Wednesday, May 7, 2025

Security


DigiCert unveils Device Trust Manager for IoT security
DigiCert, a global provider of digital trust products, has announced the evolution of its IoT security platform with the launch of DigiCert Device Trust Manager, an innovation designed to safeguard IoT devices throughout the entire lifecycle. The new Device Trust Manager addresses the critical needs of device manufacturers for an integrated and scalable solution to secure IoT devices, manage complex compliance requirements, and ensure operational and device integrity amidst growing threats targeting devices. With the projected growth of 55.7 billion connected devices by the year 2025 - spanning consumer electronics, healthcare equipment, industrial systems, and more - the threat landscape grows more diverse and complex each day. The scale of this interconnected ecosystem also amplifies compliance issues, as organisations struggle to adhere to stringent security standards and regulations across diverse device types, environments, and borders. To effectively mitigate these risks, organisations need a comprehensive way to manage and secure the vast array of devices in various stages of the lifecycle while safeguarding data, privacy, and operational continuity in the face of evolving threats. “With Device Trust Manager, DigiCert is reinforcing its commitment to digital trust in the rapidly expanding IoT landscape,” says Deepika Chauhan, Chief Product Officer, DigiCert. “We're excited to introduce this integrated platform to new and existing customers, transforming IoT device security with comprehensive protection throughout the device lifecycle. Device Trust Manager checks all the IoT boxes, except the one labelled 'Ship and Pray'.” DigiCert Device Trust Manager offers unparalleled security for every stage of the IoT device lifecycle, from birth to decommission, ensuring compliance while improving operational efficiency. The solution prioritises privacy, consumer safety, and business continuity via: • Enhanced compliance: Simplifies adherence to international regulations, supporting rigorous compliance demands with detailed SBOMs (Software Bill of Materials), real-time monitoring, and secure provisioning to maintain device integrity throughout the lifecycle• Operational efficiency: Automates security processes, enabling quicker device deployment with features like over-the-air (OTA) updates and zero-touch provisioning• Risk mitigation: Improves anomaly detection capabilities to protect against downtime and data breaches• Scalable security: Easily scales from small to large deployments, adapting to various device ecosystems. “The latest solution from DigiCert, built upon the already impressive DigiCert One platform, shows continued innovation,” says Sam Gabbay, President, TUO Accessories. “Once again, DigiCert is leading the way by showing leadership, commitment to IoT security and especially their customer experience by thinking 10 steps ahead for them. I am proud to be a DigiCert customer and am excited to use Device Trust Manager, which shows promise to improve an already streamlined workflow.” For more from DigiCert, click here.

Security expertise gap to threaten cloud expansion plans
Tenable, an exposure management company, has launched its latest cloud security report, titled 2024 Cloud Security Outlook: Navigating Barriers and Setting Priorities. The report reveals that most IT managers (97%) plan to expand their cloud environments in the next year. However, this ambition is being met with significant challenges, as 45% of those responsible for managing cloud security cite a major lack of expertise as a barrier to implementing new cloud security. In addition to this, 33% of respondents stated that they believe one of the biggest risks to their cloud infrastructure now sits outside of the organisation in the form of third-party suppliers. This highlights that whilst cloud adoption may be on the rise, organisations face serious security challenges from both inside and outside of their business. Bernard Montel, EMEA Technical Director and Security Strategist, Tenable, explains, "In today's digital landscape, organisations are racing to embrace cloud technologies for their myriad benefits, yet our latest findings reveal that a staggering 97% of organisations are currently grappling with insufficient expertise in cloud infrastructure security. “While the intention to expand cloud systems is evident among IT leaders, the alarming occurrence of breaches and the identified risks, such as third-party providers in supply chains, underscores the urgent need for organisations to prioritise investment in upskilling and resources. Addressing the clear skills gap is paramount in fortifying cloud security measures and mitigating the risks posed by an evolving threat landscape." The report also sheds light on the prevalence of cloud-related breaches, with half (50%) of UK businesses stating that they suffered between three and four cloud-based security breaches in the last year alone. Tenable says that this further highlights the urgent need for organisations to bolster their cloud security strategies and invest in the necessary expertise to safeguard their digital assets effectively, especially as IT managers expand their infrastructure and move more assets into cloud environments. As businesses continue to embrace cloud technologies, Tenable remains committed to empowering them with innovative solutions and actionable insights to address the evolving challenges of cloud security. The full Tenable Cloud Security Outlook Report 2024 can be accessed by clicking here.

VAST partners with Superna to help boost cyber resilience
VAST Data, an AI data platform company, has announced a partnership with Superna, a provider of data security and cyber storage solutions for on-premises, hybrid, and multi-cloud environments. The integration will provide VAST customers with immutable data protection, real-time suspicious behaviour detection, automated cyber threat response, and near-instant recovery from ransomware and other disasters, bolstering cyber resilience for their enterprise data. With ransomware payments exceeding $1.1 billion (£865m) in 2023, enterprises today require sophisticated protection embedded at the storage layer. The VAST Data Platform aligns to the NIST framework, providing a solid foundation to detect, protect against, respond to, recover from, and even prevent cyber threats entirely with active defence and powerful Zero Trust security features. VAST’s breakthrough approach to data management and data-intensive computing serves as the comprehensive software infrastructure for AI and deep learning. As AI adoption grows, so does the challenge of managing large amounts of unstructured data. This new world, with new workloads using various data types, needs a new level of protection for cyber resilience. With its Zero Trust architecture, granular access control, multitenancy with strict isolation, and intelligent threat detection, VAST has integrated Superna Data Security Edition capabilities into the VAST Data Platform, enabling them to mitigate the risks of ransomware and other threats to AI models and application datasets. “By combining the world’s simplest, fastest and most efficient data platform built for exabyte scale AI, with Superna’s trusted, secure data protection and recovery offerings, we’re offering a ready-made solution able to access, manage, move and protect data for the most data-intensive organisations on the planet,” says John Mao, Vice President, Technology Alliances at VAST Data. “With VAST and Superna, customers get robust, federated cyber defence and resilience at the data layer. ” Together, VAST Data and Superna provide organisations worldwide with: • Ransomware detection at the data layer. The VAST and Superna partnership seeks to redefine ransomware protection with proprietary algorithms and multi-layer defence that analyses data and user behaviour in real-time. Proactive threat detection protects against and halts known and emerging ransomware threats before they breach data defenses, significantly boosting cybersecurity resilience by dismantling dangers at their very origin. • Improved business continuity. With this comprehensive security offering, organisations can significantly reduce the risk of data breaches while still capturing immutable snapshots for immediate, automatic recovery of the last-known clean data set. Superna Disaster Recovery Edition mitigates the impact of attacks, facilitating uninterrupted business operations and AI deployments by safeguarding customers’ mission critical data. • Streamlined disaster recovery and global replication. With VAST and Superna, customers can replicate entire systems, jobs and policies to another cluster with Tenant-Aware Replication and Intelligent Configuration Replication under every protected path. • Robust Migration with Heterogeneous Environments. As many organisations undertake initiatives like moving to a preferred cloud, repatriation, and diversification of storage (intentional or not), the ability to provide a consistent approach everywhere is essential. Superna facilitates flexible data migration from supported storage platforms to VAST, allowing customers to easily re-platform their data and services. • Seamless integration with leading security tools. The VAST Data Platform intelligently integrates the Superna Data Security Edition into existing security tools, enhancing defense posture without disrupting workflows or processes. By keeping security and operations teams on high alert with comprehensive reports on the scope of an attack, VAST and Superna are empowering these teams to mitigate threats and accelerate recoveries. Superna bundled with VAST is available to partners via ARROW. For more from VAST Data, click here.

Keepit crowned a winner in 2024 Cloud Security Awards
Keepit, a provider of SaaS data protection solutions, achieved success in the 2024 Cloud Security Awards programme by being named a winner in the 'Best Security Solution for Data Management / Data Protection' category. Now in its second year and with an expanded range of categories, The Cloud Security Awards programme celebrates the pivotal innovations in cloud-based security solutions from around the globe. In addition to the aforementioned success, Keepit was also a finalist in the 'Best in Information Security' category. Speaking on the company's success, James Williams, CEO of The Cloud Awards, comments, “Keepit has successfully navigated all three rounds of judging during a rigorous selection process, impressing the judges with their innovation and commitment to keeping data and other assets safe, secure, and private. We look on with interest to see what Keepit has in store for its customers throughout the rest of 2024, and beyond. Many congratulations to them, and our other winners.” Michele Hayes, CMO at Keepit, adds, “Keepit supports customers around the globe by future-proofing their security strategies. This accolade underscores our commitment to innovation, security and reliability, and further positions the company as a leader in the cybersecurity industry.” Built for the cloud, the Keepit platform is designed for usability, security and scalability. With a user-friendly interface, robust data security, and the ability to adapt to the user's cloud environment, Keepit ensures the user's data is always accessible and protected. The Cloud Awards is an international programme which has been recognising and honouring industry leaders, innovators and organisational transformation in cloud computing since 2011. The Cloud Awards comprises five awards programmes, each uniquely celebrating success across cloud computing, software-as-a-service (SaaS), cloud security, artificial intelligence (AI), and financial technologies (FinTech). Winners are selected by a judging panel of international industry experts. For more information about the Cloud Awards, click here. For more from Keepit, click here.

3D LiDAR set to redefine data centre security
Enhancing physical security, especially perimeter intrusion detection (PID) at critical infrastructure sites like data centres, warehouses, airports and utilities, is increasingly crucial due to growing threats such as theft, protests, sabotage, terrorism and war. In its latest whitepaper, Quanergy 3D LiDAR Solutions Redefining the Physical Security of Critical Infrastructure, global technology intelligence firm ABI Research forecasts the worldwide physical security market for LiDAR sensors will surpass three million total installations by 2030, with water infrastructure leading the segment. The yearly revenue opportunity will exceed $6 billion (£4.8bn) in 2030. “Physical security, specifically PID, encompasses controlling access for both individuals and vehicles into secured areas, as well as preventing objects from being thrown or passed across perimeter boundaries. Moreover, physical breaches often precede cyberattacks, underscoring the importance of intrusion detection in combating cyberthreats,” explains Dominique Bonte, Vice President, End Markets, at ABI Research. Current security offerings rely on cameras and/or radar struggle to effectively detect and track intruders, and produce numerous false alerts, leading to higher operating costs and alarm fatigue. ABI Research states that these legacy 2D technologies lack accuracy and perform poorly in low light and adverse weather conditions, resulting in missed events, increased liabilities, and high cost of ownership. According to Dominique, “3D LiDAR offers robust, reliable, and high-precision detection and tracking employing mesh architecture at an overall lower total cost of ownership (TCO), allowing security personnel and critical infrastructure to increase the effectiveness, while reducing the cost associated with manned guard services.” The whitepaper explores: a comparison of physical security technologies; key critical infrastructure markets; LiDAR case studies for physical security segments; physical security LiDAR market sizing and forecasts; and Quanergy LiDAR solutions for physical security ABI Research believes that 3D LiDAR solutions will have a transformational impact on the physical security market, redefining how to protect vulnerable critical infrastructure. “The unique characteristics of LiDAR in terms of detection accuracy and reliability, range and field of view, continuous tracking, ease of deployment, and privacy preservation make it the technology of choice for next-generation physical security solutions to protect a wide range of mission-critical assets in the utility, data centre, airport, and other critical infrastructure segments,” Dominique concludes. For more information on how 3D LiDAR can take physical security of critical infrastructure to the next level, download the whitepaper by clicking here.

Infinidat innovation recognised for its cyber security credentials
Infinidat, a provider of enterprise storage innovations, has announced that its InfiniBox SSA II has been recognised by analyst firm, DCIG, as one of the world’s top cyber secure all-flash arrays (AFA) for enterprise storage. This high ranking, which was revealed in the 2024-25 DCIG Top 5 Cyber Secure High-End All Flash Arrays Report, is based on independent research that DCIG conducted into the AFA marketplace, with an expanded focus on cyber storage resilience and recovery. “The recognition of the InfiniBox SSA II as one of the top five cyber secure AFAs in the world validates that not only is Infinidat’s primary storage solution the fastest all-flash array with industry-leading ultra-low latency, but also an industry acclaimed solution for cyber resilient storage,” says Eric Herzog, CMO at Infinidat. “Ever since we delivered the ground-breaking capabilities of InfiniBox SSA with our InfiniSafe cyber storage software and our InfiniVerse platform, Infinidat has redefined cyber resilience and recovery for enterprise storage. With an unprecedented guarantee, our InfiniBox SSA II ensures that enterprises and service providers recover and restore data at near-instantaneous speed after a cyberattack, significantly reducing the impact of ransomware and malware and saving companies time and money.” Cyber resilience is among the most important and highly demanded requirements of enterprises today to ensure exceptional cyber security and resist cyber attacks across the entire storage estate and data infrastructure. Infinidat’s InfiniSafe cyber secure capabilities in the InfiniBox SSA II innovation combines immutable snapshots of data, logical air gapping, a fenced forensic environment, cyber detection, and virtually instantaneous data recovery, which clocks in at less than one minute, guaranteed. Infinidat leverages artificial intelligence (AI) / machine learning (ML) to provide deep content-level scanning to identify compromised data. The InfiniBox SSA II creates a private network that is isolated for data validation, facilitating the critical step of identifying a clean copy of data for reliable, rapid recovery. "Having a cyber secure all-flash array is a necessity for enterprises to protect data from cyber attackers and ensure the security of the entire storage infrastructure, as well as to maximise business benefits by automating and consolidating workloads onto a higher-performance all-flash platform," said Dave Raffo, Consulting Analyst at DCIG. "A legacy all-flash array without cyber security capabilities built into it is already outdated and a potential huge liability in today's world of continuous cyberattacks. Our list of the top five Cyber Secure High-End All Flash Arrays constitutes the future of enterprise storage. The InfiniBox SSA II has earned a top spot because of advanced cyber resilience features on its platform, coupled with the performance, scalability, 100% availability, and cost-effectiveness that enterprises need." The InfiniBox SSA II is Infinidat's high-performance, all-flash array aimed at mission-critical workloads that demand the ultimate in real-world application performance. It is integrated with the InfiniVerse platform, which accelerates Artificial Intelligence for IT Operations (AIOps) to automate and streamline storage management, utilises AI-based predictive analytics, and enables easier management of hybrid cloud storage implementations. In addition to creating a cyber secure enterprise storage infrastructure that is efficient and dynamic, the InfiniBox SSA II allows customers to not only have optimal application and workload performance, but also allow for substantial storage consolidation, transforming storage performance, providing superior reliability, and reducing CAPEX and OPEX. The SSA II delivers the same 100% availability, white glove service, and lower total cost of ownership that defines the industry acclaimed InfiniBox customer experience, the company states. To read the DCIG report, click here. For more from Infinidat, click here.

Storage must form the core of an enterprise cyber security strategy
By James ‘JT’ Lewis, Director of Channel Sales for EMEA and APJ at Infinidat It’s no wonder that in PwC’s 24th Annual Global CEO Survey, leaders ranked cyber attacks second place amongst the most serious of all possible economic, social, political, business, and environmental threats. Ransomware attacks represented 12% of breaches of critical infrastructure in the last year.  Cyber security experts have estimated that global cyber crime costs will exceed 7.5 trillion Euros this year, according to CyberSecurity Ventures. Enterprises run on data and when it’s hacked or corrupted by cyber criminals, the disruption can topple an operation overnight, with multi-million Euro consequences. The irony is that, if the fallout from a cyber attack happened that quickly, it may be less problematic to recover from. Remedial action should be started immediately and any damage minimised. The actual problem is much more insidious because when cyber attackers target an enterprise, they usually wait for almost six months before taking action. This increases their ransom power and without the right data controls, the victim’s only option may be to concede to whatever financial demands are being made. In that timeframe, their primary data, the live data your business operations depend on, could have been exposed to all kinds of criminal activity. For this reason, enterprise storage has become a main target of cyber criminals for the most damaging and hard-to-detect ransomware and malware attacks. One reason why enterprises still get trapped is because a cyber security strategy tends to focus on keeping criminals out in the first place, rather than accepting that attacks will most likely happen and there is an impetus for having a watertight strategy. The wolf will definitely keep knocking and will get inside your house. So, what steps can you take? Firstly, cyber security’s emphasis must widen, to address three areas - detection, resilience and recovery - and plug the vulnerability gap that cyber criminals have been exploiting. Combining resilience, which is the ability to instil defensive security measures to repel attacks; detection, which is the ability to know when data is corrupted and whether a known good copy of data is free of ransomware or malware; and recovery, which is the ability to bounce back and recovery with a known good copy of the data from cyber attacks, is the key to hardening storage infrastructure. Converging cyber resilience, detection, and recovery on an integrated enterprise storage platform is an advancement over former siloed approaches that rely on disparate tools and technologies. It makes the cyber capabilities more air-tight and ensures a rapid recovery of data within minutes to thwart cyber criminals, nullifying ransom demands and minimising downtime or damage to the business. There are some key features of enterprise storage that need to be in place to ensure cyber resilience against today’s cyber criminals, all of whom are highly skilled technology experts. These include ensuring the immutable nature of the data, recovered from a copy you can trust. Air-gapping to separate the management and data planes to protect the data. A secure forensic environment, to analyse the data thoroughly and ensure the fastest recovery speeds possible is critical. Immutable snapshots allow the end user to roll back the clock and recover guaranteed, uncorrupted copies of their data, before the execution of any malware or ransomware code introduced by an attacker. Immutable snapshots ensure data integrity because they prevent data copies from being altered or deleted by anyone. Even internal systems administrators are locked out of immutable snapshots manipulation. The enterprise can be confident that any disruption or damage caused by the intrusion is minimal. Logical air gapping adds a further layer of security, by creating a safe distance between the storage management layer and the immutable snapshots. There are three types of air gapping. Local air gapping keeps the data on premises, remote air gapping makes use of a remotely hosted system and hybrid air gapping combines the two. Fenced forensic environments help speed up the recovery process by providing a secure area to perform a post-attack forensic analysis of the immutable snapshots. The purpose here is to carefully curate data candidates and find a known good copy. The last thing an enterprise wants after an attack is to restore data infiltrated with malware or ransomware. Once these core elements are present within your storage infrastructure, the whole restoration can progress like clockwork. It’s why our focus as an organisation is dedicated to educating IT leaders about the need for a convergent, tripartite approach. One that combining cyber resilience, detection, and recovery on a single storage platform. Reliance solely on backups and preventing attacks is no longer enough to secure storage systems.

iC Consult announces partnership with Transmit Security
iC Consult, an independent consultancy, systems integrator, and managed services provider for identity-driven cyber security, has announced a ground-breaking partnership with Transmit Security, the innovator of identity verification and fraud prevention services, including market-leading orchestration, phishing-resistant authentication with true password-less MFA, passkeys and modern customer identity and access management (CIAM). This partnership marks a significant milestone in the pursuit of enhanced cyber security measures and fraud prevention capabilities and is set to offer businesses robust, frictionless authentication experiences that exceed current compliance and security requirements. Transmit Security has been recognised for its commitment to revolutionising the customer authentication process, eliminating the need for passwords, and thereby, significantly reducing the risk of fraud. The decision to partner with iC Consult stems from its unparalleled expertise in IAM solutions, global footprint in delivering cyber security solutions, and a shared vision for delivering superior cyber security solutions that cater to the evolving needs of businesses worldwide. Transmit Security’s VP & GM EMEA, Phil Allen highlights, "iC Consult’s global reach and innovative approach to identity management programs make them the ideal partner to advance our shared goal of making digital interactions safer and more user-friendly." Kaltrina Ademi, Director of Channel Sales EMEA, adds, "Partnering with iC Consult was a natural choice for us. Their expertise in IAM and commitment to excellence complement our mission to secure digital identities across the globe." Andre Priebe, Chief Technology Officer at iC Consult, shares, "Transmit Security’s password-less technology is a game-changer for our clients, addressing the urgent need for more robust cyber security measures in today’s digital landscape." Heiko Klarl, Chief Marketing and Sales Officer at iC Consult, remarks, "This partnership enhances our ability to deliver cutting-edge solutions that effectively combat cyber security threats and fraud, marking a significant step forward in our mission to protect digital identities."

Pedab and Object First join forces for advanced Veeam data protection
Pedab and Object First have announced a partnership to provide Veeam customers with advanced data protection to reduce the risk of cyber threats like ransomware. This partnership brings together two companies with complementary expertise, including Pedab's strong knowledge of IT infrastructure and software solutions and Object First's innovative approach to immutable backup storage for Veeam. Object First claims that it is known for offering the best storage for Veeam, provided as an out-of-the-box immutable backup storage appliance. It offers the last line of defense against disasters and ransomware, ensuring that data can be recovered quickly and completely, with minimal downtime.  Pedab will introduce Object First’s solution Ootbi (Out-of-the-Box Immutability) to the Northern European market. Ootbi can be deployed in 15min and supports up to 80VMs running locally, powered by Veeam Instant Recovery on a four-node configuration. The solution’s power is matched by its security. It offers object-based immutability with zero access to the root or the hardened Linux operating system by default—meaning data cannot be accessed, changed, or deleted. Ootbi's storage environment is completely secured, validated, and third party-tested and comes preconfigured out of the box – no security expertise required. With Ootbi, businesses can safeguard their data with confidence, knowing that critical information remains secure and unchangeable, even in the face of evolving cyber threats. “Ootbi by Object First is an important enhancement to Pedab’s portfolio of carefully selected providers. It ensures Pedab’s mission to continuously evolve our full-service solution offering to partners. With Ootbi we can now help Veeam partners provide peace of mind to their customers with an immutable onsite backup storage,” says Jesper Bartholdson, CEO of Pedab Group. “We are excited to announce Pedab as our distributor in Northern Europe. With their extensive expertise in the IT industry, partnering with Pedab was an easy choice,” says Mark Haddleton, EMEA Channel Sales Director at Object First. “Together, we are committed to delivering secure, simple, and powerful backup storage for Veeam users, helping businesses stay one step ahead of ransomware threats.”

Keepit provides fast targeted restore time after ransomware attack
Keepit, a global provider of cloud backup and recovery solutions, has announced the results available to organisations leveraging Keepit SaaS data protection. The results show Keepit solution provides organisations the ability to restore and recover backed-up data after a ransomware attack in a quick, efficient and accurate manner. These findings stem from a recent study conducted by Forrester Consulting, which quantify the value of the world’s sole vendor-independent cloud dedicated to SaaS data protection. Keepit commissioned Forrester Consulting to conduct a Total Economic Impact (TEI) study and examine the potential return on investment (ROI) that enterprises may realise by deploying Keepit SaaS data protection. The purpose of this study was to provide a framework to evaluate the potential financial impact of Keepit SaaS data protection on end users. To better understand the benefits, costs, and risks associated with this investment, Forrester interviewed four representatives with experience using Keepit. For the purposes of this study, it aggregated the interviewees’ experiences and combined the results into a single composite organisation that is represented as a manufacturing organisation with $2bn in annual revenue. While ransomware attacks have become increasingly common and organisations face the risk of losing  critical  data, Keepit claims to offer strong protection, providing a crucial lifeline for recovering user data after cyber attacks or other events. With Keepit, information technology (IT) administrators can quickly find, restore, and save data. Additionally, the study also shows that its solution helps prevent the negative effects of ransomware attacks and saves time and money for IT teams, resulting in smoother, more time-efficient SaaS backup operations. Benefit worth $819,100 According to the study, the Keepit solution limits the impact of a ransomware attack for the composite organisation by allowing it to recover and restore data quickly, preventing data loss and reducing downtime. This benefit is worth $819,100. And, the study finds, “the time needed to restore the tier-one users is 90% lower than the time the composite would spend restoring its data without Keepit, which has been identified by interviewees to be at least three weeks.” “We can prove it’s possible to significantly lower downtime during recovery from a ransomware attack. Lowering downtime is a sure-fire way to maximise return on your investment in a backup solution. Because it’s not a question of if an attack will happen, the question is how to bounce back when it does,” says Paul Robichaux, Microsoft MVP and Senior Director of Product at Keepit. Three quarters of security decision-makers suffered a breach in the last 12 months, and in the study, Forrester research recommends, “Backups are the best insurance policy against an attack, but to be effective they need to be part of a planned and tested backup and recovery process.” The study participants noted that their organisations planned for a disaster scenario in the event of a ransomware attack and were aware of the exposure risk and potential losses they could suffer as a result. As a follow-up to the Forrester study, Keepit will be holding a webinar at 2pm EDT on 26 March, titled, ‘The ROI of Ransomware Recovery’. Hosted by Keepit’s Paul Robichaux, the webinar will feature guest speakers Brent Ellis, Forrester Senior Analyst, and Elia Gollini, Forrester Associate Consultant. Key takeaways from the webinar will include: Actionable insights and recommendations on how to address current gaps in disaster recovery planning Insight into best practices for ensuring business continuity during a ransomware attack Information about the return on investment (ROI) organisations have realised when deploying Keepit for ransomware recovery To register for the webinar, visit the sign-up page here.



Translate »