Book demo
26 September 2024

Predatar’s big online cyber resiliency summit is back for 2024.

Our biggest and best event yet.

We’re excited to announce the return of our hugely successful annual summit, Control24. This year, some of the industry’s biggest storage and security vendors are putting rivalries aside, to come together and discuss one of the most pressing challenges in business today – cyber resilience.

As the role of Artificial Intelligence in business reaches a critical tipping point, Control24 will focus on how forward-thinking businesses are using it to make resilience a reality.

Control is back… and bigger than ever before.

Typically attracting an audience of over 400 attendees, Control has become one of the biggest online events for cyber resiliency. And with an average audience rating of 4.5 stars (out of 5), Control24 is an event not to be missed.

What’s different this year? 

We’ve been working relentlessly to grow our technology ecosystem. The market-leading Predatar Recovery Assurance platform now supports many of the leading storage and security technologies and
this year’s speaker lineup reflects this. We’ve got experts from Zerto/HPE, IBM Security, Dell Technologies, and Rubrik on the bill.

Long-term fans of the Control summit needn’t worry. You can expect the same pace and energy as usual. We’re sticking with the short energetic sessions, the same mix of thought-leadership and practical advice, and there’ll be plenty ways to get involved with live QA and competitions.

Don’t know what to expect? Take a look at our highlights reel.

What’s on the agenda? 

We’ve got an action packed agenda in store with customer stories, a real-time CleanRoom deployment challenge and guest speakers including:

  • Shariq Aqil and Sasha Acosta from Zerto/HPE 
  • Harpinder Powar and Richard Cassidy from Rubrik
  • Martin Borrett from IBM Security
  • Liz Campbell and Steve Kenniston from Dell
  • Christian Farrel from Accenture  


Register now!

Control24 takes place online, on 9th October at 2pm (GMT).
Don’t miss out. Register now!

Learn more about
Predatar recovery assurance

20 September 2024

Cyber Resilience. A team sport.

The world’s biggest problems require collective action. Pandemics and climate change immediately spring to mind.

According to Gartner there were 3,200 different cyber security vendors selling solutions in 2023. Yet, according to the UK Gov Cyber Security Breaches Survey, the number of attacks in 2024 was 30% higher than the previous year. Based on these statistics, it’s clear that despite the tech industry’s best efforts, cyber crime is a challenge that isn’t going away.

In our opinion, we can add cybercrime to the category of really big problems to solve.

Is prevention enough?

Quite reasonably, the primary focus of the world’s five million cyber security professionals has been on threat detection and breach prevention. Our advice to them is… consider your plan B. Is now the time to invest in Response and Recovery readiness?

At Predatar, our focus is on Recovery Assurance. We strive to help organisations be more confident that, no matter what happens, they can recover their data and systems, quickly, cleanly and completely.

For those of you thinking about cyber resilience, we’ve lined up industry leaders from the world’s of cyber security and storage. Leading lights from some of the world’s leading technology vendors will come together for an online summit on 9th October. Why?…

Collaboration over competition

If you think avoiding a cyber attack in 2024 is hard, try recovering from one! Cyber Resilience is firmly placed in the box marked, ‘really hard problems’. That’s why at Predatar, we have invited our technology partners to put rivalries aside and join the line-up at Control 24, our annual online summit for cyber security and infrastructure professionals.

Critical thinkers from Accenture, IBM, Dell, Rubrik and HPE will come together to discuss and debate how best to solve the cyber resiliency problem. And the truth is, they didn’t need any convincing. One thing all the experts agree on, is that winning the fight against cyber criminals is team sport.

Over the course of 3 hours, the Control24 ‘Team’ will deep-dive into the role of AI in Cyber Security, debunk the 10 myths of cyber resilience, dissect the evolution of attacks, and explain the difference between an air-gap and a cyber vault.

And while all this is happening, Predatar’s CTO Ian Richardson will be getting hands-on with a live CleanRoom deployment challenge!

Join Control24

Don’t miss this important event. Join Control24 online on 9th October.
See the full agenda and register here.

Learn more about
Predatar recovery assurance

18 September 2024

How To Make Your Backup Work

If a backup system consistently copies your data and retrieves it when called upon, is that sufficient evidence your backup “works”?

If you consider backup as an expensive insurance policy, then the answer should be a definite “yes”.

The dying role of ‘backup administrator’

In today’s hypercompetitive world every asset, be it capital or human, must be accountable and deliver a return on investment. An asset that delivers minimal value for 99% of the time is right not to be considered a jewel in the crown of a CIO’s IT infrastructure. Not surprising then that the role of “Backup Administrator” no longer graces the job boards on LinkedIn.

Whilst no CIO or CISO is rushing to remove their backup safety net, it rarely makes top billing at team meetings. The largest Security companies like Palo Alto, and until very recently, Crowdstrike, are worth $100 Billion. The largest pure play backup vendors are worth less than a tenth of that, and yet, companies are still getting attacked.

Security vendors are investing billions in artificial intelligence to eke out marginal gains in the efficacy of their products. Meanwhile, the largest data lake in most organisations – backup – sits idle. It’s time to put your backup to work. Here’s how…

The application of AI in backup

If there was ever a perfect use case for the application of artificial intelligence, surely backup would be right up there. Unlocking the hidden value in Backup is no longer constrained by the cost. Once trained, AI is ridiculously cheap. Is this why Gartner positioned AIOps for Backup as the fastest technology to reach maturity in its 2024 Hype Cycle for Storage? The properties which make it such a foundational technology are:

  1. Endurance – AI algorithms do not rest and do not lose focus. Spotting anomalies in backup systems is a repetitive and boring task best left to robots.
  2. Speed – AI has the ability to spot small, seemingly insignificant statistical aberrations at orders of magnitude faster than humans.
  3. Recitation – imagine a human being capable of memorising all the support manuals and knowledge base articles for a backup application? Now add in the ability to cross-reference with every known security vulnerability, error message and backup command.

Complementing the raw analytical power and speed of AI with the contextual understanding of humans we think will help unlock the intrinsic value of the data stored in enterprise backup systems. From spotting security threats, to helping administrators expedite incident resolution and meeting requests for ad-hoc reports from regulator, AI promises to be an IT administrator’s best friend.

Where does Predatar come in?

At Predatar, we are just getting started with the application of AI in Backup. Currently in Beta, we are using AI to uncover the hidden recovery risks for customers who have deployed IBM Storage Protect (TSM) backup software. We are now able to do this at a fraction of the cost of more traditional methods. For examples of this exciting application of AI, go to https://predatar.com/rrr and sign up to be an early adopter.

Learn more about
Predatar recovery assurance

03 September 2024

The consumerisation of IT

The lines between consumer and enterprise technology are increasingly blurred. The devices and apps we use at home; seamless, intuitive, and fast are setting new standards for what we expect in the workplace. This phenomenon, known as the consumerisation of IT, is rapidly reshaping how businesses operate, driving a shift in user expectations that no organisation can afford to ignore.

Think about how effortlessly your home tech works. Whether it’s the instant response from a voice assistant or the fluid interface of your favourite app, these experiences have conditioned us to expect the same level of speed and simplicity in our professional tools. This shift in behaviour is pushing businesses to innovate at an unprecedented pace. Employees now demand that their work tools are just as user-friendly and efficient as the technology they use in their personal lives.

Meeting consumer-level expectations in enterprise tech

At Predatar, we recognise this shift and are committed to rising to the challenge. We understand that in a world where time is money, and data security is paramount, there’s no room for slow, clunky interfaces or outdated features. That’s why we’ve adopted an agile approach to development, with monthly releases that ensure our platform is always evolving to meet the needs of our users.

Listening to users: The Heart of our innovation

The consumerisation of IT isn’t just about speed; it’s about responsiveness. Just as consumers expect companies to listen to their feedback and improve their products, we believe that our users deserve the same level of attention. That’s why we prioritise user feedback in our development process. Each feature we release is shaped by the insights and experiences of those who use our platform every day.

A prime example of this is our Recovery Risk Report, which has undergone significant enhancements in Release R16.1 based on early user feedback. We’ve introduced detailed insights into outdated software and improved backup storage management, ensuring our users have the most accurate and actionable information at their fingertips.

R16.1: The latest step in our journey

Release R16.1 is a testament to our commitment to delivering consumer-grade experiences in the enterprise space. With optimised widget performance, expanded support for Rubrik delivers unified reporting for complex environments, and enhanced security insights, R16.1 is designed to meet the high expectations of today’s users. Widgets now load in seconds, ensuring that users can access critical information without delay, and our unified reporting features provide a seamless, single-pane-of-glass view across multiple vendors, essential for combating the increasingly sophisticated landscape of cybercrime.

Leading the future of enterprise IT

As the consumerisation of IT continues to shape the business world, Predatar is dedicated to staying ahead of the curve. We’re not just responding to these changes—we’re anticipating them. Our agile development cycle, commitment to user feedback, and focus on delivering fast, intuitive, and secure solutions are at the core of our mission to empower businesses in this new era.

With R16.1: Orca , we’re proud to demonstrate how we’re not just keeping up with the demands of modern IT we’re leading the way. As we continue to innovate and evolve, we’re excited to see how our users will benefit from the enhanced capabilities and seamless experience that our platform provides.

Check out R16.1: Orca here

Learn more about
Predatar recovery assurance