Skip to content

Portnox Honored as Finalist of the 2025 SC Awards

Company recognized in the Best Authentication Technology category for the second consecutive year.

AUSTIN, TX – April 10, 2025 – Portnox is proud to announce that it has been named a finalist in the prestigious 2025 SC Awards. Portnox has been recognized in the Best Authentication Technology category for the second consecutive year.

“Authentication methods continue to evolve, driven by the need for stronger, frictionless security. Finalists in this category highlight a clear industry trend toward user-friendly yet secure authentication methods, employing advanced technologies to strengthen security while minimizing disruption to user experience,” said SC Media in an article announcing the finalists in this category.

“To be named an SC Award finalist is a significant validation of the hard work and dedication of the entire Portnox team,” said Portnox CEO Denny LeCompte. “We are committed to providing IT security teams with the unified access control and zero trust security solutions they need to navigate today’s complex cyber threat landscape, and this merit-based recognition from such esteemed experts is something to celebrate.”

SC Media highlighted why it chose Portnox as one of five finalists in the Best Authentication category:

Securing application access requires intelligent, real-time decision-making, and Portnox’s Conditional Access for Applications delivers exactly that. The platform provides adaptive, risk-based authentication policies that assess device posture, user behavior, and contextual risk factors before granting access. With strong adoption in highly regulated industries, Portnox is empowering organizations to implement granular access controls without disrupting user experience. The company recently expanded its support for Microsoft Azure AD and identity federation, enabling businesses to enforce Zero Trust access across cloud and on-premises environments. As threat landscapes evolve, Portnox is continuously innovating to enhance adaptive authentication capabilities.

“Being named an SC Awards finalist is a recognition not only of technical innovation, but of a shared commitment to making the digital world safer,” said Tom Spring, Senior Editorial Director, SC Media. “This year we received hundreds of submissions across 33 categories, and the result is a finalist roster that reflects an evolving cybersecurity industry.”

The SC Awards, now in its 28th year, recognizes the solutions, organizations, and individuals that have demonstrated outstanding achievement in advancing the security of information systems. Find the complete list of 2025 finalists on SC Media’s website: www.scworld.com/sc-awards. New this year, all finalists are invited to the SC Awards Reception, where the 2025 winners will be announced on Tuesday, April 29, 2025, at RSAC ’25 in San Francisco.

 

About Portnox
Portnox provides simple-to-deploy, operate and maintain network access control, security and visibility solutions. Portnox software can be deployed on-premises, as a cloud-delivered service, or in hybrid mode. It is agentless and vendor-agnostic, allowing organizations to maximize their existing network and cybersecurity investments. Hundreds of enterprises around the world rely on Portnox for network visibility, cybersecurity policy enforcement and regulatory compliance. The company has been recognized for its innovations by Info Security Products Guide, Cyber Security Excellence Awards, IoT Innovator Awards, Computing Security Awards, Best of Interop ITX and Cyber Defense Magazine. Portnox has offices in the U.S., Europe and Asia. For information visit http://www.portnox.com, and follow us on Twitter and LinkedIn.。

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

Granular Recovery Technology: How Does It Work

Data is a company’s most important tool in the digital-first marketplace. Businesses depend on quick and safe access to their data—financial records, client data, and operational files. Losing important data can cause operations to stop, whether due to device problems, corruption, inadvertent deletions, or cyberattacks.

Traditional backup and recovery methods can require rebuilding an entire system or massive databases, even in cases of one file loss. This procedure disturbs, costs money, and takes time. Restoring critical data takes time, which increases operational downtime and financial loss.

Granular Recovery Technology (GRT) finds application here. GRT lets companies grab just the required files, emails, or database entries instead of recovering a whole system, lowering downtime and maximizing efficiency. Let’s explore this technology—how it works and how you can easily integrate it into your firm.

What is Granular Recovery Technology?

Granular Recovery Technology (GRT) is an advanced data recovery technique that allows users to access individual files, emails, or database entries from a backup without restoring the whole system.

Unlike traditional recovery solutions that need to reverse a whole snapshot, GRT lets one restore just the necessary data while preserving the integrity of the overall system.

For instance, conventional recovery techniques would call for restoring the whole mailbox or server should an employee unintentionally delete a crucial email. GRT allows IT managers to search for and restore that email, reducing disturbance rapidly.

GRT is extensively applied in corporate settings, particularly in IT service management (ITSM), cloud computing, and disaster recovery systems. Its precision-based methodology guarantees organizations can quickly and affordably access mission-critical data.

Storware Supports GRT

Storware Backup and Recovery significantly enhances data management by leveraging granular recovery technology, often referred to as file-level restore. This capability allows users to precisely select and restore individual files or folders from a backup image without needing to recover the entire virtual machine, application, or database. This targeted approach dramatically reduces recovery time and resource consumption, as only the necessary data is restored. By providing this fine-grained control, Storware empowers administrators to efficiently address specific data loss incidents, minimizing downtime and ensuring business continuity with swift and accurate data retrieval.

How Does Granular Recovery Work?

Granular recovery depends on extensive indexing and cataloging of backup data. GRT lets users interact with distinct components within a backup rather than consider it one monolithic file.

The procedure follows this:

  • Backup and Indexing: The system catalogs data snapshots for simple access. This indexing allows IT managers to search the backup for particular files or database records.
  • Search and Selection: IT teams can find and select particular objects following a data loss event rather than restoring a complete dataset.
  • Targeted Restoration: The chosen data is retrieved without altering or rewriting other system files. This method guarantees regular business activities can continue while recovery is in progress.

Modern GRT solutions use automation and artificial intelligence to achieve an even higher efficiency. Some systems can maximize indexing for faster access and forecast the most frequently retrieved files.

Where Granular Recovery Is Applied

Granular recovery has uses in many sectors where speed, efficiency, and data integrity are vital.

  • IT Departments: Use GRT to retrieve lost data, correct system faults, and preserve uptime in cloud-based systems.
  • Healthcare and Finance: Gain from GRT’s capacity to selectively retrieve medical records or financial transactions while guaranteeing regulatory compliance.
  • E-commerce and SaaS Platforms: Online firms depend on GRT to recover consumer orders, product data, or service configurations without compromising current operations.
  • Cybersecurity & Disaster Recovery: Rather than undoing whole systems following a ransomware attack or system failure, businesses can employ GRT to restore clean, uninfected data.

The Key Advantages of Granular Recovery

GRT has altered how corporations deal with data recovery by offering:

  • Quicker Recovery Times

One of GRT’s main advantages is its speed. Traditional recovery techniques take hours or even days to restore a complete system. GRT allows companies to access particular files quickly, greatly lowering downtime.

  • Improved Cost Savings and Storage

Eliminating the need for full-system restores helps GRT reduce backup management’s necessary storage and processing capability. This results in fewer infrastructure expenses and more effective use of IT resources.

  • Enhanced Compliance & Safety

GRT lets companies retrieve sensitive data without disclosing or recovering pointless data since it allows for focused recovery. Industries that must follow laws such as GDPR, HIPAA, and PCI-DSS stand to gain from this.

  • Minimal Corporate Disturbance

Recovering just the necessary data frees other systems and procedures. Workers can continue without interruption, guaranteeing business continuity.

Limitations of Granular Recovery Technology

While GRT offers significant benefits, it also has some challenges that businesses must consider before implementation.

  • Implementation Complexity

Granular recovery requires sophisticated and time-consuming advanced indexing and cataloging systems. Effective GRT configuration and management depend on appropriate IT staff training.

  • Conflict of Compatibility

Not every backup method enables exact recovery. Some legacy systems may require major upgrades or extra software tools to allow selective data restoration.

  • Difficulties in Large-Scale Environmental Performance

If the indexing system is not optimized, searching and retrieving specific files can still take longer than anticipated for businesses with large datasets. Poorly maintained indexing systems can result in slower recovery times.

  • Higher Initial Costs

Although GRT might save money in the long term, the initial investment in software, training, and infrastructure changes can be more than traditional recovery options. Businesses must examine if the long-term benefits offset the upfront expenses.

  • Risk of Partial Restorations

In some circumstances, restoring only parts of a dataset may produce problems, primarily if the recovered file depends on other system elements that were not converted. Organizations must ensure that selective recovery does not generate data integrity issues.

Despite these limitations, GRT remains essential for businesses prioritizing speed, efficiency, and compliance in their disaster recovery plans.

How to Integrate Granular Recovery in Your IT Strategy

To effectively adopt GRT, firms should:

  • Selecting the Correct Backup System

Organizations should search for backup systems that fit GRT and interface nicely with their IT setup. Cloud-based systems, including built-in granular recovery tools, are a sensible option. However, Storware Backup and Recovery is as good, if not the best, option. File-level recovery is just one of many useful features that allow organizations to effectively protect their heterogeneous workloads. Download a free trial and test drive Storware.

  • Testing & Training

Frequent disaster recovery exercises guarantee that IT departments are conversant with the detailed recovery mechanism. Teaching staff members the best techniques can lower the chance of mistakes during restoration.

  • Automating Processes for Recovery

Advanced GRT solutions now use machine learning techniques to forecast frequently restored files, significantly lowering search and retrieval times. Businesses could consider automation to boost efficiency.

In Summary

Granular Recovery Technology is altering how firms handle data loss. It minimizes downtime, optimizes resources, and improves security by allowing IT teams to restore only the necessary files. However, GRT is not a universal solution. Organizations must examine their IT infrastructure, train personnel, and follow best practices to optimize its benefits.

As data volumes expand, the desire for faster, more precise recovery solutions will only increase. Businesses that make GRT investments now will be better suited for tomorrow’s demands. Is your company ready for precise recovery? Now is the moment to explore how it might improve your approach to disaster recovery.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Storware
Storware is a backup software producer with over 10 years of experience in the backup world. Storware Backup and Recovery is an enterprise-grade, agent-less solution that caters to various data environments. It supports virtual machines, containers, storage providers, Microsoft 365, and applications running on-premises or in the cloud. Thanks to its small footprint, seamless integration into your existing IT infrastructure, storage, or enterprise backup providers is effortless.

Intelligent IT Distribution became NACVIEW new distributor

“Alone we can do so little; together we can do so much.”

In light of the words of Helen Keller, we are pleased to announce the beginning of a strategic partnership with our new distributor – Intelligent IT Distribution, a company specializing in delivering advanced technologies that guarantee the highest level of security. We firmly believe that the synergy of our strengths and our shared vision of innovation will contribute to dynamic growth and the creation of even more sophisticated solutions, setting a new standard in the field of cybersecurity.

Our primary goal is to provide partners and end customers with the most comprehensive and reliable tools to effectively protect their IT infrastructure. Through this collaboration, Intelligent IT Distribution will be responsible for distributing NACVIEW in key markets such as Ukraine, Georgia, Azerbaijan, Kazakhstan, and Uzbekistan, thus opening new opportunities for growth and digital security in these regions.

About NACVIEW
A powerful network access control (NAC) solution designed to provide organizations with comprehensive visibility and control over their network infrastructure. Developed by leading network security company, NACVIEW offers advanced features and capabilities to ensure secure and efficient network access for users and devices.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

36 Endpoint Security Statistics MSPs Should Know About in 2025

You can’t secure what you don’t know exists.

That’s only part of the challenge MSPs face when managing endpoint security.

Endpoint security becomes even more complex when you factor in the number of unmanaged devices continually added to the corporate network.

Do you know the number of unauthorized productivity SaaS applications being used by employees on their personal devices? Most likely not. But shadow IT is only part of the problem MSPs and IT managers encounter daily.

We’re not even talking about BYOD policies that aren’t deployed or followed protocol. How about former employees who still have company-issued laptops they haven’t returned yet? Each unsecured endpoint is a prime target for attackers to exploit.

Wait until you see what else the Guardz team discovered.

Here are 36 endpoint security statistics in 2025 that every MSP must be aware of.

Unsecured Connections: Endpoint Security Risks of BYOD

  • 92% of remote workers report using their personal tablets or smartphones for work tasks, with 46% of them having saved a work file onto those devices. – The State of Remote Work Security
  • 97% of executives access work accounts or applications via their personal devices. – 2023 Not (Cyber) Safe for Work Report
  • 80% of executives are likely to send work-related messages from their personal devices. – 2023 Not (Cyber) Safe for Work Report
  • Microsoft research found that 80-90% of successful ransomware attacks come from unmanaged devices. – Microsoft
  • 62% of cybersecurity professionals cite data loss and leaks as their top BYOD-related concerns. Menlo Security
  • 36% of employees who said they use a personal device for work purposes admitted to delaying applying security updates. – The HIPAA Journal
  • 71% of employees store sensitive work passwords on personal phones. – Security Magazine
  • 67% of enterprises use up to five separate vendors for management and security across all device types. Computerworld
  • Only 38% of companies have a policy prohibiting employees from storing plain-text access credentials on their devices. The Sensitive Data Report
  • Only 42% of companies surveyed have a solution to proactively locate sensitive data on an employee device. The Sensitive Data Report
  • 38% of employees admitted that their employer doesn’t have any BYOD policies, or the policy is sometimes or always ignored. – The HIPAA Journal

Endpoints Unknown: The Dangers of Shadow IT

  • Gartner found that shadow IT accounts for 30-40% of IT spending in large enterprises. Forbes
  • According to Cisco, 80% of company employees use shadow IT. IBM
  • 76% of SMBs report that shadow IT threatens security. LastPass
  • 58% of SMBs have experienced high-impact shadow IT efforts outside the knowledge of their official IT department. Capterra
  • While the average large enterprise believes it uses 37 apps, employees actually use 625 apps. – CIO
  • 30% of IT leaders claim that information security is the biggest obstacle to BYOD adoption. CloudSecureTech
  • Shadow IT usage has increased by 59% with remote work. Keepnet
  • 47% of companies allow employees to access their resources on unmanaged devices, authenticating via credentials alone. The Shadow IT Report
  • 70% of employees using ChatGPT at work hide it from their employers. Business Insider
  • Nearly 1/3 (32%) of remote and hybrid workers use apps or software not approved by IT.  Infosecurity Magazine
  • A study found that 59% of organizations have experienced data loss through cloud-based shadow IT. Ponemon Institute
  • ChatGPT is the top unauthorized app that is secretly used by workers. Fortune
  • “By 2027, 75% of employees will acquire, modify or create technology outside IT’s visibility — up from 41% in 2022.” Gartner

Employee-Related Endpoint Security Threats

  • Among HR workers who offboarded employees in the past year, 71% say at least one employee didn’t return company-owned equipment, like a laptop or smartphone. Capterra
  • 65% of employees said they often bypass their organization’s security policies to improve productivity and make their lives easier. The HIPAA Journal
  • Over 90% of security incidents involving lost or stolen devices result in an unauthorized data breach. Samsung Knox
  • 13% of employees admit to falling for phishing attacks while working at home. – Security Magazine
  • A study by Wing Security found that 63% of businesses may have former employees with access to organizational data. The Hacker News
  • 62% of employees surveyed reported moving company IP to non–company devices. USACI
  • An HR offboarding study found that 59% of stolen company-owned equipment contained sensitive information and that only 55% were able to completely lock out the employee from using the equipment. Capterra

Endpoint-Related Attacks

  • There was a 300% increase in endpoint malware detections in Q3 of 2024. Help Net Security
  • In 2024, a Twilio data breach exposed 33 million phone numbers from Authy accounts, which was traced back to an unauthenticated API endpoint. Security Week
  • A study found that 90% of successful cyberattacks and as many as 70% of successful data breaches originate at endpoint devices. Verizon Business 2023 Mobile Security Index
  • 54% of security professionals said that more than 20% of their overall endpoints were unmanaged. CSO Online
  • A survey found that 67% of MSPs experienced an attack from an AI-borne threat in the last 12 months and that AI attacks could soon become more of a threat than endpoint attacks. SC Media

Secure Your Endpoints with Guardz

Visibility is the key factor when it comes to endpoint security.

The Guardz platform includes native endpoint protection that integrates with SentinelOne EDR, delivering best-in-class endpoint security. This enables MSPs to scale 365-day coverage without added complexity or cost.

About Guardz
Guardz is on a mission to create a safer digital world by empowering Managed Service Providers (MSPs). Their goal is to proactively secure and insure Small and Medium Enterprises (SMEs) against ever-evolving threats while simultaneously creating new revenue streams, all on one unified platform.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

Perforce’s State of Open Source Report Reveals Low Confidence in Big Data Management

About Perforce
The best run DevOps teams in the world choose Perforce. Perforce products are purpose-built to develop, build and maintain high-stakes applications. Companies can finally manage complexity, achieve speed without compromise, improve security and compliance, and run their DevOps toolchains with full integrity. With a global footprint spanning more than 80 countries and including over 75% of the Fortune 100, Perforce is trusted by the world’s leading brands to deliver solutions to even the toughest challenges. Accelerate technology delivery, with no shortcuts.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

×

Hello!

Click one of our contacts below to chat on WhatsApp

×