Scalability: Building for the future by starting right today

From SaaS platforms supporting millions of users to APIs enabling seamless integrations, scalability is foundational for businesses to thrive in 2025 and beyond. Yet, achieving true scalability remains elusive for many organizations. The challenges lie not only in the tools we use but in the very architecture of the systems we build.

The scalability bottleneck: APIs under strain

APIs are the glue that binds modern digital ecosystems, enabling systems to communicate and work together. However, many APIs today face significant bottlenecks. For instance, with SaaS service APIs that vendors offer up for general use, we see everything from explicit throttling (e.g., “come back later” type responses) to slow responses or outright intermittent failures. These common issues limit their usefulness, and as businesses grow and integration demands increase, these bottlenecks become critical barriers. For us to move forward with better and tighter integrations between systems, we need the APIs to scale to higher volume use. An API that can’t handle high volumes is effectively pointless. The value of an API lies in its reliability and capacity — usable not just occasionally or under ideal conditions but consistently and at scale. Without this, businesses are left with “just enough” functionality that falls short of real-world demands.

Is the root cause architectural complexity?

Probably. It’s difficult to know what the limiting factors are from the outside, but it appears that one of the biggest challenges to scalability is that some services — for one reason or another, which I’ll get into later — are built on an architecture that is difficult to scale to higher volume use. The truth is that many services today are built on architectures that were never designed to handle the scale they now face. (More on this in the next section.) For example, a service dependent on a central database might experience diminishing returns when additional API front-end nodes are introduced. The database becomes a choke point — an architectural bottleneck that cannot be overcome by merely adding resources. Elastic scaling promises easy solutions, but in reality, scaling a service often requires more than increasing hardware resources. It demands a foundational shift in how the system is designed. Retrofitting a system to scale can be akin to replacing the foundation of a house while living in it —technically possible but fraught with challenges and runaway costs.

The high cost of shortcuts

In the rush to bring products to market, startups often face immense pressure to deliver something they can showcase to stakeholders, investors, or potential customers. To meet these demands, it’s tempting to cobble together systems that “mostly fit.” This approach allows them to quickly demonstrate the viability of their idea and gain early traction. However, this expediency often comes at a significant long-term cost. The patchwork nature of such systems creates an underlying complexity that is difficult — and sometimes impossible — to scale effectively. Early success can mask these architectural flaws, and as the product gains market traction, securing business approval for a complete re-architecture becomes increasingly difficult. After all, why invest in fixing something that appears to be working? The irony is that while these shortcuts may save time initially, they often result in delays, frustrations, and limitations in the long run. Organizations find themselves unable to “throw hardware at the problem,” as the underlying complexity prevents effective scaling. Importantly for the fast-moving startups, investors are not blind to this either — technical due diligence is undertaken precisely to uncover if the proverbial castle is built on sand.

The way forward: Simplicity in architecture

To build scalable systems, simplicity must be the guiding principle. It must be built on the “simplest possible” architecture. As the saying goes, “All computers wait at the same speed.” No amount of hardware can compensate for a poorly designed architecture. Simplicity not only reduces costs and increases reliability but also lays the groundwork for systems that can grow seamlessly with demand. This requires a shift in industry mindset. Businesses and engineers alike must prioritize proper engineering and thoughtful architecture from the outset. While the benefits of this approach may not be immediately apparent, they will pay dividends over the lifecycle of the system.

A call to action: Invest in good design

The best way to solve scalability challenges is to avoid creating them in the first place. This begins in the architectural phase of development. Engineers must approach design with a critical eye, recognizing that complexity is the enemy of scalability. Businesses must be willing to invest in thoughtful engineering, even if it means slowing down initial development to build systems that will last. “Slow down to go fast” may be a platitude, but it holds true when it comes to scalability. While easy to say, it requires hard decisions and deliberate effort to design scalable systems from the outset. Thoughtfully built systems not only handle current demands but will scale seamlessly as needs evolve.

Conclusion: Building for a scalable future

Scalability is not just a technical challenge — it’s a strategic imperative. Organizations that succeed in 2025 and beyond will be those that prioritize simplicity, invest in thoughtful architecture, and resist the temptation to cut corners. By addressing scalability challenges head-on, businesses can build systems that not only meet today’s needs but are ready to grow with the demands of tomorrow. The future of scalability is in our hands: Let’s design it deliberately.

About Keepit
At Keepit, we believe in a digital future where all software is delivered as a service. Keepit’s mission is to protect data in the cloud Keepit is a software company specializing in Cloud-to-Cloud data backup and recovery. Deriving from +20 year experience in building best-in-class data protection and hosting services, Keepit is pioneering the way to secure and protect cloud data at scale.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

Keepit receives 2024 Backup and Disaster Recovery Award from Cloud Computing Magazine

Keepit platform honored at the 2024 Backup and Disaster Recovery Awards, underscoring the company’s commitment to intelligent recovery.

  

Copenhagen, Denmark – January 27 Keepit, a global provider of a comprehensive cloud backup and recovery platform, announced today that TMC, a global, integrated media company, has named the Keepit platform as a 2024 Cloud Computing Backup and Disaster Recovery Award winner, presented by TMC’s Cloud Computing Magazine.

Headquartered in Copenhagen with offices and data centers globally, Keepit future-proofs cloud data for organizations, ensuring business continuity and access to information.

 

The Cloud Computing Backup and Disaster Recovery Award recognizes technologies and vendors that have built cloud solutions that empower businesses small or large to remain active and productive under even the most challenging conditions, minimizing lost business opportunities.

 

“Intelligent recovery is the cornerstone of data resilience. By ensuring your SaaS data is always secure, you can be confident in your business continuity plan. The Keepit platform makes it easy to prepare for the worst, while also enhancing current business practices through cost-efficient data protection. We’re excited to receive this honor from Cloud Computing Magazine,” says Michele Hayes, CMO at Keepit.

 

“Recognizing excellence in the advancement of cloud computing technologies, Cloud Computing magazine is proud to announce the Keepit platform as a recipient of the Cloud Computing Backup and Disaster Recovery Award,” said Rich Tehrani, CEO, TMC. “Keepit is being honored for their achievement in bringing innovation to the market, while leveraging the latest technology trends.”

 

About Keepit
At Keepit, we believe in a digital future where all software is delivered as a service. Keepit’s mission is to protect data in the cloud Keepit is a software company specializing in Cloud-to-Cloud data backup and recovery. Deriving from +20 year experience in building best-in-class data protection and hosting services, Keepit is pioneering the way to secure and protect cloud data at scale.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

Cybersecurity tool sprawl and the cost of complexity

Under constant pressure to defend against cyberthreats, organizations often adopt new security tools rapidly to address specific vulnerabilities or compliance requirements. However, this reactive approach can lead to “tool sprawl,” where the unchecked accumulation of disparate solutions results in an overly complex and fragmented security environment.

What is cybersecurity tool sprawl?

Cybersecurity tool sprawl occurs when organizations continuously add new tools without fully assessing their existing security infrastructure or considering how these additions fit into the broader architecture. Over time, this reactive approach leads to an overextended security framework, where overlapping functionalities, siloed data, and operational inefficiencies compromise overall security.

As the complexity of managing a myriad of security tools grows, so do the risks of inefficiency, increased costs, skill gaps, and security vulnerabilities. Understanding these challenges is critical to developing effective strategies for minimizing tool sprawl.

A more holistic approach, where each tool is necessary, fully integrated, and effectively utilized, is crucial for maintaining a robust security posture in today’s dynamic threat landscape.

Having the right technology for your specific security needs leads to a strong cyber defense — not deploying the most technology.

What does cybersecurity tool sprawl look like?

Today, cybersecurity tool sprawl is characterized by an overabundance of security tools, often numbering in the dozens or even hundreds within large organizations. At the 2019 RSA Conference, Matt Chiodi, former chief security officer of public cloud at Palo Alto Networks, noted that small organizations average 15-20 tools, medium-sized businesses 50-60, and large enterprises over 130 tools.

These tools span various categories, including endpoint protection, intrusion detection, threat intelligence, identity management, and more. Despite this extensive array, research and industry reports indicate that only a small fraction of these tools are actively used, with many going underutilized due to their complexity or redundancy.

According to Richard Watson from Ernst & Young, most organizations utilize only 10% to 20% of the technology they own, while continuing to pay higher license costs for technology that they have not leveraged for other business needs.

Watson, in his article, “Simplify to Survive: How Organizations Can Navigate Cyber-Risk,” suggests that a technology declutter is required:

“Simplification will make companies more adaptive and pragmatic. It will support a shift from a complexity-inducing approach […] to an adaptive approach that works backward from core risks and sets companies up to move swiftly when attacks strike. Simplification will result in operational efficiencies, reduced technology and infrastructure overhead, and ultimately the ability to respond to cyber threats more quickly.”

5 critical challenges that come with tool sprawl

Tool sprawl presents numerous challenges that can hinder an organization’s ability to maintain an effective security posture. Five of the top side effects of tool sprawl are:

1. Operational inefficiency

2. Increased costs

3. Skill gaps

4. Visibility and control issues

5. Integration challenges

Operational inefficiency arises when organizations deploy many security tools, often with overlapping functionalities, it creates a complex, difficult to manage environment. Security teams may struggle to effectively monitor and correlate data from multiple tools, leading to missed threats and slower response times. The lack of integration between these tools can also result in fragmented security processes, where critical information is siloed and not shared across platforms. (Read about efficient tech stacks by Keepit CTO Jakob Østergaard.)

Increased costs are another significant issue. Each tool requires licensing, maintenance, and support, which can quickly escalate expenses. Additionally, the need for specialized personnel to manage and operate these tools further drives up costs. In many cases, organizations find themselves paying for tools that are underutilized or even redundant, exacerbating the financial burden.

Skill gaps among security staff can also be a challenge. The more tools an organization uses, the more difficult it becomes for the security team to be proficient with each one. This can lead to suboptimal use of the tools, where their full capabilities are not leveraged, ultimately weakening the organization’s overall security posture. The difficulty of keeping up with updates and best practices for a wide array of tools can also contribute to skill gaps and operational errors.

Visibility and control issues often arise in environments plagued by tool sprawl. With so many tools in play, maintaining comprehensive visibility across the network becomes challenging. This fragmented visibility can result in blind spots, where security incidents may go unnoticed or unaddressed. Moreover, the lack of centralized control can make it difficult to enforce consistent security policies across the organization, as well as thorough testing of a larger-than-necessary attack surface. (Read our article on “simplicity as a shield” and immutability.)

Finally, integration challenges are a common problem. Many organizations use a mix of legacy systems and new technologies that do not easily integrate with each other. This lack of integration can prevent security tools from working together effectively, reducing their overall effectiveness and complicating incident response efforts. Without seamless integration, data from different tools might not be aggregated and analyzed properly, leading to delays in threat detection and response.

While cybersecurity tools are essential for protecting an organization’s digital assets, excessive tool sprawl ultimately leads to significant challenges — all of which can weaken an organization’s security posture rather than strengthen it. Reducing tool sprawl through strategic consolidation and better tool management can help mitigate these challenges.

How can security leaders minimize tool sprawl?

Minimizing cybersecurity tool sprawl is crucial for maintaining an effective and efficient security posture. Here are several strategies that security leaders can adopt to tackle this challenge:

  • Data governance and prioritization: Start by clearly defining which data and assets are most critical to your organization. By understanding the specific areas that require protection, you can prioritize monitoring and tool selection efforts. This targeted approach ensures that resources are allocated efficiently and that security tools are directly aligned with the organization’s most valuable assets.
  • Recovery testing and centralized oversight: Regular recovery testing of backed-up data can help centralize security efforts. Centralizing oversight and validation processes not only minimizes sprawl but also ensures that your security measures are comprehensive and cohesive, minimizing gaps in protection.
  • Strategic SIEM implementation: Implementing a robust Security Information and Event Management (SIEM) system can consolidate monitoring efforts. A well-integrated SIEM can aggregate data from various sources, reducing the necessity to monitor multiple platforms independently. This consolidation simplifies the security environment and helps to avoid the complexities that lead to tool sprawl.
  • Selective tool acquisition: Before acquiring new security tools, it’s essential to clearly define your monitoring objectives. Any new tool should be evaluated for its ability to integrate seamlessly with your existing SIEM infrastructure. This careful selection process prevents the unnecessary expansion of the toolset and ensures that each addition provides real value.
  • Diversified intelligence sources: While integration is key, it’s also important to maintain diverse sources of intelligence. This diversification allows for cross-verification of threat information, leading to more accurate and comprehensive threat detection. Ensuring that your tools incorporate varied intelligence sources can enhance the overall security posture without adding redundant tools.
  • Resource and capacity assessment: Evaluate the capacity of your security team to manage the existing toolset effectively. This includes deciding whether to maintain an in-house Security Operations Center (SOC), outsource it, or adopt a hybrid approach. Aligning your toolset with the available resources ensures that your security team can effectively manage and utilize the tools at their disposal.
  • Regular review and rationalization: Periodically reviewing your toolset is essential for identifying redundancies and underutilized tools. This process of rationalization focuses on optimizing the security stack, ensuring that every component adds value and enhances your security posture. Regular reviews prevent sprawl from creeping back in and keep your security environment streamlined.

By implementing these strategies, organizations can effectively manage and reduce cybersecurity tool sprawl, ensuring a more efficient, cost-effective, and secure environment. In today’s complex threat landscape, a streamlined and integrated security approach is not just beneficial but essential.

Conclusion

Perhaps contrary to the wishes of the endless array of readily “onboardable” SaaS applications promising a silver bullet for your problems, just adding more and more tools isn’t the solution to cybersecurity woes — streamlining and integrating your security stack is.

By focusing on quality over quantity and maintaining oversight of your solutions, you can reduce tool sprawl, enhancing both efficiency and security. A well-coordinated approach not only cuts costs but also fortifies cyber resilience efforts.

 

About Keepit
At Keepit, we believe in a digital future where all software is delivered as a service. Keepit’s mission is to protect data in the cloud Keepit is a software company specializing in Cloud-to-Cloud data backup and recovery. Deriving from +20 year experience in building best-in-class data protection and hosting services, Keepit is pioneering the way to secure and protect cloud data at scale.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

Keepit celebrates dual wins at the 2024/25 Cloud Awards for intelligent backup and recovery solutions

Keepit was named winner in the “Best Cloud-Native Project/Solution” and “Best Cloud DR/Business Continuity Solution” categories.

Copenhagen, Denmark – January 15 – Keepit, a global provider of a comprehensive cloud backup and recovery platform, announced today its success in the 2024/25 Cloud Awards program by being named winner in the “Best Cloud-Native Project / Solution” and “Best Cloud DR / Business Continuity Solution” categories.

The Cloud Awards is one of the longest-running awards platforms of its kind, recognizing the latest achievements and innovations in cloud computing. Organizations that reached the finalist stage have had their nominations reviewed by the judging panel, resulting in the winners named today. The program received entries from organizations of all sizes from across the globe, including the USA and Canada, the UK and Europe, the Middle East, and APAC.

The program itself covers multiple aspects of cloud computing across 36 categories, including overall excellence (e.g.: innovation and disruption), systems and processes (e.g.: Payroll and Automation), certain technologies (e.g. SaaS and IoT), pieces of work (e.g.: projects, migrations or integrations), and workplace excellence (e.g.: consultancy, most promising startup, and ‘green’ credentials).

“More than 15,000 companies worldwide already include the Keepit platform as a part of their disaster recovery plans. By providing companies with instant and continuous access to their data, we’re helping to ensure business continuity and peace of mind. We’re honored to have received these accolades from the Cloud Awards,” says Michele Hayes, CMO at Keepit.

“Keepit has proven itself a leader in disaster recovery and business continuity with its purpose-built SaaS data protection platform, earning the title of ‘Best Cloud DR / Business Continuity Solution.’ By leveraging immutable, tamper-proof storage in an independent cloud, Keepit provides organizations with peace of mind, even in the face of cyberattacks or unexpected data loss. Its adherence to the highest security standards and cost-effective, predictable pricing model ensures companies remain operational, compliant, and secure. The Cloud Awards is proud to honor Keepit for its pivotal role in protecting business-critical data and ensuring uninterrupted continuity in an increasingly unpredictable digital landscape,” says Cloud Awards Technical Director, Annabelle Whittall.

Secure by design, the Keepit cloud is owned and run by Keepit. Customer data is kept in a separate, dedicated infrastructure, with the backed-up data stored fully isolated from the SaaS vendor’s cloud. With a user-friendly interface, robust data security, and the ability to adapt to your cloud environment, Keepit ensures your data is always accessible and protected.

About the Cloud Awards

The Cloud Awards is an international program which has been recognizing and honoring industry leaders, innovators and organizational transformation in cloud computing since 2011. The Cloud Awards comprises five awards programs, each uniquely celebrating success across cloud computing, software-as-a-service (SaaS), cloud security, artificial intelligence (AI), and financial technologies (FinTech).

Winners are selected by a judging panel of international industry experts. For more information about the Cloud Awards, please visit https://www.cloud-awards.com/.

About The Cloud Awards Program
The Cloud Awards identifies and celebrates the most innovative organizations, technologies, individuals and teams in the world of cloud computing. The program spans 36 categories, including ‘Best Cloud Infrastructure’ and ‘Best Cloud Automation Solution’.

About The Cloud Security Awards
The Cloud Security Awards celebrates innovation in the cybersecurity industry. The program includes a wide range of categories, including ‘Best Web Security Solution,’ ‘Cloud Security Innovator of the Year,’ and ‘Best Security Solution for Finance or Banking.’

About The FinTech Awards
The FinTech Awards focuses on the major innovations in the world of financial technology, including personal and corporate banking, insurance, and wealth management, business finance processes, and FinTech use within a selection of sectors, across 23 categories.

About Keepit
At Keepit, we believe in a digital future where all software is delivered as a service. Keepit’s mission is to protect data in the cloud Keepit is a software company specializing in Cloud-to-Cloud data backup and recovery. Deriving from +20 year experience in building best-in-class data protection and hosting services, Keepit is pioneering the way to secure and protect cloud data at scale.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

5 predictions for 2025: Data, APIs, and AI, oh my!

As we welcome a new year, let’s take a look ahead and anticipate the trends that will shape SaaS ecosystems in 2025. What challenges will businesses need to overcome? What opportunities will they seize to secure and manage their data?

To help shed some light on questions like these, Keepit’s Jakob Østergaard (CTO), Michael Amsinck (CPTO), and Kim Larsen (CISO) have shared five predictions for 2025 ranging from data protection and compliance to cloud infrastructure, AI innovation, and scalability challenges. 

 

Prediction 1: Data protection — finally a non-negotiable priority 

By Michael Amsinck, CPTO at Keepit

Data protection goes mainstream

In 2025, businesses will move beyond seeing SaaS data protection as optional and embrace it as a non-negotiable priority. The increasing frequency of cyberattacks and the devastating consequences of data breaches will make organizations take proactive steps to safeguard their digital assets, such as SaaS data, filling a critical need in shared responsibility models.

This means not just adopting backup solutions but ensuring they’re vendor-independent and truly resilient. Companies will demand solutions that not only secure their data but also guarantee accessibility under any circumstances. The market is ready for exponential growth, fueled by this heightened awareness and demand. 

 

Prediction 2: Data sovereignty — know where your data lives 

By Kim Larsen, CISO at Keepit 

Data sovereignty takes center stage
As global regulatory landscapes evolve, businesses will prioritize knowing precisely where their data resides and under whose jurisdiction it falls. Customers, too, are becoming savvier, demanding transparency about how and where their data is managed.

By 2025, data sovereignty won’t just be a legal obligation — it will be a strategic advantage. Smart businesses will give their data a clear “address,” ensuring compliance while boosting customer trust. This isn’t about borders — it’s about accountability and control. 

 

Prediction 3: Cloud services — supply chain under the microscope 

By Jakob Østergaard, CTO at Keepit 

Trust, but verify.
The geopolitical turbulence of recent years has exposed vulnerabilities in supply chains, including digital services. By 2025, organizations will scrutinize their cloud service providers with the same rigor they apply to physical supply chains.

Compliance, vendor relationships, and security protocols will come under the microscope. While integration and collaboration are essential, the days of blind trust are over. Businesses will learn to balance innovation with caution — understanding that while partnerships are key, not all vendors are allies.  

 

Prediction 4: AI — the year of truth 

By Jakob Østergaard, CTO at Keepit  

AI hits reality check
2025 will mark the end of AI hype cycles. Unsustainable projects will collapse, and only truly functional, value-adding solutions will remain. Businesses will embrace AI for practical purposes: analyzing large datasets, identifying patterns, and enhancing decision-making.

The market will mature, with clear winners emerging as the dust settles. Much like past technological fads, the glamour will fade, leaving behind only what works. Companies that harness AI wisely — focusing on utility rather than novelty — will reap the rewards. 

 

Prediction 5: Scalability — APIs as the breaking point 

By Jakob Østergaard, CTO at Keepit 

APIs must grow up.
APIs are the backbone of modern SaaS ecosystems, but by 2025, their limitations will become a critical bottleneck. Throttling, slow responses, and intermittent failures are stalling progress, undermining the promise of seamless integrations. For the digital economy to thrive, APIs must evolve to handle higher volumes and deliver consistently.

Engineering robust, scalable solutions isn’t glamorous, but it’s essential. The message is clear: slow down to build better. In the long run, well-designed APIs will separate market leaders from the also-rans. 

Conclusion 

The predictions for 2025 reflect a shared focus on SaaS resilience, accountability, recovery, and adaptability. Businesses must prioritize intelligent and robust systems that address data protection, transparency, and technological evolution to navigate the challenges ahead.

By embracing these shifts proactively, organizations can transform uncertainty into opportunity, ensuring they remain competitive and secure. After all, recovery can only happen if you have a backup proactively in place. 

About Keepit
At Keepit, we believe in a digital future where all software is delivered as a service. Keepit’s mission is to protect data in the cloud Keepit is a software company specializing in Cloud-to-Cloud data backup and recovery. Deriving from +20 year experience in building best-in-class data protection and hosting services, Keepit is pioneering the way to secure and protect cloud data at scale.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.