing on closing that gap—as analyst firm Gartner states, by 2028, 75% of enterprises will prioritize backup of SaaS applications as a critical requirement, compared to just 15% in 2024.

“Legacy backup and recovery solutions are not able to adapt and scale to rise to that challenge. Having a platform that is purpose-built for the cloud is a clear advantage to us, because it enables us to build exactly what our customers and the markets need,” says Michael Amsinck, Keepit’s Chief Product and Technology Officer.

To address the realities of the new SaaS landscape, Keepit has been developing its unique data protection platform and now presents two major enhancements to its solution.

Covering more cloud apps: From eight to hundreds in three years

  • Introducing the ability to back up and recover data from many more SaaS applications. This is made possible by our new Domain-Specific Language (DSL), which accelerates development for each application while seamlessly integrating with the unique Keepit platform. The rollout begins with seven applications in 2025 Jira, Bamboo, Okta, Confluence, DocuSign, Miro, Slack with rapid expansion to follow. The ultimate goal is full coverage of all SaaS applications used by enterprises, spanning HR, finance, sales, production, and more.

New and improved capabilities: One source of data truth

  • Anomaly detection: Provides enhanced monitoring, compliance, and security insights, enabling proactive identification of irregularities. Anomaly detection will be available to Keepit customers in early May, 2025.
  • Data protection dashboards: Offers centralized control and simplified reporting, enhancing visibility and management of data protection efforts. Data protection dashboards were made available to Keepit customers in January 2025.

With these upgrades, Keepit will offer a comprehensive backup and recovery solution for all SaaS applications, ensuring full control of data regardless of unforeseen events such as outages, malicious attacks, or human error.

Purpose-built for full control

This groundbreaking approach to SaaS backup and recovery is made possible by Keepit’s unique, intelligent, cloud-native, purpose-built architecture.

“With continued enhancements, Keepit ensures businesses can back up, recover, and protect all SaaS data efficiently. We control our stack. We control our data centers. We control our cloud. Ultimately, we control every aspect of our solution,” said Michael Amsinck.

Building on existing strengths

The new capabilities and expanded coverage build upon the existing strengths of the Keepit platform, including:

  • Data centers: Keepit operates data centers in multiple regions, including the United States, Canada, Australia, Germany, Switzerland, Denmark, and the United Kingdom. These data center regions are completely isolated from one another, ensuring full data sovereignty for customers. Because Keepit owns its cloud and stores data in local data centers, customers can back up their data independently of Privacy Shield agreements.
  • Air-gapping: Logical air-gapping ensures that backed-up data is segregated and protected through a combination of encryption, hashing algorithms, and role-based access controls, creating a secure barrier around sensitive information.
  • Immutable storage: Built on a resilient, independent cloud architecture, Keepit ensures every backup remains unalterable and protected, safeguarding against threats and ensuring business continuity.
  • API-first architecture: Seamlessly integrates with security information and event management (SIEM) systems, keeping security teams informed of potential risks.
  • Effortless data protection: Keepit’s intuitive interface allows for quick setup and seamless integration across all key applications, enabling users to manage backups and restores without complexity or extensive training.
  • Unlimited hot storage: Keepit provides instant access to all backups via always-hot storage, eliminating storage fees and allowing users to set unique retention policies across different connectors, from short-term to 99-year retention.
  • Comprehensive audit logs: Track every action with Keepit’s audit log, accessible via the UI or API for third-party integration. Compliance features ensure adherence to regulations such as GDPR, NIS2, and HIPAA, with secure access controls.
  • Scalable and secure: Engineered for the cloud, Keepit’s platform offers scalable, API-driven backup solutions designed to meet the demands of modern businesses, ensuring data protection strategies evolve alongside SaaS environments.

 

Download the report

 

Defining data governance and data classification

So, what is data governance and how does it relate to cyber resilience?

Existing under the broad umbrella of data management, data governance is a program — implemented via policies and standards — intended to ensure the availability, quality, and security of an organization’s data in accordance with applicable regulations and obligations (e.g., adhering to industry standards, fulfilling requirements for certifications, etc.).

Within data governance, data classification is the process of separating and organizing data into relevant groups (“classes”) based on their shared characteristics, such as the level of sensitivity, risks they present, and the compliance regulations that protect them.

Data governance underpins cyber resilience plans

An intelligent data governance program delivers several beneficial outcomes for organizations:

  • It helps to ensure the availability, quality, and security of an organization’s data, making it a foundational pillar of business continuity.
  • Data governance helps improve overall data accuracy and impacts outcomes based on that data — which can range from comparatively simple day-to-day business decisions and operations to more complex, forward-looking initiatives including AI-focused programs.
  • It helps to support organizational efforts to comply with regulations and other obligations, making it a cornerstone of compliance.
  • An effective data governance program also permeates the entire organization, increasing data literacy, data accessibility, and data scalability.

Do you know where your data is?

Of course, disaster recovery planning cannot start without a clear understanding and mapping of your data and its significance to your business. What data is crucial for us to continue running our operations? Who needs access to which data to do their job? Where do we store all of this critical data?

Knowing the answers to these questions will start your journey towards ensuring continuity in cases of data loss or cyberattacks. This is achieved through an efficient and effective data governance framework.

I hope that, with our new report in hand, CISOs and CIOs will be able to future-proof their modern, data-driven enterprises through effective data governance.

About Keepit’s new report, “Intelligent data governance: Why taking control of your data is key for operational continuity and innovation.”

Our report takes a practical approach to data governance by offering a resource to organizations for creating or adopting a framework that works best for them.

Key takeaways from the report:

-Major trends shaping enterprise IT

-The importance of “always-on” data

-Resilience against data loss and corruption

-Data governance as an investment

-A practical approach to data governance

-10 questions for board discussions

Get the full report

About Keepit
At Keepit, we believe in a digital future where all software is delivered as a service. Keepit’s mission is to protect data in the cloud Keepit is a software company specializing in Cloud-to-Cloud data backup and recovery. Deriving from +20 year experience in building best-in-class data protection and hosting services, Keepit is pioneering the way to secure and protect cloud data at scale.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

ESET Launches Ransomware Remediation and AI Advisor Updates at ESET World 2025

  • ESET adds Ransomware Remediation to the ESET PROTECT Platform – offering next-gen ransomware rollback enhanced with remediation features. Working in tandem with ESET’s proprietary Ransomware Shield, Ransomware Remediation enables comprehensive rollback through automated file restoration from secure backups, limiting threat actor attempts to raise remediation costs.
  • ESET Cloud Office Security module updated with anti-spoofing and homoglyph protection, profoundly improving email security.
  • ESET has also expanded the availability of AI Advisor to its EDR/XDR customers, including those with ESET PROTECT Enterprise, ESET PROTECT Elite, and ESET PROTECT MDR subscriptions – while making performance updates.

LAS VEGAS, Nev.March 25, 2025 — ESET, a global leader in cybersecurity solutions, today released new updates for the ESET PROTECT Platform, including Ransomware Remediation, a new way to prevent ransomware encryption from causing long-term business disruption, as well as new functionalities for ESET Cloud Office Security and the ESET AI Advisor. These new cybersecurity features were launched at ESET World 2025, taking place in Las Vegas from March 24 to 26, 2025, at the ARIA Resort & Casino.

As ransomware attacks increase in sophistication, threat actors seek to undermine nearly all areas of business security and stability. One well-known and -used attack is encryption, which prevents you from accessing your device and the data stored on it. Causing costly process disruption, and ultimately forcing firms to pay to decrypt their systems, threat actors often target system backups, such as Volume Shadow Copy, by immediately deleting or corrupting them. This makes recovery nearly impossible and drives up remediation costs.

Building on ESET LiveSense, ESET’s next-gen Ransomware Remediation feature works in concert with Ransomware Shield to immediately create backups until the system confirms whether the suspicious activity is malicious or benign. If malicious, Ransomware Shield will kill the process and roll back the files from the newly created secure backups. If benign, the backups created can be discarded. Unlike other solutions, Ransomware Remediation has its own protected storage section on the drive, where files cannot be modified, corrupted, or deleted by the attacker. This differentiator actively solves one of the most common failings of regular backups during a ransomware attack. As a free addition for customers signed up for the ESET PROTECT Advanced tier and above, Ransomware Remediation is available for Windows-based systems.

“ESET has a history of innovation in mitigating ransomware, both in the context of our endpoint security platform, our service offerings such as ESET MDR, and our part in the ‘No More Ransom’ initiative, which partners with law enforcement and IT Security companies to disrupt cybercriminal businesses with ransomware connections,” said Michal Jankech, Vice President, Enterprise & SMB/MSP at ESET. “ESET’s Ransomware Remediation delivers comprehensive Ransomware defense, from encryption, theft and data holding. Easy to use, ESET’s Ransomware Remediation offers businesses peace of mind as we help them in the fight against ransomware.”

Email Security and AI Advisor Updates

ESET has added anti-spoofing and homoglyph protection to its ESET Cloud Office Security module, preventing attackers from pretending to be trusted sources while also identifying their efforts to disguise malicious domains or URLs through letter substitution from other alphabets. Moreover, ESET Cloud Office Security now also has an email clawback feature, enabling swift recall and quarantine of any delivered emails deemed suspicious. New dashboards are visually enhanced and include fully customizable tabs and components that fit a user’s specific needs.

ESET has also expanded the availability of AI Advisor to its EDR/XDR customers, including those with ESET PROTECT Enterprise, ESET PROTECT Elite, and ESET PROTECT MDR subscriptions – while making performance updates. By investing in AI, businesses are able to access SOC-level advisory, enabling enhanced security analyst workflows. Unlike other vendor offerings and typical generative AI assistants that focus on soft features like administration or device management, ESET AI Advisor seamlessly integrates into the day-to-day operations of security analysts. This is a gamechanger for companies with limited IT resources that want to utilize the advantages of advanced XDR solutions and threat intelligence feeds.

For more information about the ESET LiveSense technologies used by the ESET PROTECT Platform, please visit here.

For more information about the ESET PROTECT Platform, please visit our dedicated webpage.

For more information about ESET Cloud Office Security and the ESET AI Advisor, please visit our webpage and our AI blog.

To discover how ESET has been handling ransomware, please read ESET MDR success stories and ESET Inspect’s preventive power.

 

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

5 Crucial Reasons Immutable Backups Are Your Best Defense Against Ransomware

Ransomware attacks have become a big concern for individuals and businesses since they compromise networks and keep priceless data hostage for payoff. These attacks usually result in major financial losses, operational disturbances, and ruined reputations. By 2025, global ransomware expenditures are projected to reach $10.5 trillion yearly. Given such high stakes, organizations must strengthen their defenses against these malevolent hazards.

Using immutable backups is one very effective way to combat ransomware. They provide unchangeable and dependable defenses against data loss brought on by ransomware assaults. Unlike traditional backup systems, immutable backups are made to withstand manipulation, guaranteeing that your vital information stays safe and available even should a breach occur.

This blog will examine why every business should consider including immutable backups in its cybersecurity plan.

What Are Immutable Backups and How Do They Work?

Once produced, immutable backups—copies of data—are not changeable or deletable. This function ensures that the data remains intact and safe, providing a consistent recovery source should a system fail, accidental deletions occur, or cybercrime strike. Using Write Once, Read Many (WORM) technology, these backups guarantee that once data is entered, it cannot be erased or modified.

The degree of security is where immutable backups differ from local backups. Traditional backups, while crucial, are prone to human mistakes or attack vulnerabilities. Often targeting backup systems, cybercriminals destroy or alter backup copies to block recovery following a ransomware assault. Conversely, immutable backups—which offer an unchangeable backup—are meant to be resilient to these hazards.

Even for administrators with enhanced rights, immutable backups are kept in settings that prevent data from being rewritten or erased. This extra layer of security guarantees that backup data stays safe, giving organizations a reliable source for disaster recovery free from manipulation concerns.

Learn more about how data protection software can help you proactively address cyber threats: Data Protection Against Ransomware

Reasons Why Immutable Backups Are Vital Against Ransomware

Immutable backups have proven to be the best approach to preventing ransomware attacks. You need them for several reasons, including:

  • Immutable Backups Create an Unchangeable Data Snapshot 

One of the most potent features of immutable backups is their capacity to produce unchangeable data snapshots. A snapshot represents the exact state of your files or systems at the moment of capture. Immutable snapshots guarantee data integrity since they cannot be changed once produced.

Traditional backups are a big risk since they are flexible and can be changed either intentionally or unintentionally. A hacker or insider threat might access the backup files and alter or destroy them, compromising your recovery options. Conversely, immutable snapshots eliminate this risk since the storage system design forbids data change attempts.

These images are a reliable source of recovery, as their unchangeable character guarantees a precise record of your data at particular moments. Immutable snapshots help restore systems to their original, uncorrupted condition in case of a ransomware attack or system failure, guaranteeing minimum data loss and business interruption.

  • Safeguarding Ransomware Attack Backups 

Targeting backup systems as vital recovery tools, ransomware assaults are progressively focusing on them. Attackers typically encrypt or destroy backup files when they compromise a network to stop recovery, compelling businesses to pay a ransom to regain access to their data. Nonetheless, immutable backups offer vital protection since they guarantee that backup data cannot be changed or deleted even in cases of network administrator access by attackers.

The main virtue of these technologies is their resistance to ransomware. Ransomware cannot encrypt or destroy the backup copies since the data is locked and safeguarded by methods including WORM and encryption. Organizations may relax even if the primary data is hacked, knowing their unchangeable backups remain unharmed and ready for swift restoration.

This function is crucial to stopping the cycle of paying ransom or coping with a prolonged outage. Without turning to paying attackers, immutable backups offer a dependable approach to recovering from ransomware events.

  • Enhance Business Continuity 

Business continuity in the case of ransomware attacks or other disasters depends on timely and effective recovery capability. Ensuring that your company may recover without significant data loss or downtime depends mostly on immutable backups. Unchangeable copies of your data allow businesses to quickly resume activities by means of immutable backups, providing a consistent recovery point.

Recovering data in damaged traditional backup systems may take days, weeks, or even months. With immutable backups, however, companies can restore critical systems in hours, lowering downtime and lessening the effect on business operations. Using immutable backups has helped many businesses significantly increase continuity following attacks and claim far faster recovery times.

With immutable backups, for example, a financial services organization can rapidly restore transaction records in the case of an attack, guaranteeing no disturbance of consumer services or regulatory compliance. To ensure continuous treatment, healthcare professionals can also maintain constant access to vital health data and patient information.

Even with the most disruptive cyber threats, businesses may lower their risk of downtime, hasten their recovery, and preserve business continuity by including immutable backups in their disaster recovery strategies.

  • Ensuring Regulatory Compliance 

In fields like healthcare, financial services, and legal advice, operational efficiency and regulatory compliance depend on maintaining data integrity. Many laws, including HIPAA for healthcare or GDPR for data protection, demand companies retain and protect data to prevent undesired access or alteration.

Immutable backups are excellent tools for satisfying these compliance criteria. They guarantee that data is kept in its natural, authentic condition, offering a reliable record for legal and audit needs since they cannot be changed or deleted. For instance, immutable backups help healthcare firms meet regulatory data retention requirements by preserving patient records.

For regulatory audits, unchangeable backups give a clear, tamper-proof data storage record, helping organizations demonstrate industry compliance and avoid hefty penalties or legal action.

Learn more about NIS2 and DORA regulations.

  • Associated Cost-Efficiency 

Although initial setup costs may involve immutable backups, the cost savings greatly exceed the expenditure over time. Traditional backup systems may require extensive resources to run and maintain. In the case of a ransomware attack, the financial load of paying a ransom or restoring lost data might be exorbitant.

Conversely, immutable backups provide a reasonably priced defense against ransomware infections. By keeping attackers from changing or deleting backup files, organizations can avoid the need for costly ransomware payments. Businesses can also avoid the high expenses of lost productivity, data recovery initiatives, and extended downtime.

Many companies implementing immutable backup systems see notable reductions in operational downtime and recovery expenses. Organizations can rely on immutable backups to rapidly restore data instead of expensive data recovery tools, lowering the need for outside intervention.

How Storware Protects Data from Ransomware

Storware Backup and Recovery empowers businesses to fortify their data defenses against ransomware with robust immutable backup capabilities. By leveraging write-once-read-many (WORM) storage, Storware ensures that backup data remains unalterable, preventing malicious encryption or deletion. This immutability guarantees a clean, reliable recovery point, even if primary systems are compromised. Storware’s platform seamlessly integrates with various storage solutions, enabling organizations to implement immutable backups across diverse environments, from virtual machines and cloud instances to containerized workloads. This comprehensive approach provides a resilient data protection strategy, minimizing downtime and safeguarding critical information against evolving cyber threats.

In Summary

Any complete cybersecurity plan must include unquestionable backups. They provide unparalleled defense against ransomware attacks by guaranteeing data integrity and security. They also enable rapid recovery and help minimize downtime. Immutable backups stop data alteration, providing a consistent answer for business continuity, compliance, and catastrophe recovery.

If you haven’t, now is the moment to apply immutable backups inside your organization. Use this strong defense system to safeguard your data and guarantee business continuity before it is too late.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Storware
Storware is a backup software producer with over 10 years of experience in the backup world. Storware Backup and Recovery is an enterprise-grade, agent-less solution that caters to various data environments. It supports virtual machines, containers, storage providers, Microsoft 365, and applications running on-premises or in the cloud. Thanks to its small footprint, seamless integration into your existing IT infrastructure, storage, or enterprise backup providers is effortless.

×

Hello!

Click one of our contacts below to chat on WhatsApp

×