Skip to content

Perforce 2026 State of DevOps Report

DevOps Maturity: The Key to AI Success
70% of Organizations Link DevOps Maturity to AI Scaling

MINNEAPOLIS, Feb 24, 2026 — Perforce Software today announced the findings of its 2026 State of DevOps Report. The study, surveying 820 global tech professionals, proves that DevOps has not been replaced by AI—it has been amplified by it.

72%
of High-Maturity DevOps organizations have successfully embedded AI across their SDLC.

The “Shift-Up” Role Revolution

AI is enabling a fundamental change in engineering roles, allowing staff to focus on system design rather than manual scripting.

87% believe AI enables engineers to focus on directing outcomes rather than manual coding.
55% of QA teams have increased focus on analytics over test execution.
41% of QA teams are evolving into Quality Engineering (QE) functions.

Governance and Cost Challenges

While optimism remains high, two major factors are limiting AI adoption across the enterprise:

  • Incomplete Governance: Only 39% of organizations maintain fully automated audit trails.
  • Rising Resource Costs: 37% of respondents cite cloud and energy costs as limiting factors for AI expansion.

About Perforce
The best run DevOps teams in the world choose Perforce. Perforce products are purpose-built to develop, build and maintain high-stakes applications. Companies can finally manage complexity, achieve speed without compromise, improve security and compliance, and run their DevOps toolchains with full integrity. With a global footprint spanning more than 80 countries and including over 75% of the Fortune 100, Perforce is trusted by the world’s leading brands to deliver solutions to even the toughest challenges. Accelerate technology delivery, with no shortcuts.

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

The Hidden Costs of Legacy Access Control

Findings from Forrester’s TEI Report on Enterprise Modernization

Forrester’s Total Economic Impact™ (TEI) study reveals that legacy access control is no longer just a technical burden—it is a significant drain on enterprise resources, security, and agility.

90%
Reduction in Labor
95%
Less Downtime
287%
Return on Investment
 

IT Resource Drain

Legacy systems demand constant manual intervention. Forrester found that while legacy systems required over 60 hours of weekly maintenance, modernizing with Portnox Cloud reduced that burden to just one hour per week.

Security and Visibility Gaps

By implementing centralized, device-level access control, organizations reduced their exposure to addressable security attacks by 75%, saving an average of $1.3 million in avoided breach risk.

Scalability and Growth

Modern access control serves as a growth enabler. New site onboarding was slashed from days to minutes, allowing global expansion to proceed without the bottleneck of physical hardware procurement and deployment.

About Portnox
Portnox provides simple-to-deploy, operate and maintain network access control, security and visibility solutions. Portnox software can be deployed on-premises, as a cloud-delivered service, or in hybrid mode. It is agentless and vendor-agnostic, allowing organizations to maximize their existing network and cybersecurity investments. Hundreds of enterprises around the world rely on Portnox for network visibility, cybersecurity policy enforcement and regulatory compliance. The company has been recognized for its innovations by Info Security Products Guide, Cyber Security Excellence Awards, IoT Innovator Awards, Computing Security Awards, Best of Interop ITX and Cyber Defense Magazine. Portnox has offices in the U.S., Europe and Asia. For information visit http://www.portnox.com, and follow us on Twitter and LinkedIn.。

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

Data Leak Report 2025 | NordStellar

Fewer Incidents, Greater Exposure: 2025 Intelligence Report

Based on analysis from the NordStellar threat-intelligence platform, the landscape of data breaches has shifted significantly. While the total number of database leaks declined in 2025, the severity of individual exposures has increased.

-36.9%
Total Database Leaks
500M+
Emails Exposed
+45%
Ransomware Exfiltration

Current Trends

Attackers are moving away from centralized database breaches toward infostealer malware. By capturing usable credentials directly from user systems, threat actors bypass traditional defenses, making attacks faster and more precise.

“Infostealer data is far more effective. Attackers don’t have to rely on credential stuffing since they already know their targets. This gives them a direct path to compromised accounts.”

Mantas Sabeckis, Senior Threat Intelligence Researcher

Notable Leaks of 2025

OrganizationEmails ExposedData Types
Under Armour72.7 MillionDOB, Geolocation, Purchase History
Prosper Marketplace17.6 MillionGov IDs, Income levels, IP Addresses
Vietnam Airlines7.3 MillionNationalities, Usernames, DOB

How to Protect Your Organization

  • Minimize Data Footprint: Store only the personal data that is strictly necessary.
  • Enforce Strong Credentials: Implement hardware-backed MFA and unique password policies.
  • Continuous Monitoring: Use threat intelligence to detect leaked credentials in real-time.

About NordPass
NordPass is developed by Nord Security, a company leading the global market of cybersecurity products.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

Remote Work Security Guide

Protecting the Decentralized Perimeter

Summary: Remote work security focuses on protecting company data across non-traditional environments. Success requires a shift from location-based security to identity-centric protection.
 

Top Remote Security Risks

Unsecured Networks

Home routers and public hotspots lack enterprise firewalls, enabling Man-in-the-Middle (MitM) attacks.

Device Sprawl

Unmanaged personal devices (BYOD) often miss critical patches and security software.

Credential Theft

Isolated workers are prime targets for phishing and social engineering aimed at hijacking accounts.

How to Harden Your Defense

  • Identity First: Enforce Multi-Factor Authentication (MFA) and use a password manager like NordPass Business.
  • Zero Trust: Implement ZTNA to grant access to specific apps rather than the entire network.
  • Secure Tunnels: Mandate a VPN for all remote connections to encrypt traffic on untrusted Wi-Fi.
  • Endpoint Hygiene: Continuously monitor device posture and push automated software updates.

Early Warning Signs

Watch for “Impossible Travel” (logins from two distant cities in minutes) and MFA Fatigue (repeated push notifications) as indicators of a potential breach.

About Nord Security
The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

About NordLayer
NordLayer is an adaptive network access security solution for modern businesses – from the world’s most trusted cybersecurity brand, Nord Security.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

Keepit Responsible AI Integration

Keepit’s Approach to Responsible AI Integration

In backup and recovery, speed cannot come at the cost of control. Keepit’s AI integration is built on the belief that data protection requires a higher standard of predictability and security than typical office automation.

Visibility Guardrail

Metadata Only: AI tools see locations, timestamps, and job histories—never the actual content of your files or emails.

Action Guardrail

Read-Only: AI generates insights and summaries. It is strictly forbidden from performing restores or configuration changes.

Why the Model Context Protocol (MCP)?

Instead of copying your enterprise data into third-party AI models, Keepit uses MCP to bridge the gap. This standard allows the AI to query Keepit APIs in a structured, auditable way.

The MCP Workflow:

  1. AI client interprets an admin’s prompt.
  2. Client selects an approved Keepit MCP tool.
  3. The tool calls Keepit APIs within a restricted metadata scope.
  4. Results are summarized for the admin without data leaving the secure perimeter.

Real-World Admin Value

  • Posture Visibility: Instantly identify which connectors are unhealthy or where coverage is stale.
  • Audit Log Summarization: Compress thousands of noisy events into a clear narrative of “Who, What, and When.”
  • Anomaly Triage: Fast-track the explanation of unusual data activity to determine if it is a baseline shift or a threat.

About Keepit
At Keepit, we believe in a digital future where all software is delivered as a service. Keepit’s mission is to protect data in the cloud Keepit is a software company specializing in Cloud-to-Cloud data backup and recovery. Deriving from +20 year experience in building best-in-class data protection and hosting services, Keepit is pioneering the way to secure and protect cloud data at scale.

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

Threat Hunt Report: Malicious AuthTool.exe

Forensic Analysis of the AuthTool.exe Name Collision Attack
The “Black Box” Problem: AI Skills are becoming a primary infection vector. Attackers leverage manufactured trust and “name-squatting” to bypass security logic by targeting user common sense.

The Collision: Legitimate vs. Malicious

Legitimate AuthTool

  • Source: N-able Cove Backup
  • Status: Documented & Signed
  • Path: C:\Program Files\...

Malicious AuthTool

  • Source: Fake “Reddit-Trends” Skill
  • Status: Unsigned Trojan
  • Path: C:\Users\[User]\Downloads

The Anatomy of the Attack

The attack follows a classic Trojan horse pattern: wrapping a malicious payload in a high-demand productivity tool (Reddit automation).

  • AV Evasion: The payload is delivered via a password-protected ZIP (Password: 1234) to blindside automated scanners.
  • Mac Execution: Uses base64 -d | sh to execute shellcode directly into the kernel.
  • Social Engineering: Instructions tell the user to “Run AuthTool.exe BEFORE starting the skill,” establishing the binary as a trusted prerequisite.

Conclusion

Thorough forensic profiling of legitimate software remains the best defense. Analysts must verify not just the filename, but the hash, path, and signing authority of every execution event.

 

About Guardz
Guardz is on a mission to create a safer digital world by empowering Managed Service Providers (MSPs). Their goal is to proactively secure and insure Small and Medium Enterprises (SMEs) against ever-evolving threats while simultaneously creating new revenue streams, all on one unified platform.

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.