Skip to content

Anatomy of a Breach: How One Immutable Backup Stopped a 5-Minute Attack

Modern Cyberattacks and the Power of Immutabil

Modern cyberattacks are measured in minutes, not days. The line between a contained incident and a catastrophe is often drawn before the security team even receives the first alert. In a recent Black Hat webinar, we deconstructed a real-world breach where sophisticated attackers, later attributed to the threat actor Silk Typhoon, compromised a network in minutes. Their attack was swift, silent, and effective—until they hit one unbreakable defense: immutability.

The Timeline of Compromise

Minute 0-1: The Initial Breach It began with a single, deceptive link clicked by a support admin. The phishing page quietly stole a valid session token, allowing the attackers to bypass multi-factor authentication and conditional access policies as if they were the legitimate user. The perimeter was gone in under 60 seconds. Minute 2: Privilege Escalation With the stolen token, the attackers exploited a zero-day vulnerability to deploy a web shell inside a Kubernetes pod within an Azure cluster. A single command dumped Microsoft 365 service principal secrets, instantly granting them delegated administrative rights across dozens of tenants. No alarms were triggered.

The Attacker’s Playbook: Destroy the Safety Net

With high-level credentials secured, the attackers initiated a classic anti-forensics strategy designed to make recovery impossible. They knew that as long as backups exist, the victim has a path back. Their objectives were simple and brutal:
  • Purge Audit Logs: Erase any trace of their activity.
  • Delete Backups: Send bulk deletion commands to wipe out all restore points.
By removing the evidence and the safety net, they aimed to leave the organization with no choice but to negotiate.

The Turning Point: The Immutable Wall

At approximately minute five, the attack unraveled. When the attackers’ high-privilege delete commands hit the backup storage repository, the system responded not with compliance, but with a hard stop: Error 403, Object Locked. The backup storage layer was configured with WORM (Write Once, Read Many) immutability, applied at the moment of data ingest. This meant that once a backup was written, it could not be altered or deleted by anyone—regardless of their administrative permissions—until its predefined retention period expired. The attackers’ stolen credentials were useless. They were bouncing off a digital wall that refused to honor their commands.

The Aftermath: The Gift of Time

The attackers’ failure to destroy the backups was the critical break in the kill chain. While the initial breach moved at machine speed, immutability stretched the incident response window from minutes into days. In cybersecurity, that is a lifetime. This gift of time allowed the defenders to:
  • Investigate the breach without pressure.
  • Rotate all compromised secrets.
  • Confidently contain the scope of the incident.
  • Restore clean data and resume business operations.
Instead of negotiating with attackers on a leak site, the team was executing a controlled recovery.

Key Takeaways for Security Leaders

This case study offers a clear lesson: your backups are a primary target. A determined attacker will not stop at your perimeter; they will go after your last line of defense first. When backups are truly immutable, even the most powerful stolen credentials cannot lead to their destruction. In this real-world scenario, the difference between containment and catastrophe was immutability, full stop.

About Keepit
At Keepit, we believe in a digital future where all software is delivered as a service. Keepit’s mission is to protect data in the cloud Keepit is a software company specializing in Cloud-to-Cloud data backup and recovery. Deriving from +20 year experience in building best-in-class data protection and hosting services, Keepit is pioneering the way to secure and protect cloud data at scale.

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

The anatomy of recovery: Why testing is the heart of business resilience

Disaster recovery isn’t a one-time task—it’s an ongoing commitment. Mounting cyber threats, hybrid attacks, and strict regulatory oversight means recovery planning is no longer optional. It’s the foundation for business resilience. 

 

Disasters are broader than you think 

Natural disasters still top the list of major disruptions—fires, floods, earthquakes, and storms can cripple operations by severing infrastructure. But increasingly, it’s not just nature that brings systems down. 

 

Recent examples show how vulnerable businesses are to the failure of underlying services. A severed submarine cable, a telecom outage disabling emergency lines, or a botched software update that halts transportation—these aren’t hypothetical scenarios. They’re modern-day reminders that global infrastructure dependencies are fragile and easily disrupted. 

 

To mitigate this, organizations must identify their most vulnerable points and build redundancy into systems—both technically and operationally. 

 

The silent threat: Human error 

While cyberattacks and natural events make headlines,  Misconfigured retention policies, accidental deletions, and administrative oversights continue to plague enterprises of all sizes. The most sophisticated IT environments are not immune. 

 

Often mistakes aren’t discovered until it’s too late. And when data is lost, relying on SaaS vendors for recovery is a gamble. Native restore features may exist, but they’re typically limited, difficult to test, and not built to guarantee full-scale business continuity. 

 

Having independent, regularly tested backups is the only reliable way to safeguard against the full range of human-induced incidents. 

 

Culture is a security tool 

Mistakes happen. What matters is how organizations respond. A mature security culture ensures that employees feel empowered to report issues promptly—without fear of blame. The worst-case scenario isn’t a mistake—it’s a mistake that goes unreported and escalates. 

 

Security isn’t just about firewalls and patches. It’s about communication, education, and trust. Training must be real, relevant, and engaging. Employees should understand what phishing looks like in their specific business context. Developers should practice spotting malicious code. Security isn’t a one-size-fits-all effort; it’s a cultural investment. 

 

When vendors fail 

Cloud vendors aren’t perfect. History shows that even the largest players occasionally lose customer data due to bugs, misconfigurations, or internal errors. From lost security logs to deleted pension data, these incidents underscore a hard truth: shared responsibility doesn’t mean guaranteed protection. 

 

Whether it’s a coding bug deep within a service stack or a botched update affecting core systems, customers bear the brunt when data is lost—and they’re often powerless to recover without third-party backups. The only remedy is to assume failure is inevitable and prepare accordingly. 

 

Rising risks: Shadow IT, AI, and supply chains 

Security perimeters are dissolving. Shadow IT introduces unmanaged apps into corporate networks, often housing sensitive data unknown to IT teams. Employees, in a bid for productivity, may upload proprietary data into generative AI tools without realizing the risk. 

 

Supply chains also present growing vulnerabilities. Software delivered through trusted channels can be compromised, as seen in high-profile breaches where malicious updates slipped past defenses undetected. 

 

The antidote? Intelligent monitoring, rigorous classification, and a thorough understanding of where sensitive data resides. 

 

The case for testing—and testing again 

Every plan is theoretical until it is tested. Recovery strategies must be validated in real-world conditions—not just once, but regularly. Testing isn’t an inconvenience. It’s how businesses discover gaps before attackers do. 

 

Regulations like  and  now demand evidence of effective, recurring testing. It’s not enough to have a plan on paper—organizations must prove their ability to recover. Fortunately, with the right tools and automation, testing can be simple, even mobile-friendly. 

 

Modern disaster recovery must be as agile as DevOps. Recovery tests should be frequent, frictionless, and minimally disruptive. 

 

Defining what matters most 

You can’t protect everything. But you can protect what matters most. —identifying the systems, data, and applications that are most critical to business continuity. 

 

With hundreds of SaaS applications in use across a typical enterprise, organizations must prioritize recovery based on business impact, not just IT ownership. Recovery isn’t a single push-button event. It’s a sequence. Knowing what to bring online first—whether it’s payroll, CRM, or security tools—is key to minimizing downtime and revenue loss. 

 

Ownership also matters. Risk needs to be assigned, not just acknowledged. When system and data owners are accountable, they’re more likely to engage in the planning process. 

 

What good looks like 

A robust recovery strategy includes: 

 

  • Clear classification of critical systems and data 
  • Prioritized recovery plans that reflect actual business dependencies 
  • Regular, automated testing of restore capabilities 
  • Tamper-proof, immutable backups in a separate, secure cloud 
  • Risk ownership embedded in every department 
  • Training programs that are engaging, continuous, and context-specific 

 

Recovery is more than just technology. It’s culture, governance, and foresight. 

 

About Keepit
At Keepit, we believe in a digital future where all software is delivered as a service. Keepit’s mission is to protect data in the cloud Keepit is a software company specializing in Cloud-to-Cloud data backup and recovery. Deriving from +20 year experience in building best-in-class data protection and hosting services, Keepit is pioneering the way to secure and protect cloud data at scale.

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

Restore vs. recover: Are they the same thing in SaaS data protection? (Spoiler: it’s complicated)

Restore and recover are often used interchangeably, but they shouldn’t be. While they’re closely related (and for good reason), their meanings vary across industries and tech. For SaaS data protection, they can be used to describe different stages of getting your data — and your business — back to an operational state. Understanding the difference in a SaaS data context is useful to building effective backup, restoration, and disaster recovery .   

In this blog, we’ll look into how we can consider the terms and help frame them with some context — and why planning for both restoration and recovery is essential for true resilience. 

Let’s get into some definitions.  

Restore: Bringing back data or systems 

Data restoration is the act of retrieving data or systems from a backup and returning it to a previously known good state. 

You restore when: 

  • A file has been accidentally deleted. 
  • A system becomes corrupted and needs to be rolled back. 
  • A virtual machine or database needs to be reinstated from a snapshot. 

Restoration focuses on bringing back what was lost, damaged, or compromised — whether that’s a single file or an entire application. 

Restore = the process of putting data or systems back into place. 

For a deeper technical definition, see . 

Recover: Bringing back business operations  

Recovery is about achieving the state where systems, data, and operations are functional again — not just technically restored, but ready for use. 

You have recovered when: 

  • Systems and services are running smoothly. 
  • Users have full access to the resources they need. 
  • Operations can resume without disruption. 

Recovery often involves multiple steps — validation, reconfiguration, testing — to ensure that everything works as expected after a disruption. 

Recover = reaching full operational readiness. 

 

 

Jakob Østergaard is CTO at Keepit, a leading cloud backup and recovery solution. He has an M.Sc. in Computer Science and Applied Mathematics and has worked with software development since 1998. The early career started on massively parallel supercomputers but soon transitioned to more reasonably sized equipment.

He has played a key role in the design and implementation of several cross platform networked software systems and is the principal designer of the object storage system that underlies the Keepit business. Today he leads the development, operations, and security organizations of the company.

He still writes code. Find Jakob on .

TermFocusExample
RestoreAct of retrieving dataRestoring a deleted document or email
RecoverState of full functionalityResuming operations after a server crash or end user access to data

Restore vs. recover: Why the distinction matters 

Restoration is often one part of a larger recovery process — and as such restoring alone doesn’t guarantee recovery. But, sometimes it does (yes, this is part of why recover and restore are often used interchangeably. 

In the common data loss case involving small amounts of data or files, your entire recovery is completed when clicking “restore in place.” It’s super easy, that is, if you have a backup. If you don’t have backup, it’s suddenly not that easy. In fact, it’s not even possible in that situation. 

Let’s consider these larger recovery processes, such as disaster recovery (DR). For example, in a Microsoft 365 environment, restoring data like SharePoint documents or Exchange mailboxes isn’t enough if Microsoft Entra ID (identity and access management) hasn’t been restored first. That’s because without Entra ID operational, users won’t be able to authenticate and access the restored data — meaning that even though the information is back, business operations are still stuck. You’ve effectively restored, but not yet recovered. You have your data, but you don’t have your business operations. 

In large (or complicated) , restoration must happen in a well-calibrated fashion by restoring the right systems, in the right order, to achieve recovery. And by the definition above, recovery is the state of the business being “back.” 

Of course, to make matters complicated, sometimes a restore is “simultaneously” a recovery. Typically, these are small, simple data loss scenarios. Let’s say, for instance, there’s a data loss event involving a single employee overwriting a key budget spreadsheet. With certain third-party backup solutions, a shareable link can be sent to this employee, who can then restore the spreadsheet in place with a couple of clicks. In this moment, the data has been restored, and the “business is back” to how it was. That’s a recovery. The flow is: Back up -> restore -> recover. 

Building a resilient strategy 

To build real resilience, you need to: 

  • Ensure you can restore individual files, systems, and services quickly.  
  • Design processes that lead to full recovery — not only data restoration.  
  • Test both restore procedures (for precision) and recovery plans (for complete readiness). 

Getting your data back is only part of the battle. Real recovery means regaining full operational strength — with systems restored, access reestablished, workflows intact, and confidence that your business can keep moving forward. 

Restoration and recovery work together 

In any data protection strategy, restoration and recovery are closely linked — but they aren’t the same thing. 

Restoring data is a necessary step, but true resilience is about fully recovering operations and services. Restoration brings the pieces back; recovery reconnects them, validates them, and ensures your business can move forward without missing a step. What good is having your data back if you can’t do anything with it? 

By planning for both, you strengthen your ability to bounce back from disruptions and keep your business running strong. 

 

About Keepit
At Keepit, we believe in a digital future where all software is delivered as a service. Keepit’s mission is to protect data in the cloud Keepit is a software company specializing in Cloud-to-Cloud data backup and recovery. Deriving from +20 year experience in building best-in-class data protection and hosting services, Keepit is pioneering the way to secure and protect cloud data at scale.

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

Cyber storage: The new standard for SaaS data protection

In today’s high-risk digital landscape, storing data isn’t enough. You need to protect it—actively, intelligently, and independently. At Keepit, we’ve redefined what data storage means for the cloud era. We don’t just offer storage. We deliver cyber storage: a  built specifically to safeguard your SaaS data from the growing threat of cyber attacks and operational disruption.

Let me explain what that really means—and why it matters. 

Independent and dedicated: The foundation of real resilience 

Independence isn’t a buzzword. It’s a foundational requirement. Most backup solutions today are still entangled in the same infrastructure used for production data—especially when they rely on public cloud providers like Microsoft or AWS. That shared infrastructure model might look convenient on paper, but it creates a single point of failure in practice. 

Keepit is different. We’re . Our cloud doesn’t live inside the same hyperscaler platforms it’s meant to protect you from. We built our own infrastructure from the ground up, and we own every layer—from hardware to application. That means we’re not at the mercy of another company’s supply chain, network behavior, or internal vulnerabilities. 

What does “dedicated” mean in this context? It means that once your data enters a Keepit region, it never leaves that region. Your backups are replicated across two data centers in that region, ensuring not just compliance with data sovereignty but maximum resilience in the face of regional outages. 

Cyber storage = Storage + Protection 

Data storage alone doesn’t equal data protection. Cyber storage does. That’s why Keepit combines long-term, efficient backup storage with built-in, proactive protection mechanisms. 

Our architecture is . Once backup data enters our system, it’s immediately encrypted and can’t be altered—not by us, not by your admins, not by attackers. There’s also a 30-day delete lock on all data, protecting against accidental deletion, insider threats, and ransomware tactics. 

And we don’t stop there. Our Merkle tree-based architecture ensures that every version of your data is intact, accessible, and verifiable—without relying on legacy full/incremental backup structures. We call it “incremental forever,” and it gives you access to every backup like it’s a full snapshot, while minimizing load and risk. 

Security first, Zero Trust always 

Security isn’t a feature—it’s our architecture. Keepit is secure by design. We’ve embedded Zero Trust principles across our platform, infrastructure, and operations. 

Let’s be clear:  isn’t a checklist. It’s a mindset—and a moving target. You start with identity and context. You assume breach. And you design controls that minimize exposure at every level: user, device, network, application, and data.

From a Keepit perspective, this means role-based access controls, strict SAML-based identity management, secure device access, and IP-based controls at the platform level. It means nobody—not even Keepit employees—can access customer data unless explicitly authorized. 

It also means we can help our customers move closer to their own Zero Trust goals by ensuring the storage layer doesn’t become a blind spot. When storage is also part of your protection posture, Zero Trust has a stronger backbone. 

Full stack control = Full stack visibility 

Most vendors outsource key parts of their operations to hyperscalers. Keepit doesn’t. We own our entire stack. That gives us unmatched visibility into performance, anomalies, and potential risks—across software, hardware, and operations. 

With our , we flag suspicious patterns like spikes or drops in backup volume, mass deletions, or unexpected behavior across monthly snapshots. It’s built-in threat monitoring—not a bolt-on tool—and it’s tuned to detect precisely the kinds of subtle threats that evade traditional alerting systems. 

This is part of our Intelligent Threat Monitoring and Instant Response framework. Because when you own the stack, you don’t just wait for threats to appear—you go find them. 

Built-in risk governance 

We’ve built governance into the core of our product—not layered it on as compliance theater. Our secure and logged access controls offer fine-grained administrative roles, auditable logs, and immutable audit trails accessible through the platform or via integration with your SIEM (e.g., Splunk or Microsoft Sentinel). 

And with no subprocessors and no third-party access to data, we eliminate weak links in the chain. Everything stays in-region, encrypted, and controlled. 

Why cyber storage now? 

The reality is, businesses are under siege. You’re managing more data across more platforms, and the threat landscape is getting more sophisticated by the day. Breaches, insider threats, supply chain compromise—it’s all in play. 

Traditional backup models weren’t designed for this world. They assume trust where there shouldn’t be any. They treat storage as a static, low-risk layer. We know better. At Keepit, we’ve built cyber storage as an active participant in your cyber resilience strategy. Not just something you “have”—but something you use to stay protected, stay operational, and stay in control. 

To wrap up: The storage story has changed 

Cyber attacks don’t discriminate. They don’t wait. And they don’t stop at the edge of your infrastructure. Your backups need to be more than safe—they need to be ready. That’s why cyber storage is the new standard. 

At Keepit, we live and breathe data protection. That’s why we didn’t build on someone else’s cloud. We built our own. Because your data deserves its own home—and your organization deserves a partner that’s all-in on keeping it safe. 

Ready to shift from traditional storage to cyber storage? 

Let’s talk. 

About Keepit
At Keepit, we believe in a digital future where all software is delivered as a service. Keepit’s mission is to protect data in the cloud Keepit is a software company specializing in Cloud-to-Cloud data backup and recovery. Deriving from +20 year experience in building best-in-class data protection and hosting services, Keepit is pioneering the way to secure and protect cloud data at scale.

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

Protecting your project execution — Keepit is now backing up Jira and Confluence Cloud

Atlassian’s suite of collaboration tools—Jira, Confluence, and others—has become mission-critical for countless teams across the globe. From software development to IT service management, Atlassian’s cloud products are the central nervous system of modern project execution: whether it’s tracking tickets and development workflows or storing vital knowledge in pages and spaces. Under Atlassian’s shared responsibility model, it’s up to you to safeguard your own data. 

 

Shared responsibility: How effective is Atlassian’s native backup and recovery service?  

Backing up your data in a separate infrastructure from your production data is an industry best practice to secure business continuity and comply with increasing regulations. 

 

Although the offered, native backup and recovery service is useful for some Jira and Confluence customers, it has some major limitations: for starters, it’s not generally available for all Atlassian customers.  

 

On top of that, the native backup solution only stores your data for up to 30 days, after which it expires and can’t be restored. Atlassian’s backup also has a limit to how much data you can restore on your own, without the help of customer support: backups larger than 60GB need Atlassian support assistance for restoration.  

 

Reasons why you should independently back up Jira and Confluence Cloud 

As companies become more and more dependent on SaaS applications, independent backup —and the capability to recover instantly — has become a basic element of cyber readiness. 

 

Keepit backup and recovery for Jira and Confluence Cloud will ensure and support 

 

  • Business continuity 
    Regular backups are a must to mitigate risk of business disruption, financial loss, damage to a company’s reputation, and even legal action. 
  • Protection against human error 
    Mistakes happen every day. Your users and administrators have access to your most vital data, and one accidental deletion means losing data you rely on the most. Human error is still the leading cause of data loss. 
  • Confidence during systems updates and migration 
    Having secure backups makes migration easier and more secure. 
  • Cyber resilience 
    Data loss from security breaches, such as ransomware and malicious deletion, are on the rise. Without a backup in place, your SaaS data can be lost forever. 
  • Compliance 
    To comply with increasing regulation such as NIS2 or GDPR, you need uninterrupted access to your data, and any data loss or disruption may lead to failures to comply. 

 

Keepit backup and recovery for Jira and Confluence Cloud 

Keepit backup and recovery for Jira and Confluence Cloud enables companies to secure their project management data, with assurance that it can always be recovered. Some of the key features of Keepit’s solution include 

 

  • Automated backups — have all your data at your fingertips, always, with comprehensive, automated backups of your Jira and Confluence Cloud. 
  • Granular restore capabilities — quickly identify the correct Jira and Confluence data to recover with Keepit’s Smart search and Previewer for projects, issues, files, and attachments. 
  • Storage — immutable backup and retention. 
  • 100% cloud based: no hardware, no upgrades. 
  • Secure platform architecture, built on a robust, cloud-native design with AES-256 encryption for data protection. 
  • End-to-end certifications: ISO 27001, ISAE 3402, and GDPR-compliant, ensuring the highest security standards. 
  • Independent cloud: Keepit’s vendor-neutral cloud stores backup data separately from SaaS providers. 
  • Monitoring of snapshot data to automatically detect anomalies. 
  • Compare backup snapshots to identify records added, modified, or deleted over time, enabling precise recovery. 

 

Final thought: Your project management tools deserve the same protection as your source code or customer records 

Imagine a product team losing its entire Jira roadmap, or a customer success team being cut off from the service history logged in Confluence. The ripple effects affect every part of the business.

 

That’s why backup isn’t a “nice to have” for Atlassian—it’s essential. 

 

 tailored to Atlassian workloads ensures that your teams can innovate confidently, collaborate securely, and recover instantly—no matter what happens. 

 

About Keepit
At Keepit, we believe in a digital future where all software is delivered as a service. Keepit’s mission is to protect data in the cloud Keepit is a software company specializing in Cloud-to-Cloud data backup and recovery. Deriving from +20 year experience in building best-in-class data protection and hosting services, Keepit is pioneering the way to secure and protect cloud data at scale.

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

Data governance checklist: Turning strategy into action

This is the fifth and final article in our blog series based on our data governance report. Throughout this series, we’ve explored how governance helps manage data through its lifecycle, strengthens resilience, and fuels compliance and business growth.

Now it’s time to bring it all together — and put governance into practice.

This blog introduces a practical framework/checklist designed to help organizations move from intention to execution. Whether you’re just getting started or refining a mature program, the model outlined here offers a clear way to assess priorities, identify gaps, and scale governance with confidence.

Governance doesn’t start with technology — it starts with structure 

A governance program can’t succeed without clarity on goals, ownership, risk, and accountability. That’s why a structured framework is essential — not to add complexity, but to cut through it.

In Keepit’s data governance report, we provide three interconnected governance lenses, each supported by 10 critical checklist questions. Below, we outline the key areas these questions cover.

 

1. Framework readiness: Establishing the foundation for governance 

Before governance can scale, it needs a solid foundation. This checklist can help you assess if your organization has the right structures, policies, and oversight to support and sustain governance. It focuses on:

  • Clear governance roles and responsibilities 
  • Policy enforcement and standardization 
  • Classification, privacy, and retention frameworks 
  • Regulatory alignment and auditability 
  • Mechanisms for continuous review and improvement

2. Classification strategy: Organizing data to reduce risk and increase value

Governance depends on knowing what data you have and treating it accordingly. This checklist helps define a fit-for-purpose classification model — one that supports access control, automation, and downstream compliance. It includes:

  • Mapping data types, sources, and storage locations 
  • Assessing sensitivity and access risk 
  • Defining classification categories and metadata tagging 
  • Supporting tools and automation capabilities 
  • KPIs to monitor classification effectiveness

3. Board-level alignment: Elevating governance to a strategic business function 

For governance to succeed, it must be visible at the top. This checklist helps ensure governance is not just operational — it’s strategic. It supports board engagement by emphasizing:

  • Acknowledgement of the risk management process (part of NIS2
  • Leadership’s understanding of governance goals 
  • Framing governance in terms of business value and risk 
  • Communicating maturity, cost, and ROI 
  • Enabling cross-functional alignment 
  • Reporting and collaboration at the executive level 

Use the checklist to spark internal conversations 

These questions aren’t just for IT or compliance — they’re designed to be cross-functional.  You can use them in workshops, planning sessions, or executive briefings to create alignment and drive accountability.

Most importantly, they turn governance from an abstract concept into a shared capability. 

Before implementing a governance framework, organizations need leadership buy-in. The checklists can help guide discussions at the executive level. 

Conclusion: From questions to execution 

A checklist alone won’t build a governance program — but the right questions will move you from assumptions to action. Organizations should use these checklists as a starting point, adapting them to their specific needs.

Next step: Assess your current governance framework — which gaps need to be filled? 

Data governance report

Get the report for the three checklists and all 30 questions in an interactive format — and build a governance framework that fits your business. 

Wrapping up the data governance blog series  

This article concludes our five-part blog series based on the Intelligent Data Governance report. If you’ve followed along, you now have a clearer understanding of how governance strengthens lifecycle control, resilience, and strategic growth. 

 

1. Part 1: Intelligent data governance

2. Part 2: Data lifecycle  

3. Part 3: Resilience against corruption and disruption  

4. Part 4: Data governance fuels growth and compliance  

About Keepit
At Keepit, we believe in a digital future where all software is delivered as a service. Keepit’s mission is to protect data in the cloud Keepit is a software company specializing in Cloud-to-Cloud data backup and recovery. Deriving from +20 year experience in building best-in-class data protection and hosting services, Keepit is pioneering the way to secure and protect cloud data at scale.

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

The French Tennis Federation chooses Keepit for independent backup of Microsoft data

Keepit protects critical Microsoft 365 and Microsoft Entra ID data of 2,515 users, to add Power BI in the near future

 

Paris, France – June 10, 2025 Keepit, a global provider of a comprehensive cloud backup and recovery platform, today announced that it has been selected by the French Tennis Federation (FFT) to independently back up its Microsoft 365, Microsoft Entra ID and Power BI data.

 

Keen to strengthen the resilience of its digital environments, the French Tennis Federation chose a sovereign backup solution, independent of major global cloud providers. It chose Keepit, a Danish company that controls its entire hosting chain by operating its own cloud and data centers, across Europe, and in the UK, Canada, Australia and the US. Keepit’s architecture, which guarantees uninterrupted access to data even in the event of third-party provider failure, fully met the FFT’s requirements of security, independence and business continuity.

 

“Until three years ago, we had no backup solution for our cloud environments. My objective was clear: to identify a European service provider guaranteeing maximum independence”, says Franck Labat, Technical Director at FFT. “Beyond this initial requirement, Keepit was able to meet additional needs that we hadn’t anticipated: centralized, traceable archiving of PST files, unified management of all our data via a single platform, and more recently, seamless integration of our directory as part of our complete migration to Entra ID.”

 

The French Tennis Federation, headquartered at Roland-Garros stadium, organizes, coordinates and promotes tennis for over 8,000 clubs throughout France. The FFT’s operations also involve the management of a large number of seasonal employees as part of its event-driven activities, generating significant data flows to be processed and restored. To ensure consistent monitoring, it is essential to be able to recover data from people who have left, sometimes after short assignments, in order to pass it on to their managers. This need also led the FFT to choose Keepit: beyond backup, the solution enables targeted copying and restoration according to the needs of the teams. Keepit facilitates the management of these processes, while guaranteeing data security.

 

The collaboration began in 2022, alongside SCC France, a trusted partner of the FFT for over 15 years, with the initial aim of safeguarding Microsoft 365 environments. Since then, the partnership has gradually expanded to include Power BI and Microsoft Entra ID. FFT now plans to systematically integrate any new Microsoft solution it adopts into the Keepit ecosystem, ensuring continuity and consistency in the protection of its digital assets.

 

“We are particularly proud to have led this project alongside our partner SCC, to offer the FFT an independent cloud backup and recovery platform that is simple to deploy and administer,” says Cyril VanAgt, Vice President Channel EMEA at Keepit. “We remain fully committed to supporting the next steps in the evolution of its cloud and Microsoft environments.”

 

About the French Tennis Federation
The French Tennis Federation (French: Fédération française de tennis, FFT) is the governing body for tennis in the Hexagone and DROM-COM. It was founded in 1920, and is tasked with the organization, co-ordination and promotion of the sport. It is recognized by the International Tennis Federation and by the French Minister for Sports. Its headquarters are at the Roland-Garros stadium in France.

 

About Keepit
At Keepit, we believe in a digital future where all software is delivered as a service. Keepit’s mission is to protect data in the cloud Keepit is a software company specializing in Cloud-to-Cloud data backup and recovery. Deriving from +20 year experience in building best-in-class data protection and hosting services, Keepit is pioneering the way to secure and protect cloud data at scale.

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

Keepit continues momentum with 2025 TrustRadius Top Rated Award

Keepit has been recognized as a leader among SaaS Backup, Data Loss Prevention, Disaster Recovery, and Enterprise Backup categories.

  Copenhagen, Denmark – June 10, 2025 – Keepit, a global leader in SaaS data backup and recovery, today announced that it has been recognized as TrustRadius Top Rated in four categories: SaaS Backup, Data Loss Prevention, Disaster Recovery, and Enterprise Backup. This recognition comes directly from customers, underscoring Keepit’s commitment to providing an intelligent and secure backup and recovery platform. “Earning a Top Rated award on TrustRadius is a reflection of how well a product is meeting the needs of its customers,” says Allyson Havener, CMO, TrustRadius. “Keepit’s recognition is based entirely on customer feedback—real users who value the platform’s reliability, performance, and support.” Since 2016, the TrustRadius Top Rated Awards have become the B2B’s industry standard for unbiased recognition of excellent technology products. Based entirely on customer feedback, they have never been influenced by analyst opinion or status as a TrustRadius customer. Here is a detailed  criteria breakdown of the methodology and scoring that TrustRadius uses to determine Top Rated winners. Keepit provides independent backup to over 18,000 customers worldwide Keepit backup and recovery solutions are currently available for eight workloads, such as Microsoft 365, Microsoft Entra ID, Google Workspace and Salesforce. The company will expand its offering in 2025 to include applications such as Jira, Bamboo, Okta and Confluence. Keepit’s unique, intelligent, and cloud-native platform enables customers to safely secure their SaaS applications, ensuring full control of data regardless of unforeseen events such as outages, malicious attacks, or human error. “SaaS backup has become an increasingly crucial part of risk management and business continuity planning. We are thrilled that our customers rely on Keepit to safeguard critical data and value their continued feedback and support. Accolades such as the Top Rated Award mean a lot to us as a company and further validate that our solutions meet our customers’ needs,” says Michele Hayes, CMO at Keepit. Hear from verified users on how much they value Keepit: Keepit reviews on Trustradius.  

About Keepit
At Keepit, we believe in a digital future where all software is delivered as a service. Keepit’s mission is to protect data in the cloud Keepit is a software company specializing in Cloud-to-Cloud data backup and recovery. Deriving from +20 year experience in building best-in-class data protection and hosting services, Keepit is pioneering the way to secure and protect cloud data at scale.

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

Keepit continues its commitment to growth in the UK and Ireland with new VP hire

New senior executive shares ambitious goals for regional Keepit expansion  

Copenhagen, Denmark, June 2, 2025 Keepit, the global leader in SaaS data protection, today announced that Dan Middleton, former VP at Veeam, has been appointed as its new VP for the UK and Ireland. Middleton will grow Keepit’s UKI sales team, accelerate pipeline generation, and drive the expansion of Keepit’s local partner ecosystem with the regional partner management team. Additionally, Middleton is responsible for Eastern Europe, Middle East and South Africa.

With over 20 years’ experience in IT sales leadership, Middleton brings a wealth of proven go-to-market expertise and leadership to Keepit. His appointment follows an 11-year tenure at Veeam UKI, where he played a key role in strengthening the company’s market presence to #1 in the region. 

“Keepit is solving one of the most urgent challenges organizations face today: protecting and controlling their data in a complex, fast-moving, and highly regulated landscape. With data sovereignty continuing to rise up the boardroom agenda, businesses need practical, proven solutions. My priority now is to build on momentum in the UK and Ireland, working closely with our channel partners to drive growth and help more organizations take control of their data, wherever it resides,” said Middleton. 

“We’re incredibly excited to have Dan on board,” said Keepit Chief Revenue Officer, Craig Bumpus. “He’ll be leading an already strong and experienced team dedicated to helping organizations protect their data. This role is critical to our continued growth in the region and with Dan’s expertise, we’re set to meet some bold growth objectives that will take us into strategic accounts and help expand our customer base even further. Following our recent alliance with Ingram Micro in the UK we are well positioned to expand our UK footprint” 

Middleton joins Keepit at a time when organizations are under significant pressure to protect their data and metadata generated by their SaaS applications. However, SaaS providers have no obligation to offer data protection services alongside their tools.  

 

Thanks to datacenters located in the UK and complete independence from global hyperscalers, Keepit’s backup and recovery solution ensures that organizations retain complete access to their data at all times. With Keepit, organizations have the confidence that data remains under their control, even if the original SaaS system is unavailable, or a third party takes unauthorized control of data stored within a public cloud. This is a critical contribution to data resilience in the context of UK digital sovereignty. 

 

A wave of cyberattacks – including recent high-profile attacks against major UK retailers – has pushed data protection back into the spotlight. And with both the UK and EU tightening data sovereignty laws, organizations must take a more strategic approach to managing their data: classifying, prioritizing and understanding its value.  

Keepit supports this by offering secure, compliant cloud backup and data management services that ensure data is protected, easily accessible and stored according to local sovereignty requirements. This enables organizations to maintain control, meet regulatory demands, and recover quickly from cyber incidents. 

Based at Keepit’s continuously growing UK headquarters in London, Middleton will accelerate adoption of Keepit’s solutions by targeting industries facing some of the toughest data governance challenges, where organizations are subject to numerous regulations, including aligning their data policies with UK and EU legislation. 

For more information on Keepit’s data protection solutions and upcoming developments, visit www.keepit.com 

About Dan Middleton
Dan Middleton is Keepit’s VP, UK and Ireland. He has over two decades of experience working in IT sales management, including 11 years with Veeam Software in roles that included Commercial Sales Director and VP, UK & Ireland. 

Find Dan Middleton on LinkedIn 

About Keepit
At Keepit, we believe in a digital future where all software is delivered as a service. Keepit’s mission is to protect data in the cloud Keepit is a software company specializing in Cloud-to-Cloud data backup and recovery. Deriving from +20 year experience in building best-in-class data protection and hosting services, Keepit is pioneering the way to secure and protect cloud data at scale.

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

Europe’s data sovereignty challenge

The reality of Europe’s cloud dependence 

Europe stands at a crossroads when it comes to data sovereignty. Despite its aspirations for autonomy, 97% of the cloud infrastructure and platform services market is dominated by U.S. and Chinese providers like the US Big Three (AWS, Azure, and Google Cloud) and Chinese providers such as Alibaba, Huawei, and Tencent.

The implications are profound. With critical European data housed within infrastructures controlled by foreign entities, the EU’s ambitions for digital sovereignty face significant hurdles. How can Europe claim true data sovereignty when its information resides under jurisdictions subject to foreign government access and control? 

The geopolitical landscape 

The global cloud market is not just about technology — it’s about politics and control. Data sovereignty speaks to the legal and regulatory control a country or region has over data generated or stored within its borders. But with most of the infrastructure controlled by non-European players, the question of true sovereignty remains unresolved.

This dependency leaves Europe vulnerable to political shifts and foreign legislation, including policies like the U.S. CLOUD Act, which grants American authorities the right to access data stored by U.S. companies, even if it resides on foreign soil. 

A path forward for Europe 

For Europe to assert control over its digital future, it must prioritize sovereign cloud solutions. These infrastructures would guarantee data residency, security, and autonomy, shielding critical information from foreign oversight. Keepit’s architecture is purpose-built for such sovereignty, with control over the entire data and management plane, providing a viable pathway for European enterprises to regain digital control. 

Next steps: Navigating toward European digital autonomy 

To transition from dependence to autonomy, European companies should:

  • Invest in sovereign cloud solutions: Opt for providers that prioritize European data residency and compliance. 
  • Strengthen compliance with regional regulations: Align with GDPR, DORA, NIS2 and local data privacy laws to build stronger protections. 
  • Leverage local data centers: Prioritize data centers within Europe to avoid geopolitical risks. 
  • Demand transparency and local control: Ensure your provider maintains complete transparency over data handling and security measures. 
  • Promote regional cloud initiatives: Support European-based cloud initiatives that focus on sovereignty and compliance.

A sovereign Europe starts with responsible decisions made today. 

About Keepit
At Keepit, we believe in a digital future where all software is delivered as a service. Keepit’s mission is to protect data in the cloud Keepit is a software company specializing in Cloud-to-Cloud data backup and recovery. Deriving from +20 year experience in building best-in-class data protection and hosting services, Keepit is pioneering the way to secure and protect cloud data at scale.

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.