Skip to content

Feature Creep in Backup: Evolution or Escape Strategy?

The backup industry is currently facing an identity crisis. Some vendors are heavily investing in security features, others are pivoting toward comprehensive data management, and still others are attempting to be an all-in-one solution. Storware is taking a deliberate approach, choosing to focus intensely on executing one core function: fast, reliable recovery.

When Success Breeds Complexity: A Cautionary Tale

A classic example of feature creep is the popular disc-burning program, Nero Burning ROM. It initially excelled due to its high specialization. However, the manufacturer gradually added non-core features like video editing and file conversion. This expansion made the software cumbersome and bloated, obscuring its original, intuitive utility for users who only needed basic functions.

This phenomenon—feature creep—is widespread in IT. Research confirms that approximately 80% of features in the average software product are rarely or never used. Furthermore, Gartner estimates that I&O leaders will overspend $750 million on unused ITSM tool features by 2023. This bloat creates complexity, higher maintenance costs, and market opportunities for more specialized competitors.

The Market Reality: Evolution or Desperation?

The enterprise backup and recovery market grew by 5.1% in 2023, yet 2024 has been defined by aggressive consolidation. Major players like Cohesity, Veeam, and Commvault are acquiring competitors to rapidly expand their product scope. For C-level executives, this raises a crucial question: Is this consolidation creating genuine value, or is it a desperate attempt to stay relevant in a specialized landscape?

Data Management: Genuine Transformation or Marketing Makeover?

A contentious trend is the positioning of traditional backup vendors as data management leaders. While backup vendors possess strong knowledge of storage and recovery, true data management requires a completely different level of specialization, encompassing governance, data lineage, compliance, and cataloging.

True credibility depends on evidence: Did the vendor build genuine new capabilities, or just rebrand old functions? Mergers and acquisitions are a natural strategic move, but there is no guarantee that acquired technology is scalable or compatible. Some critics suggest the shift from backup to data management is primarily an escape route—a scramble for survival in a market increasingly favoring specialists.

Cybersecurity and Backup: Together or Separate?

The rise of ransomware dramatically changed the relationship between backup and security. Attackers shifted their strategy to not only encrypt production data but also to compromise backup copies, making ransom demands far more effective.

The scale is alarming: 94% of attacked companies confirm hackers attempted to destroy or damage their backups. When backups are compromised, the median ransom demand jumps from $1 million to $2.3 million. Veeam research confirms 89% of attacks target the repository.

The Industry Response and The Blurring Line

In response, storage vendors have introduced immutable snapshots, WORM (Write Once, Read Many) functions, and “air gap” physical isolation. Gartner forecasts that by 2028, 100% of enterprise-class storage systems will standardly offer these active defense elements.

Some backup manufacturers are now merging backup and threat detection tools onto one platform. This is often driven by financial considerations, aiming to tap into the massive global information security market (expected to reach $292 billion by 2028).

The Case for Integration Over Consolidation

Critics argue that cybersecurity must focus on prevention, while backup’s sole role is restoration. Storware maintains that a much better solution is logical system integration—allowing specialized tools to communicate (e.g., integrating backup with SIEM/threat detection platforms)—while maintaining physical separation for independent backup storage. This hybrid model allows comprehensive protection without sacrificing technical excellence.

The Real Cost of Feature Creep

The financial impact of feature creep goes beyond development. Developers spend an average of 17.3 hours per week dealing with bad code and errors, plus 13.5 hours per week on technical debt. For enterprises, this translates to:

  • Delayed time-to-market (projects experiencing delays of 6 months or more).
  • Increased operational complexity (requiring larger IT teams and extensive training).
  • Higher total cost of ownership (bloated systems demand more resources).

During a ransomware attack, organizations with complex, feature-laden backup systems face longer recovery times, difficulty verifying backup integrity, and an increased attack surface for criminals to exploit.

The Path Forward: Specialized Excellence

The backup industry stands at a crossroads. Vendors who chase every trend risk becoming bloated and ineffective. Storware believes in the path of specialized excellence: delivering the core function—fast and recoverable backup—in a lightweight, efficient, and scalable manner.

Key Takeaways for C-Level Executives

  • Market Consolidation Signals: The 2024 wave of backup vendor M&A activity (Cohesity, Veeam, Commvault) suggests market uncertainty. Evaluate if an acquisition strategy genuinely creates value or merely adds complexity.
  • The Ransomware Business Case: With 94% of attacks targeting backups, backup resilience is a board-level financial risk. Focus on making backups untouchable.
  • The Hidden Tax of Bloatware: Organizations waste $750 million annually on unused software features. Complexity you don’t need is cost you shouldn’t bear.
  • Integration vs. Consolidation: Prioritize integration of specialized tools (SIEM talking to backup) over full consolidation into an all-in-one vendor. Maintain specialized excellence.
  • Recovery as Strategic Priority: Focus on recovery capabilities (RTOs, RPOs, and validated testing) over long feature lists. Simplicity and reliability trump bloat every time.

 

About Storware
Storware is a backup software producer with over 10 years of experience in the backup world. Storware Backup and Recovery is an enterprise-grade, agent-less solution that caters to various data environments. It supports virtual machines, containers, storage providers, Microsoft 365, and applications running on-premises or in the cloud. Thanks to its small footprint, seamless integration into your existing IT infrastructure, storage, or enterprise backup providers is effortless.

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

Defense in Depth for the Modern Enterprise: Evolving Strategies for Hybrid Environments

Key Highlights (Fast Takeaways for Security Leaders)

  • Hybrid environments create blind spots. This article shows the exact gaps attackers exploit in cloud, on-premises, and remote access workflows.
  • Identity is now the strongest control point. You will learn how Zero Trust, MFA, and unified access policies immediately reduce credential-based breaches.
  • Endpoints expose the most risk. The article explains how XDR and Endpoint Privilege Management block lateral movement and protect credentials on mobile devices and laptops.
  • Network access needs tighter control. You will see how ZTNA, segmentation, and Remote PAM limit attacker movement inside hybrid networks.
  • Automation is now required for fast response. The article shows how AI-driven detection and SOAR reduce containment time from days to seconds.

 

Why Traditional Defense in Depth Needs a Modern Overhaul

The Change Healthcare cyberattack in February 2024—the largest healthcare data breach in U.S. history—serves as a perfect example of modern failure. Attackers used stolen credentials on a remote access server that lacked multi-factor authentication, then moved laterally through legacy systems. The response cost $2.87 billion, demonstrating that while Defense in Depth (DiD) remains essential, it must evolve dramatically for hybrid environments.

Traditional DiD assumed clear network perimeters, but two fundamental changes have shattered this model:

The Vanishing Perimeter: Distributed Workloads and Users

The perimeter has vanished due to hybrid cloud adoption (IaaS, PaaS, SaaS) and accelerated remote work. Employees access corporate resources from untrusted home networks and public Wi-Fi, creating an “everywhere workforce.” This scatters the attack surface across cloud platforms, mobile endpoints, and IoT devices, leaving enterprises with no single perimeter to defend.

Evolving Threat Actor TTPs Targeting Hybrid Weaknesses

Attackers now exploit seams and gaps in hybrid environments. They enter through the least secure component (e.g., a SaaS account) and pivot to attack on-premises servers. Multi-cloud complexity often leaves security controls fragmented, a vulnerability attackers quickly exploit.

 

Core Tenets of a Modernized DiD Security Model

Principle 1: Assume Breach, Implement Zero Trust & Strong MFA

The philosophy must shift from implicit trust to explicit verification everywhere. Your modern DiD must operate on an “assume breach” mindset and design controls accordingly. This is the essence of Zero Trust Architecture. Identity replaces network location as the primary control plane, making Multi-Factor Authentication (MFA) non-negotiable for all users.

[Image of Zero Trust Architecture diagram with Identity as the central control plane]

Principle 2: Comprehensive Visibility Across All Environments

Achieving a “single pane of glass” to correlate events from cloud workloads, SaaS apps, on-premises servers, and endpoints is critical. Fragmented monitoring leads to missed threats and delayed incident response. You must invest in tools that break down security silos and extend your SIEM to ingest logs from all domains.

Principle 3: Data-Centricity – Protecting What Matters Most

Modern DiD prioritizes protecting the data itself, not just the infrastructure around it. The solution is a data-centric security strategy: first classify critical data, then apply multiple protective layers as close to the data as possible throughout its lifecycle. This includes strong encryption, tokenization, and rigorous access controls, ensuring that the data remains protected even if other layers fail.

Principle 4: Automation and Orchestration

Automation and orchestration are critical to enforce security policies consistently and respond rapidly. A modern DiD architecture leverages technology to connect layers so they operate as a coordinated whole. The endgame is an autonomic security posture that reacts to cyber threats in seconds, not days, by orchestrating containment actions across the hybrid infrastructure.

 

Re-Architecting Your Layers: Actionable Strategies

Foundation Phase: Identity, Access, and Endpoint Security

  • Identity Management: Deploy a cloud-native Identity Provider and establish comprehensive Privileged Access Management (PAM) with just-in-time elevation. Next-gen PAM platforms like Segura® reduce unnecessary standing privileges and apply consistent technical controls.
  • Endpoint Security: Deploy Extended Detection and Response (XDR) and Endpoint Privilege Management (EPM) for all devices (laptops, smartphones). Maintain aggressive patch management and implement Mobile Threat Defense.
  • Secure Network Fabric: Replace broad VPN access with Zero Trust Network Access (ZTNA). Implement micro-segmentation to prevent lateral movement and extend Remote PAM for external users.

Protection Phase: Application, Data, and Physical Security

  • Application and API Security: Embed automated security testing into DevSecOps pipelines. Deploy Web Application Firewalls and API gateways to monitor all requests and implement Runtime Application Self-Protection (RASP).
  • Data-Centric Protection: Use automated data discovery and classification. Deploy strategic encryption (including confidential computing) and use Data Loss Prevention (DLP) to monitor data movement.

Intelligence Phase: Automated Detection and Culture

  • AI-Powered Threat Detection: Deploy AI-powered SIEM platforms that aggregate logs from all environments. Implement Security Orchestration, Automation, and Response (SOAR) tools to trigger coordinated containment actions.
  • Security-Aware Culture: Build continuous security awareness that addresses hybrid work realities (securing home networks, recognizing social engineering).

 

Conclusion: The Strategic Next Steps

Implementing DiD in the modern enterprise requires rethinking safeguards to fit a world without perimeters, with identity and data at the center, and with automation woven throughout.

Segura®’s comprehensive PAM platform provides the cornerstone for modern Defense in Depth, offering the complete privileged access lifecycle with significantly faster deployment than traditional solutions. By addressing multiple DiD protections simultaneously, Segura® dramatically reduces infrastructure requirements.

 

About Segura®
Segura® strive to ensure the sovereignty of companies over actions and privileged information. To this end, we work against data theft through traceability of administrator actions on networks, servers, databases and a multitude of devices. In addition, we pursue compliance with auditing requirements and the most demanding standards, including PCI DSS, Sarbanes-Oxley, ISO 27001 and HIPAA.

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

Scale Computing Leads the Way in Server Virtualization and Hyperconverged Infrastructure in G2’s Winter 2026 Report

Austin, Texas – December 4, 2025 – Scale Computing, the leader in edge computing and network solutions, proudly announced today that the company has been awarded a total of 42 badges in the G2 Winter 2026 Report.

Scale Computing received 18 badges in the Server Virtualization category and an additional 24 badges in the Hyperconverged Infrastructure (HCI) category. Accolades included distinctions for Fastest Implementation, Best Support, and Best Usability. The G2 platform, the world’s largest software marketplace for peer reviews, features over 80 million users.

Customer-Driven Recognition and Innovation

“We are honored to have earned 42 badges in G2’s Winter 2026 report–a clear reflection of our commitment to customer success and our team’s dedication to relentless innovation of the Scale Computing HyperCore™ virtualization suite,” said Craig Theriac, vice president of product management, Scale Computing.

“Our customers trust Scale Computing as a leading VMware alternative because our solutions streamline IT infrastructure management, ensure maximum application uptime, and significantly lower costs, delivering scalable IT infrastructure from the data center to the edge. We’re proudly enabling organizations everywhere to simply and securely deploy and manage AI workloads where real-time decision-making, low-latency processing, and operational simplicity are critical. G2 badges are rooted in genuine customer feedback, confirming that our solutions are meeting real-world needs. We sincerely thank every customer whose review helped make this recognition possible. Your experiences drive us forward.”

[Image of Scale Computing HyperCore platform architecture diagram]

The Edge-First Advantage and Product Portfolio

As the industry’s largest edge-first software company, Scale Computing offers a comprehensive suite of solutions built for customers of all sizes, across up to 100,000 locations:

  • Scale Computing Platform™ (SC//Platform™): An edge computing solution that combines simplicity and scalability, offering an easy-to-manage solution that replaces complex infrastructure and ensures high availability for workloads.
  • Zero-Touch Provisioning™: A feature within Scale Computing Fleet Manager™ that simplifies managing edge computing infrastructure to the level of managing cloud resources.
  • Scale Computing Reliant Platform™: An Edge Computing as a Service offering that is hardware- and cloud-agnostic, empowering multi-site businesses to manage applications, networks, and security controls at scale.
  • Scale Computing AcuVigil™: Managed network services that provide visibility of all network devices and deliver local computing power for remote network updates and troubleshooting.

Customer Feedback: Simplicity and Reliability

G2 reports are based on authentic customer reviews, providing tailored insights for buyers. The following review highlights the tangible benefits experienced by users:

“What a breath of fresh air coming from a VMWare environment – now I have instant snapshots, really fast VM replication and no datastores to manage because Scale manages them for me. One big memory and data storage pool to provision from, all thin provisioned – and the SSD tiering all completely automatic. You just set it and forget it. The Management GUI is so simple my Mum could use it. The support is exceptionally good. The API integration is fantastic. The implementation and VM migration was amazing and simple…I have not found any downside as yet – after 4 years it just works, not one glitch or failure.”

— Mike R., Director, Mid-Market, and G2 Platform User

Summary of Awards

Scale Computing was recognized across several categories, including:

Fastest Implementation Best Support Best Usability Leader in Server Virtualization Leader in HCI

Read what other real users have to say about Scale Computing on G2’s Scale Computing page. The entire list of 42 badges awarded to the company in G2’s Winter 2026 Report is available on Scale Computing’s website.

About Scale Computing
Scale Computing is a leader in edge computing, virtualization, and hyperconverged solutions. Scale Computing HC3 software eliminates the need for traditional virtualization software, disaster recovery software, servers, and shared storage, replacing these with a fully integrated, highly available system for running applications. Using patented HyperCore™ technology, the HC3 self-healing platform automatically identifies, mitigates, and corrects infrastructure problems in real-time, enabling applications to achieve maximum uptime. When ease-of-use, high availability, and TCO matter, Scale Computing HC3 is the ideal infrastructure platform. Read what our customers have to say on Gartner Peer Insights, Spiceworks, TechValidate and TrustRadius.

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

MCP ROI in a New Era of AI Orchestrated Threats

2025-12-08   The Model Context Protocol (MCP) inside Graylog delivers explainable AI assistance to the SOC, addressing the failure of fully autonomous tools. MCP enables faster, friction-free investigations by linking natural language queries to logs, enforcing governance, and providing verifiable context. This system helps security teams combat AI-orchestrated threats efficiently, yielding tangible ROI.

Continue reading