Technology Record - Issue 25: Summer 2022

51 “For 20 years, AvePoint has specialised in technology that complements Microsoft, making collaboration secure across the ecosystem. AvePoint’s Cloud Backup for Microsoft 365 now has a ransomware detection feature, which detects suspicious behaviour within users’ Microsoft OneDrive. After finding unusual activity, Cloud Backup provides detailed reports to shorten the investigation period and flag the areas of question to administrators. If necessary, AvePoint will then restore all or specific OneDrive data, recovering business-critical information quickly for Cloud Backup customers. While Microsoft provides native security capabilities, the extra layer from AvePoint empowers businesses to defend against ransomware attacks and ensure business continuity.” John Peluso Chief Product Officer, AvePoint Joe Garber Chief Marketing Officer, Axiad “Axiad automates the provisioning of multi-factor authentication (MFA) credentials with Microsoft Azure Active Directory (AD), allowing organisations to use Windows Hello for Business and additional authentication methods such as one-time password, public key infrastructure and FIDO to address virtually any authentication need without requiring any on-premises dependencies. The solution is a match for organisations that are looking to deploy Azure AD along with MFA credentials on YubiKeys, TPM, Smart Cards or mobile devices. The integration manages and extends the scope of Windows Hello for Business credentials Cert-Trust and Key-Trust, to support all workforce authentication use cases from a single platform.” Fleming Shi Chief Technology Officer, Barracuda “In the past year, Barracuda researchers have analysed 121 ransomware incidents, a 64 per cent increase year over year. Cybercriminals are still targeting municipalities, healthcare and education providers, but attacks on other businesses are surging. Following the outbreak of war in Ukraine, we’ve also observed a rise in general disruptive attacks. These appear to be originating from Russian IP addresses, targeting outdated software to create disruption, rather than with any concrete aim. It’s important that organisations assume they will be victimised and protect themselves accordingly. The security industry, meanwhile, needs to continue creating solutions that are consumable for companies of all sizes without requiring scarce security talents.”

RkJQdWJsaXNoZXIy NzQ1NTk=