Keepit webinar series: An intelligent approach to cyber resilience through data governance strategies

Webinar to offer practical approaches to optimize data management, communicate strategies to leadership, and enhance organizational resilience

COPENHAGEN, DENMARK, February 14, 2025 Keepit, a global provider of a comprehensive cloud backup and recovery platform, today announced that it will be hosting a webinar titled, “Data Governance meets Recovery: An Intelligent Approach to Resilience”, on Thursday, February 20, 2025.

 

Keepit’s Kim Larsen, Chief Information Security Officer (CISO) will be joined by Ulf Feger, CISO Advisory Services, vCISO, and NIS2 Directive Senior Lead Implementer[1] , a cybersecurity leader with extensive global experience across IT and OT security. In the session, they will cover governance strategies, aligning disaster recovery strategies with executive priorities, and integrating artificial intelligence (AI) into recovery plans.

 

“Business leaders today must manage rapid data growth while countering sophisticated cyberthreats, making effective data governance crucial for a robust business continuity strategy,” said Larsen. “This informative and practical webinar will help audiences understand how robust data governance, extending beyond the CISO’s office, underpins a resilient disaster recovery strategy.”

 

Key takeaways from the webinar will include:

 

●     Effective data governance models and approaches

●     Disaster recovery planning considering the impact of AI

●     Techniques for data prioritization and classification

●     Structuring recovery plans and conducting incident investigation.

 

WHAT: Webinar: Data Governance meets Recovery: An Intelligent Approach to Resilience

 

WHEN: Thursday, February 20, 2025 at 10:00 a.m. EST/4 p.m. CET

 

WHO:  Kim Larsen, CISO, Keepit

Ulf Feger, CISO Advisory Services, vCISO, and NIS2 Directive Senior Lead Implementer

 

REGISTRATION: Sign up here

 

Participants that cannot attend live will receive a recording of the webinar. And all registrants will receive exclusive access to the latest report from Kim Larsen: “Intelligent data governance

Why taking control of your data is key for operational continuity and innovation.”

About Keepit
At Keepit, we believe in a digital future where all software is delivered as a service. Keepit’s mission is to protect data in the cloud Keepit is a software company specializing in Cloud-to-Cloud data backup and recovery. Deriving from +20 year experience in building best-in-class data protection and hosting services, Keepit is pioneering the way to secure and protect cloud data at scale.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

Scalability: Building for the future by starting right today

From SaaS platforms supporting millions of users to APIs enabling seamless integrations, scalability is foundational for businesses to thrive in 2025 and beyond. Yet, achieving true scalability remains elusive for many organizations. The challenges lie not only in the tools we use but in the very architecture of the systems we build.

The scalability bottleneck: APIs under strain

APIs are the glue that binds modern digital ecosystems, enabling systems to communicate and work together. However, many APIs today face significant bottlenecks. For instance, with SaaS service APIs that vendors offer up for general use, we see everything from explicit throttling (e.g., “come back later” type responses) to slow responses or outright intermittent failures. These common issues limit their usefulness, and as businesses grow and integration demands increase, these bottlenecks become critical barriers. For us to move forward with better and tighter integrations between systems, we need the APIs to scale to higher volume use. An API that can’t handle high volumes is effectively pointless. The value of an API lies in its reliability and capacity — usable not just occasionally or under ideal conditions but consistently and at scale. Without this, businesses are left with “just enough” functionality that falls short of real-world demands.

Is the root cause architectural complexity?

Probably. It’s difficult to know what the limiting factors are from the outside, but it appears that one of the biggest challenges to scalability is that some services — for one reason or another, which I’ll get into later — are built on an architecture that is difficult to scale to higher volume use. The truth is that many services today are built on architectures that were never designed to handle the scale they now face. (More on this in the next section.) For example, a service dependent on a central database might experience diminishing returns when additional API front-end nodes are introduced. The database becomes a choke point — an architectural bottleneck that cannot be overcome by merely adding resources. Elastic scaling promises easy solutions, but in reality, scaling a service often requires more than increasing hardware resources. It demands a foundational shift in how the system is designed. Retrofitting a system to scale can be akin to replacing the foundation of a house while living in it —technically possible but fraught with challenges and runaway costs.

The high cost of shortcuts

In the rush to bring products to market, startups often face immense pressure to deliver something they can showcase to stakeholders, investors, or potential customers. To meet these demands, it’s tempting to cobble together systems that “mostly fit.” This approach allows them to quickly demonstrate the viability of their idea and gain early traction. However, this expediency often comes at a significant long-term cost. The patchwork nature of such systems creates an underlying complexity that is difficult — and sometimes impossible — to scale effectively. Early success can mask these architectural flaws, and as the product gains market traction, securing business approval for a complete re-architecture becomes increasingly difficult. After all, why invest in fixing something that appears to be working? The irony is that while these shortcuts may save time initially, they often result in delays, frustrations, and limitations in the long run. Organizations find themselves unable to “throw hardware at the problem,” as the underlying complexity prevents effective scaling. Importantly for the fast-moving startups, investors are not blind to this either — technical due diligence is undertaken precisely to uncover if the proverbial castle is built on sand.

The way forward: Simplicity in architecture

To build scalable systems, simplicity must be the guiding principle. It must be built on the “simplest possible” architecture. As the saying goes, “All computers wait at the same speed.” No amount of hardware can compensate for a poorly designed architecture. Simplicity not only reduces costs and increases reliability but also lays the groundwork for systems that can grow seamlessly with demand. This requires a shift in industry mindset. Businesses and engineers alike must prioritize proper engineering and thoughtful architecture from the outset. While the benefits of this approach may not be immediately apparent, they will pay dividends over the lifecycle of the system.

A call to action: Invest in good design

The best way to solve scalability challenges is to avoid creating them in the first place. This begins in the architectural phase of development. Engineers must approach design with a critical eye, recognizing that complexity is the enemy of scalability. Businesses must be willing to invest in thoughtful engineering, even if it means slowing down initial development to build systems that will last. “Slow down to go fast” may be a platitude, but it holds true when it comes to scalability. While easy to say, it requires hard decisions and deliberate effort to design scalable systems from the outset. Thoughtfully built systems not only handle current demands but will scale seamlessly as needs evolve.

Conclusion: Building for a scalable future

Scalability is not just a technical challenge — it’s a strategic imperative. Organizations that succeed in 2025 and beyond will be those that prioritize simplicity, invest in thoughtful architecture, and resist the temptation to cut corners. By addressing scalability challenges head-on, businesses can build systems that not only meet today’s needs but are ready to grow with the demands of tomorrow. The future of scalability is in our hands: Let’s design it deliberately.

About Keepit
At Keepit, we believe in a digital future where all software is delivered as a service. Keepit’s mission is to protect data in the cloud Keepit is a software company specializing in Cloud-to-Cloud data backup and recovery. Deriving from +20 year experience in building best-in-class data protection and hosting services, Keepit is pioneering the way to secure and protect cloud data at scale.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

Keepit receives 2024 Backup and Disaster Recovery Award from Cloud Computing Magazine

Keepit platform honored at the 2024 Backup and Disaster Recovery Awards, underscoring the company’s commitment to intelligent recovery.

  

Copenhagen, Denmark – January 27 Keepit, a global provider of a comprehensive cloud backup and recovery platform, announced today that TMC, a global, integrated media company, has named the Keepit platform as a 2024 Cloud Computing Backup and Disaster Recovery Award winner, presented by TMC’s Cloud Computing Magazine.

Headquartered in Copenhagen with offices and data centers globally, Keepit future-proofs cloud data for organizations, ensuring business continuity and access to information.

 

The Cloud Computing Backup and Disaster Recovery Award recognizes technologies and vendors that have built cloud solutions that empower businesses small or large to remain active and productive under even the most challenging conditions, minimizing lost business opportunities.

 

“Intelligent recovery is the cornerstone of data resilience. By ensuring your SaaS data is always secure, you can be confident in your business continuity plan. The Keepit platform makes it easy to prepare for the worst, while also enhancing current business practices through cost-efficient data protection. We’re excited to receive this honor from Cloud Computing Magazine,” says Michele Hayes, CMO at Keepit.

 

“Recognizing excellence in the advancement of cloud computing technologies, Cloud Computing magazine is proud to announce the Keepit platform as a recipient of the Cloud Computing Backup and Disaster Recovery Award,” said Rich Tehrani, CEO, TMC. “Keepit is being honored for their achievement in bringing innovation to the market, while leveraging the latest technology trends.”

 

About Keepit
At Keepit, we believe in a digital future where all software is delivered as a service. Keepit’s mission is to protect data in the cloud Keepit is a software company specializing in Cloud-to-Cloud data backup and recovery. Deriving from +20 year experience in building best-in-class data protection and hosting services, Keepit is pioneering the way to secure and protect cloud data at scale.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

Cybersecurity tool sprawl and the cost of complexity

Under constant pressure to defend against cyberthreats, organizations often adopt new security tools rapidly to address specific vulnerabilities or compliance requirements. However, this reactive approach can lead to “tool sprawl,” where the unchecked accumulation of disparate solutions results in an overly complex and fragmented security environment.

What is cybersecurity tool sprawl?

Cybersecurity tool sprawl occurs when organizations continuously add new tools without fully assessing their existing security infrastructure or considering how these additions fit into the broader architecture. Over time, this reactive approach leads to an overextended security framework, where overlapping functionalities, siloed data, and operational inefficiencies compromise overall security.

As the complexity of managing a myriad of security tools grows, so do the risks of inefficiency, increased costs, skill gaps, and security vulnerabilities. Understanding these challenges is critical to developing effective strategies for minimizing tool sprawl.

A more holistic approach, where each tool is necessary, fully integrated, and effectively utilized, is crucial for maintaining a robust security posture in today’s dynamic threat landscape.

Having the right technology for your specific security needs leads to a strong cyber defense — not deploying the most technology.

What does cybersecurity tool sprawl look like?

Today, cybersecurity tool sprawl is characterized by an overabundance of security tools, often numbering in the dozens or even hundreds within large organizations. At the 2019 RSA Conference, Matt Chiodi, former chief security officer of public cloud at Palo Alto Networks, noted that small organizations average 15-20 tools, medium-sized businesses 50-60, and large enterprises over 130 tools.

These tools span various categories, including endpoint protection, intrusion detection, threat intelligence, identity management, and more. Despite this extensive array, research and industry reports indicate that only a small fraction of these tools are actively used, with many going underutilized due to their complexity or redundancy.

According to Richard Watson from Ernst & Young, most organizations utilize only 10% to 20% of the technology they own, while continuing to pay higher license costs for technology that they have not leveraged for other business needs.

Watson, in his article, “Simplify to Survive: How Organizations Can Navigate Cyber-Risk,” suggests that a technology declutter is required:

“Simplification will make companies more adaptive and pragmatic. It will support a shift from a complexity-inducing approach […] to an adaptive approach that works backward from core risks and sets companies up to move swiftly when attacks strike. Simplification will result in operational efficiencies, reduced technology and infrastructure overhead, and ultimately the ability to respond to cyber threats more quickly.”

5 critical challenges that come with tool sprawl

Tool sprawl presents numerous challenges that can hinder an organization’s ability to maintain an effective security posture. Five of the top side effects of tool sprawl are:

1. Operational inefficiency

2. Increased costs

3. Skill gaps

4. Visibility and control issues

5. Integration challenges

Operational inefficiency arises when organizations deploy many security tools, often with overlapping functionalities, it creates a complex, difficult to manage environment. Security teams may struggle to effectively monitor and correlate data from multiple tools, leading to missed threats and slower response times. The lack of integration between these tools can also result in fragmented security processes, where critical information is siloed and not shared across platforms. (Read about efficient tech stacks by Keepit CTO Jakob Østergaard.)

Increased costs are another significant issue. Each tool requires licensing, maintenance, and support, which can quickly escalate expenses. Additionally, the need for specialized personnel to manage and operate these tools further drives up costs. In many cases, organizations find themselves paying for tools that are underutilized or even redundant, exacerbating the financial burden.

Skill gaps among security staff can also be a challenge. The more tools an organization uses, the more difficult it becomes for the security team to be proficient with each one. This can lead to suboptimal use of the tools, where their full capabilities are not leveraged, ultimately weakening the organization’s overall security posture. The difficulty of keeping up with updates and best practices for a wide array of tools can also contribute to skill gaps and operational errors.

Visibility and control issues often arise in environments plagued by tool sprawl. With so many tools in play, maintaining comprehensive visibility across the network becomes challenging. This fragmented visibility can result in blind spots, where security incidents may go unnoticed or unaddressed. Moreover, the lack of centralized control can make it difficult to enforce consistent security policies across the organization, as well as thorough testing of a larger-than-necessary attack surface. (Read our article on “simplicity as a shield” and immutability.)

Finally, integration challenges are a common problem. Many organizations use a mix of legacy systems and new technologies that do not easily integrate with each other. This lack of integration can prevent security tools from working together effectively, reducing their overall effectiveness and complicating incident response efforts. Without seamless integration, data from different tools might not be aggregated and analyzed properly, leading to delays in threat detection and response.

While cybersecurity tools are essential for protecting an organization’s digital assets, excessive tool sprawl ultimately leads to significant challenges — all of which can weaken an organization’s security posture rather than strengthen it. Reducing tool sprawl through strategic consolidation and better tool management can help mitigate these challenges.

How can security leaders minimize tool sprawl?

Minimizing cybersecurity tool sprawl is crucial for maintaining an effective and efficient security posture. Here are several strategies that security leaders can adopt to tackle this challenge:

  • Data governance and prioritization: Start by clearly defining which data and assets are most critical to your organization. By understanding the specific areas that require protection, you can prioritize monitoring and tool selection efforts. This targeted approach ensures that resources are allocated efficiently and that security tools are directly aligned with the organization’s most valuable assets.
  • Recovery testing and centralized oversight: Regular recovery testing of backed-up data can help centralize security efforts. Centralizing oversight and validation processes not only minimizes sprawl but also ensures that your security measures are comprehensive and cohesive, minimizing gaps in protection.
  • Strategic SIEM implementation: Implementing a robust Security Information and Event Management (SIEM) system can consolidate monitoring efforts. A well-integrated SIEM can aggregate data from various sources, reducing the necessity to monitor multiple platforms independently. This consolidation simplifies the security environment and helps to avoid the complexities that lead to tool sprawl.
  • Selective tool acquisition: Before acquiring new security tools, it’s essential to clearly define your monitoring objectives. Any new tool should be evaluated for its ability to integrate seamlessly with your existing SIEM infrastructure. This careful selection process prevents the unnecessary expansion of the toolset and ensures that each addition provides real value.
  • Diversified intelligence sources: While integration is key, it’s also important to maintain diverse sources of intelligence. This diversification allows for cross-verification of threat information, leading to more accurate and comprehensive threat detection. Ensuring that your tools incorporate varied intelligence sources can enhance the overall security posture without adding redundant tools.
  • Resource and capacity assessment: Evaluate the capacity of your security team to manage the existing toolset effectively. This includes deciding whether to maintain an in-house Security Operations Center (SOC), outsource it, or adopt a hybrid approach. Aligning your toolset with the available resources ensures that your security team can effectively manage and utilize the tools at their disposal.
  • Regular review and rationalization: Periodically reviewing your toolset is essential for identifying redundancies and underutilized tools. This process of rationalization focuses on optimizing the security stack, ensuring that every component adds value and enhances your security posture. Regular reviews prevent sprawl from creeping back in and keep your security environment streamlined.

By implementing these strategies, organizations can effectively manage and reduce cybersecurity tool sprawl, ensuring a more efficient, cost-effective, and secure environment. In today’s complex threat landscape, a streamlined and integrated security approach is not just beneficial but essential.

Conclusion

Perhaps contrary to the wishes of the endless array of readily “onboardable” SaaS applications promising a silver bullet for your problems, just adding more and more tools isn’t the solution to cybersecurity woes — streamlining and integrating your security stack is.

By focusing on quality over quantity and maintaining oversight of your solutions, you can reduce tool sprawl, enhancing both efficiency and security. A well-coordinated approach not only cuts costs but also fortifies cyber resilience efforts.

 

About Keepit
At Keepit, we believe in a digital future where all software is delivered as a service. Keepit’s mission is to protect data in the cloud Keepit is a software company specializing in Cloud-to-Cloud data backup and recovery. Deriving from +20 year experience in building best-in-class data protection and hosting services, Keepit is pioneering the way to secure and protect cloud data at scale.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

Keepit celebrates dual wins at the 2024/25 Cloud Awards for intelligent backup and recovery solutions

Keepit was named winner in the “Best Cloud-Native Project/Solution” and “Best Cloud DR/Business Continuity Solution” categories.

Copenhagen, Denmark – January 15 – Keepit, a global provider of a comprehensive cloud backup and recovery platform, announced today its success in the 2024/25 Cloud Awards program by being named winner in the “Best Cloud-Native Project / Solution” and “Best Cloud DR / Business Continuity Solution” categories.

The Cloud Awards is one of the longest-running awards platforms of its kind, recognizing the latest achievements and innovations in cloud computing. Organizations that reached the finalist stage have had their nominations reviewed by the judging panel, resulting in the winners named today. The program received entries from organizations of all sizes from across the globe, including the USA and Canada, the UK and Europe, the Middle East, and APAC.

The program itself covers multiple aspects of cloud computing across 36 categories, including overall excellence (e.g.: innovation and disruption), systems and processes (e.g.: Payroll and Automation), certain technologies (e.g. SaaS and IoT), pieces of work (e.g.: projects, migrations or integrations), and workplace excellence (e.g.: consultancy, most promising startup, and ‘green’ credentials).

“More than 15,000 companies worldwide already include the Keepit platform as a part of their disaster recovery plans. By providing companies with instant and continuous access to their data, we’re helping to ensure business continuity and peace of mind. We’re honored to have received these accolades from the Cloud Awards,” says Michele Hayes, CMO at Keepit.

“Keepit has proven itself a leader in disaster recovery and business continuity with its purpose-built SaaS data protection platform, earning the title of ‘Best Cloud DR / Business Continuity Solution.’ By leveraging immutable, tamper-proof storage in an independent cloud, Keepit provides organizations with peace of mind, even in the face of cyberattacks or unexpected data loss. Its adherence to the highest security standards and cost-effective, predictable pricing model ensures companies remain operational, compliant, and secure. The Cloud Awards is proud to honor Keepit for its pivotal role in protecting business-critical data and ensuring uninterrupted continuity in an increasingly unpredictable digital landscape,” says Cloud Awards Technical Director, Annabelle Whittall.

Secure by design, the Keepit cloud is owned and run by Keepit. Customer data is kept in a separate, dedicated infrastructure, with the backed-up data stored fully isolated from the SaaS vendor’s cloud. With a user-friendly interface, robust data security, and the ability to adapt to your cloud environment, Keepit ensures your data is always accessible and protected.

About the Cloud Awards

The Cloud Awards is an international program which has been recognizing and honoring industry leaders, innovators and organizational transformation in cloud computing since 2011. The Cloud Awards comprises five awards programs, each uniquely celebrating success across cloud computing, software-as-a-service (SaaS), cloud security, artificial intelligence (AI), and financial technologies (FinTech).

Winners are selected by a judging panel of international industry experts. For more information about the Cloud Awards, please visit https://www.cloud-awards.com/.

About The Cloud Awards Program
The Cloud Awards identifies and celebrates the most innovative organizations, technologies, individuals and teams in the world of cloud computing. The program spans 36 categories, including ‘Best Cloud Infrastructure’ and ‘Best Cloud Automation Solution’.

About The Cloud Security Awards
The Cloud Security Awards celebrates innovation in the cybersecurity industry. The program includes a wide range of categories, including ‘Best Web Security Solution,’ ‘Cloud Security Innovator of the Year,’ and ‘Best Security Solution for Finance or Banking.’

About The FinTech Awards
The FinTech Awards focuses on the major innovations in the world of financial technology, including personal and corporate banking, insurance, and wealth management, business finance processes, and FinTech use within a selection of sectors, across 23 categories.

About Keepit
At Keepit, we believe in a digital future where all software is delivered as a service. Keepit’s mission is to protect data in the cloud Keepit is a software company specializing in Cloud-to-Cloud data backup and recovery. Deriving from +20 year experience in building best-in-class data protection and hosting services, Keepit is pioneering the way to secure and protect cloud data at scale.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.