Skip to content

Industroyer:一種摧毀供電系統的網路武器

國際資安大廠ESET於5年前(2017) 6月12日發現一個惡意程式Industroyer,其鎖定公共基礎建設而來,這也是第一個專門針對供電系統所開發的已知惡意軟體,而它在被發現的幾個月前就已經襲擊烏克蘭變電所並導致基輔部份地區的數千戶家庭在2016年12月17日斷電約一個小時。

Industroyer對基礎建設威脅很大,因為它能直接控制電廠的配電變電所開關及輸電網路的斷路器,研究人員分析,Industroyer可以輕易關閉供電、引發系統失靈或其他更嚴重危害;另外Industroyer使用的是全球電廠、運輸控制系統及自來水、瓦斯等其他基礎設施使用的工業通訊協定,影響範圍甚廣。

時間來到2022年,Industroyer捲土重來,4月12日ESET研究人員與烏克蘭電腦緊急應變小組(CERT-UA)一起宣布,他們發現了針對烏克蘭一家能源供應商的Industroyer新變種。Industroyer2原定於4月8日對烏克蘭的一個地區進行斷電,所幸最後成功阻止了針對該國電廠所展開的攻擊行動。

近年來,影響烏克蘭及世界其他地區關鍵基礎設施的一連串事件,已使許多公眾意識到網路攻擊所引起的停電、供水中斷、燃料分配中斷、醫療數據遺失等的風險以及許多其他後果,這些不僅會干擾一般日常生活,它們還可能危及生命,基礎建設威脅警鐘已然響起,是值得深思的重要議題,相關單位及負責人員應即早完善安全措施,防患於未然。

原文出處:https://www.welivesecurity.com/2022/06/13/industroyer-cyber-weapon-brought-down-power-grid/

#若有任何資安需求,歡迎洽詢台灣二版資安專業團隊,服務電話:(02)7722-6899,或上官網查詢:https://version-2.com.tw/

關於ESET
ESET成立於1992年,是一家面向企業與個人用戶的全球性的電腦安全軟體提供商,其 獲獎產品——NOD32防病毒軟體系統,能夠針對各種已知或未知病毒、間諜軟體 (spyware)、rootkits和其他惡意軟體為電腦系統提供實時保護。ESET NOD32佔用 系統資源最少,偵測速度最快,可以提供最有效的保護,並且比其他任何防病毒產品獲 得了更多的Virus Bulletin 100%獎項。ESET連續五年被評為“德勤高科技快速成長500 強”(Deloitte’s Technology Fast 500)公司,擁有廣泛的合作夥伴網絡,包括佳 能、戴爾、微軟等國際知名公司,在布拉迪斯拉發(斯洛伐克)、布里斯托爾(英國 )、布宜諾斯艾利斯(阿根廷)、布拉格(捷克)、聖地亞哥(美國)等地均設有辦事 處,代理機構覆蓋全球超過100個國家。

關於 Version 2 Digital
資安解決方案 專業代理商與領導者
台灣二版 ( Version 2 ) 是亞洲其中一間最有活力的 IT 公司,多年來深耕資訊科技領域,致力於提供與時俱進的資安解決方案 ( 如EDR、NDR、漏洞管理 ),工具型產品 ( 如遠端控制、網頁過濾 ) 及資安威脅偵測應 變服務服務 ( MDR ) 等,透過龐大銷售點、經銷商及合作伙伴,提供廣被市場讚賞的產品及客製化、在地化的專業服務。

台灣二版 ( Version 2 ) 的銷售範圍包括台灣、香港、中國內地、新加坡、澳門等地區,客戶涵 蓋各產業,包括全球 1000 大跨國企業、上市公司、公用機構、政府部門、無數成功的中小企業及來自亞 洲各城市的消費市場客戶。

IT 專業人員需要知道和錯過的事情

At PAndora FMS we have IT professionals on an altar. Literally, one next to the water dispenser in the office. I’m serious! It even has its blessed liturgical cloth, its flattering parsley, its candles and the incense! But there are still things that these people miss. Here’s a hint: it’s related to ITOM.

IT Operations Management (ITOM) and automation

We all agree in the industry that IT professionals waste too much time every day, struggling with minor tasks within IT Operations Management (ITOM). 

And it is that ITOM covers everything necessary to support the network infrastructure that provides IT services. 

This includes both the hardware (switches, servers, data center firewalls…) as well as the company’s network and the tools needed to make sure everything works properly.

According to the latest surveys, 78% of IT professionals say they spend at least 10% of their time proactively optimizing their environments. 

This extra time spent on maintenance and conservation obviously takes time from proactive optimization. 

And this is where automation comes in. 

Automation is that miracle from heaven that sets IT professionals free to stop wasting time and focus on things that really matter, and not on boring tasks!

Of course, most IT professionals know firsthand the value of automation. 

That’s why they have their altar. *Visitable during working hours, and donations are accepted

But automation has not yet reached ubiquity regarding ITOM. 

And it’s time for that to change!

That’s why we want you to start considering automating the following types of tasks:

  • Complex tasks with multiple steps
  • Repetitive routine tasks or tasks triggered by a recurring event
  • Tasks where a large amount of data needs to be filtered based on specific, predefined criteria

As we said, in these cases, automation can help the incredible intellects of IT professionals, and their almost intrinsic creativity to focus on other needs.
Perhaps, even with automation, you will minimize the possibility of human error in tasks.

What is the next step?

Certainly the next step is to consider which are the most relevant ITOM tools. 

If your megalomaniac goal is, for example, to optimize a large government network, look for the products best designed to scale and then make sure the vendor and product are approved for use in government networks. 

Here, for example, the most relevant ITOM tools could be:

  • Performance monitoring
  • Configuration management
  • Security and intrusion detection and prevention
  • Troubleshooting

If you then relax and have a tea and take enough time to consider specific processes that can benefit from automation, such as automating network configurations, you may help out your IT professionals do more efficiently tasks like: 

Meeting compliance requirements, implementing configuration changes quickly and efficiently, or reducing downtime caused by faulty devices.

And network configuration automation is only one area from among them all. 

Think about the possibility of automating workflows and your IT staff crying dramatically when finally getting their lives back! 

Or automating tasks initiated by mobile devices, etc.

Prepare for change!

Naturally, automation leads us to the development of a new type of skills within IT staff. 

The more tasks are automated, the more IT professionals become automation supervisors instead of performing those tasks themselves.

That is, while before more specialized staff needed to understand perfectly what the inner workings of each piece of hardware were like, with automation, these people need to be much more aware of how the software works. 

They need to understand application programming interfaces and how they can dictate things like policies, rules, and user access.

Conclusions

ITOM and automation together are virtually the panacea for IT professionals. 

The secret of a successful transition is to go little by little, in a gradual and logical progression. 

Securing tasks, processes, and skill sets so that they move together toward a better future filled with altars in the office for IT professionals!

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About PandoraFMS
Pandora FMS is a flexible monitoring system, capable of monitoring devices, infrastructures, applications, services and business processes.
Of course, one of the things that Pandora FMS can control is the hard disks of your computers.

基於角色的訪問控制在網絡安全中的威力

Determining the right network access control (NAC) security policy for your organization isn’t an easy task.

It’s often a balancing act between keeping your network secure and ensuring employees can access the systems they need to do their jobs.

Role-based access control (or RBAC) can be a good way of ensuring your network is protected. If you’ve been considering implementing RBAC in your organization but aren’t entirely sure of the benefits, this article will answer your questions.

What is role-based access control?

Role-based access control is a way of restricting access based on a user’s role within an organization. This means that users aren’t assigned permissions directly but are instead given roles that govern their levels of access. Depending on their job and responsibilities, a user may have one or more roles.

Let’s say, for example, you have a staff database on your network, which contains all your employees’ contact details and contractual information.

Everyone in the organization may have access to edit their own personal details. Managers may have access to edit their team’s information, but no one else’s. Your HR team may have full access to the database to view and edit everyone’s data.

RBAC works on the Principle of Least Privilege (PoLP). This means users have the minimal level of access needed to carry out their job.

RBAC isn’t the only access control method available. There are other options you can consider, like attribute-based access control (ABAC), policy-based access control (PBAC) and access control lists (ACL). However, role-based access control is one of the most effective ways of not only keeping networks secure but improving organizational efficiency.

A study by NIST has shown that role-based access control addresses most of the needs of government and commercial organizations.

Why is role-based access control so important when it comes to network security?

Networks are more susceptible to security breaches than ever before. People working from home and the introduction of BYOD policies mean more endpoints that can be compromised.

In fact, according to IBM, it’s estimated that data breaches in 2021 cost businesses an average of $4.24 million.

With this in mind, it’s essential to ensure networks stay safe. Here’s how role-based access control can provide security for businesses large and small.

I. It makes it easy to ensure networks are secure

Setting up permissions for networks is relatively straightforward. However, as people start, leave, and move around organizations, permissions can become less efficient. Users may end up with access to systems they no longer need.

RBAC means IT departments can effectively manage what access people have with a click of a button.

Let’s go back to the example of the staff database above and say that a new staff member has joined the HR team. Rather than setting access at a user level, you can add them into the ‘HR’ role so they can have full access to the system.

A few years later, let’s say the staff member moves into the sales team, meaning they no longer need full access to the staff database. Rather than changing every single point of access they have, it’s just a case of adding them into the ‘sales’ role instead.

II. It reduces the attack surface

It’s estimated that one in four data breaches result from human error. With RBAC, if a member of staff causes an accidental (or intentional) data breach, there will be less impact.

Let’s say someone is a victim of a phishing attempt, and a hacker obtains their login details. The hacker will only be able to access the information that the member of staff has through the roles they have been allocated.

This means even if a data breach occurs, most of your information will still be safe.

III. It eliminates the risk of ‘insider threats’

Disgruntled employees can often try and settle the score by leaking confidential data or deleting important information. Earlier this year, an IT technician in the UK was jailed for 21 months for wiping data from the school he was formerly employed at after being fired.

As role-based access control gives just enough access to ensure staff can carry out their jobs, it minimizes the risk of users causing intentional harm to your networks.

Similarly, if you work with any third parties, you can use RBAC to assign them pre-defined roles and limit what they can view or edit. Once you stop working with them, you can quickly remove their permissions.

IV. It can quickly scale and adapt

As RBAC deals with overarching roles rather than individual permissions, it can grow as an organization’s IT requirements do.

Let’s say you acquire a new application for your organization. Role-based access control makes it easy to create new permissions as well as set different levels of permissions quickly. As a result, you can ensure any new hardware or software stays secure and that the right people have access.

V. It can ensure you stay compliant

Some industries, like healthcare and financial services, are heavily regulated and have stringent compliance regulations in place. For example, the Health Insurance Portability and Accountability Act (HIPAA) states that only certain people should be allowed access to specific systems.

Role-based access controls can ensure that organizations in these industries do what is required of them, minimizing the risk of security breaches as well as fines for willful violations of the law.

How Portnox can help with your RBAC requirements

Role-based access control can be an extremely efficient way of ensuring network security and can be as top-level or granular as your organization demands. The key is developing a solid strategy before creating and assigning roles.

Which parts of your network need access control, which departments need permissions, and how will you assign people to the right roles?

If you need extra support keeping your network safe, Portnox is here to provide you with peace of mind. Our NAC security solutions come with role-based authentication and access policies to ensure the right people can access your network at the right time.

Contact our team today to find out more.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Portnox
Portnox provides simple-to-deploy, operate and maintain network access control, security and visibility solutions. Portnox software can be deployed on-premises, as a cloud-delivered service, or in hybrid mode. It is agentless and vendor-agnostic, allowing organizations to maximize their existing network and cybersecurity investments. Hundreds of enterprises around the world rely on Portnox for network visibility, cybersecurity policy enforcement and regulatory compliance. The company has been recognized for its innovations by Info Security Products Guide, Cyber Security Excellence Awards, IoT Innovator Awards, Computing Security Awards, Best of Interop ITX and Cyber Defense Magazine. Portnox has offices in the U.S., Europe and Asia. For information visit http://www.portnox.com, and follow us on Twitter and LinkedIn.。

3 年過去了,SASE 是否辜負了炒作?

First coined by research firm Gartner in 2019, SASE has become a hot topic in the IT industry in just a few short years. Undoubtedly accelerated by the COVID-19 pandemic, SASE has captured the attention of IT professionals in the network and security landscape as they prepare for an increasingly cloud-centric way of working. 

However, with so much hype surrounding SASE, many people wonder whether it lives up to its promise to future-proof corporate networks. Or, in other words, is the hype actually overhype? And does SASE deliver the simplified but secure networking reality we’ve all been waiting for? Let’s get into it. 

What is SASE?

Secure access service edge (SASE) is a framework for network architecture that combines VPN and SD-WAN capabilities with cloud-native security functions to securely connect users, systems, and endpoints to applications and services anywhere. 

It converges network security solutions like secure web gateways (SWG), cloud access security brokers (CASB), firewall as a service (FWaaS), and zero-trust network access (ZTNA) with SD-WAN to create a unified, cloud-native service. But why has it garnered so much attention?

What Problems Does SASE Promise to Address?

In the past, companies would implement network access with siloed point solutions that were often complex, costly, and difficult to manage. This hurt IT agility and prevented enterprises from scaling their networks effectively and securely. And this issue has only become more challenging as companies shift from on-premise to the cloud. 

SASE offers a solution to these problems and more. It promises to simplify network security in the cloud, improve efficiency and security, and reduce costs. For example, with SASE, organizations can fine-tune network access control (NAC) and secure seamless access for users, achieve real-time application optimization, apply consistent security policies, enable more remote and mobile access, and more. 

In simple words, SASE promises a way to future-proof your business. If you suddenly experience a surge in traffic or decide it’s time to expand into other regions, you can rely on SASE to keep up. Because it’s a cloud-based distributed service, you can add or remove capabilities as needed and ready your network at breakneck speed, all without purchasing additional software and managing new contracts. 

Why SASE Is Failing To Live Up to the Hype

Despite the many promises SASE offers, many companies are struggling to realize these benefits for several reasons. Successfully adopting and implementing SASE presents many challenges for organizations. And at the same time, many security vendors don’t yet have the skills or experience with SASE to deliver on its promises. Or in other words, SASE can work brilliantly when done well, but more often than not, this isn’t happening. 

The Hurdles to SASE Realization

A Paradigm Shift

Some people argue that SASE is nothing new but rather a consolidation of various security tools already in existence. However, while this statement has some truth, SASE requires a paradigm shift in organizational mindset. SASE shifts security from a site-centric model to a more user-centric and contextual-based approach. This means security teams have to rethink how they view the network. 

Additionally, consolidating these tools under a unified solution means companies need to break down silos between networking and security teams. These teams need to collaborate, and as a result, roles may need to be more flexible. 

When organizations fail to embrace these changes, they don’t realize the true potential of SASE. 

A Confusing Vendor Ecosystem

Security vendors are all too aware of SASE’s hype and leverage this with non-stop marketing. Unfortunately, this can leave many companies confused about the tools and methodologies they need to help their business stay competitive. 

And even when an organization decides on a specific set of tools to adopt, it’s not as simple as choosing a vendor that offers these tools. The organization also needs to look closely at its existing tech stack for duplicative capabilities. Failing to do this can lead to tool sprawl – where unnecessary purchasing of new IT tools leads to redundancy, wasteful spending, and increased system complexity. 

And then there’s the risk of vendor lock-in. Adopting SASE is an excellent way for companies undergoing cloud transformation to simplify the security process and cover many compliance requirements. However, companies also have to accept that they’re getting all capabilities from one supplier and that this comes with a cost. If the chosen SASE product becomes outdated, switching to a new one might not be straightforward. 

A Young SASE Market

Legacy hardware vendors are increasingly offering SASE architecture to rise to the current demand. However, with their lack of expertise, these vendors might not be the best option. For example, they could lack the cloud-native mindset to bring the SASE architecture to life, resulting in cost and performance problems. Also, traditional vendors often lack the experience in evaluating context, a core principle of SASE, limiting their ability to make context-aware decisions. And lastly, some solutions might come up short because the providers only have experience in either networking or security, but not both. 

The Future of SASE

There’s no doubt that as the current IT landscape continues to mature, there will be an increased need for simplified network and security management. And we see this reflected in attitudes toward SASE. For example, Gartner predicts that by 2025, 60% of all enterprises will have clear strategies to adopt SASE. 

But how quickly SASE will become the new norm is still up for debate. Today, many companies are shifting a significant proportion of their environment to the cloud and outsourcing SD-WAN management. At the same time, they’re choosing to maintain control over their security services internally. As a result, these companies may not be in a rush to move to the SASE approach because their current setup works well enough. 

We could also see SASE adoption massively boosted if the major cloud suppliers decide to incorporate SASE services in their licensing models. Still, we’ll have to wait to see if this becomes a reality. 

As it stands today, the future of SASE looks promising, but it’s not set in stone. 

Wrapping Up

SASE is a powerful concept, but it’s still in its infancy. This means organizations and vendors are still ironing out the issues that come with new technologies. And where there’s new tech, there’s always resistance. However, resistance isn’t always a bad thing – modern cybersecurity encourages us to do away with implicit trust and be cautious and deliberate in our actions.

Network security should be taken seriously, but that doesn’t mean it needs to be hard work. This is where Portnox comes in. We offer robust and affordable cloud-native network access control (NAC) solutions for companies of any size. Get in touch to learn how we can future-proof your network. 

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Portnox
Portnox provides simple-to-deploy, operate and maintain network access control, security and visibility solutions. Portnox software can be deployed on-premises, as a cloud-delivered service, or in hybrid mode. It is agentless and vendor-agnostic, allowing organizations to maximize their existing network and cybersecurity investments. Hundreds of enterprises around the world rely on Portnox for network visibility, cybersecurity policy enforcement and regulatory compliance. The company has been recognized for its innovations by Info Security Products Guide, Cyber Security Excellence Awards, IoT Innovator Awards, Computing Security Awards, Best of Interop ITX and Cyber Defense Magazine. Portnox has offices in the U.S., Europe and Asia. For information visit http://www.portnox.com, and follow us on Twitter and LinkedIn.。

為什麼需要 Google Workspace 備份

The top 3 misconceptions made by Google Workspace admins

If you’re wondering, “is my data truly protected by relying only Google Workspace’s default backup and recovery solution,” then you’re in the right place. Cloud applications, like Google Workspace, are an integral part of our daily life – we push data to the cloud constantly. I do it when I send an email on Gmail, share a document with coworkers via Drive, or add my mother-in-law’s birthday to my Google Calendar (better not forget it again!).

But is relying on Google’s default data protection enough? What are the main misconceptions when it comes to Google Workspace data backup and recovery?

Misconception #1: Relying on Google Workspace’s default data protection is enough

If you think Google apps is a secure platform, you’re right: Google platform is a secure, resilient, and reliable solution, and protecting data is their top priority.

As much as Google will likely never lose the data you are storing on their platform, they do not cover you if the data loss happens from your side. Google’s default data protection does not protect you against human error, malicious actions, ransomware and hackers, and synchronization errors. You are responsible for ensuring the necessary protection of your data.

Based on an Enterprise Strategy Group (ESG) survey, only 13% of the businesses surveyed understood that protecting their SaaS data is their responsibility, not the responsibility of the SaaS vendor.

According to ESG SaaS data protection research, 45% of organizations using SaaS attribute data losses they’ve experienced to deletion, whether accidental or malicious. When this happens with Google Workspace, Google is not able to identify if the deletion was intentional or not. The data will be deleted and totally unrecoverable once past Google Workspace trash bin’s retention time, a mere 30-days later.

You need a solid backup and recovery solution for your Google Workspace.

Misconception #2: I don’t need a third-party backup and recovery solution, I have Google Vault

As a subscribed user to certain editions of Google Workspace, you have access to Google’s retention and eDiscovery tool: Google Vault. With Vault, you can retain, hold, search, and export some users’ Google Workspace data.

Yet, Google Vault is not a backup tool. To this frequently asked question, “Is Vault a data backup or archive tool?” Google itself answers, “No. Vault isn’t designed to be a backup or archive tool.”

Based on Google’s own support website, here are reasons why you shouldn’t use Google Vault for backups:

  • Vault exports aren’t designed for large-scale or high-volume data backups. You can export data for a limited number of accounts and only for one Google service at a time. Vault also doesn’t allow many parallel exports or scheduling automatic exports.
  • Vault exports are prepared for legal discovery purposes, not efficient data processing. Vault can’t create differential backups or deduplicate data. For example, a Drive export includes all items the searched account has access to. When many accounts have access to the same items, they’re exported for each account, resulting in lots of duplicated data.
  • Vault doesn’t support all Google services. Vault can export data only from supported Google services. Vault doesn’t support services such as Calendar for instance.
  • Restoring data from Vault export files is hard. Vault doesn’t have any automated recovery tools.

Google Vault is not designed to recover lost or corrupted data and it cannot perform a which is a critical feature of any third-party backup and recovery tool.

Additionally, Google Vault does not keep ex-users’ data. For example, if an employee departs from your company and, as the admin, you delete his user Google Workspace account, all his data saved within their Vault will be also deleted. To save those data, it would require you to transfer all the employee’s data out of the Vault before deleting the account.

Misconception #3: A third-party tool can only help with backup data

By now, you know that backing up your Google Workspace data is your responsibility, not Google’s. It’s a common misconception that third-party backup solutions are a cost center purely performing secure backup and allowing for data recovery. These are the fundamentals, but there’s much more to it:

Benefit #1 – Cost savings

Budget constraints are making it harder than ever to implement new IT initiatives for IT Managers – They need to do more with less and maximize available resources.

Of course, deploying a backup and recovery solution for your SaaS applications comes with a cost, yet there are important (and substantial) cost-savings opportunities.

The first is through reduced SaaS licensing fees. Based on a recent Total Economic Impact report done by Forrester, companies save on months of SaaS licensing fees for employees who leave the organization – or around 10% of the work force per year. This number can be much higher if organizations use a lot of temporary staff or contractors. Having all historical data available simplifies data management and employee onboarding and offboarding.

The second is reduced auditing and legal costs. In the same TEI report, one of the organizations surveyed shared that seven days of auditor and lawyer costs are avoided each year by having SaaS data availability.

Benefit #2 – Regulatory compliance

Handling sensitive data is subject to stringent record retention and data reproduction requirements for all public records. With a proper backup and recovery solution, you can expect to:

  • Gain access to fast information discovery
  • Easy retention policy management
  • Additional rights to ensure compliance with applicable outsourcing regulatory requirements (e.g., extended audit rights, chain-sourcing approval rights).

In addition, data center facilities leveraged to store the data have high physical security standards and certifications (ISO 27001, SOC-2, ISAE 3402, PCI/DSS, HIPAA). It is important that you ask your vendor what they offer regarding regulatory compliance and data center certifications when investigating which tool to deploy.

Benefit #3 – Real disaster recovery

Third-party backup and recovery solutions must (not should) allow you to perform disaster recovery. The shortlist of important points to look for when selecting your solution:

  • Data availability: Get access to all your data, at any time, from anywhere. A proper backup solution provides you with unlimited storage, is cloud-based so you can always access your data, and it should reside on its own cloud for enhanced security and control.
  • Hot storage of data: Get your data on demand
  • Quick restore options for data: Restore fast, regardless of if it’s a single email or an entire point-in-time backup for your organization
  • On-the-go backup status monitor: Get updated with a mobile admin app

Keepit Backup and Recovery for Google Workspace

Keepit for Google Workspace is the world’s only independent cloud dedicated to backup and recovery. It is easy to use and keeps your Google Workspace data highly secure, always available, and instantly restorable.

Keep your data available 24/7 with automatic backup and unlimited storage
Quickly find and restore data, whether you want to restore one single email or an entire snapshot for your organization.

Easy to set up, easy to use, easy to scale
Keepit is a set-and-forget installation that is easy to use: No training needed. You can integrate it with your existing system thanks to our API-first approach. No hidden fees, no surprises, and 24/7 support.

Choose the World’s only independent cloud for immutable data
Security is in our DNA. Once your data is backed up with Keepit, it is made immutable and undeletable thanks to blockchain-verified technology. It is a priority for us to provide you with excellent reliability, great backup and restore performance, instant access to individual files, multi-factor authentication, and data encryption at rest and in transit.

Learn more on our Google Workspace backup and recovery

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Keepit
At Keepit, we believe in a digital future where all software is delivered as a service. Keepit’s mission is to protect data in the cloud Keepit is a software company specializing in Cloud-to-Cloud data backup and recovery. Deriving from +20 year experience in building best-in-class data protection and hosting services, Keepit is pioneering the way to secure and protect cloud data at scale.