Book demo
15 April 2026

Are your backup vendors marking their own homework?

If you’re a risk or compliance officer – or, in fact, anyone with a role to play in ensuring operational resilience in your organization – how do you know that the backup platforms your IT team is using are up to the task?

It’s an important question. The answer – when you think about it – is worrying.

Because typically, organizations like yours rely on the resiliency credentials that the technology vendors themselves set out. Is it any wonder that every backup vendor claims that their platform is the most resilient, when they are setting their own criteria to measure resilience?

Of course, you could ask your IT or infrastructure team – they are the experts, after all. But the brutal truth is that resilience isn’t their top priority. These teams are typically overstretched and under-resourced. Making sure that the systems and data your organization runs on every day are available under normal conditions keeps them busy enough.

Understandably, they will have a preference for the infrastructure products that make everyday management and administration easy. And, in fact, it goes beyond day-to-day practicalities. If you spend enough time with storage teams, you’ll notice that people often become deeply attached to certain vendors, defending them almost like a belief system rather than just a technology choice.

Understanding the true picture of resilience in your business becomes even more complicated when you have a large and complex infrastructure environment. An environment made up of technologies from multiple vendors – each with its own claims, its own standards, and its own devoted followers inside your business.

The idea of ‘devoted followers’ brings an interesting concept to mind – one which history has shown to be a good one: the separation of church and state. Not only has this approach been useful for monarchs who have found themselves inconveniently married, but more importantly, it has been invaluable for managing kingdoms. And, believe it or not, the concept is relevant here.

In this analogy, vendors like Dell, IBM, Pure, Veeam, Rubrik, etc are the ‘churches,’ each with its own doctrine. Useful, certainly – but not neutral.

What is needed is a ‘state’: a vendor-independent authority that sits above the fray, governing consistently across all systems. One that ensures recovery testing is meaningful, malware scanning is credible, and resilience is measured the same way everywhere.

This separation reduces conflicts of interest, standardises outcomes, and brings a much-needed layer of objectivity to an otherwise fragmented landscape.

No analogy is perfect, of course. Vendors aren’t religions, and governance platforms don’t wield civil authority, but the underlying principle still holds: resilience shouldn’t be defined by the tools themselves. Because if it is, don’t be surprised if everything looks perfect… until it really matters… and then it isn’t.


Discover Independent Recovery Assurance

Visit www.predatar.com to start your journey to independent Recovery Assurance or contact hello@predatar.com for expert advice from the leading independent Recovery Assurance experts at Predatar.

Learn more about
Predatar recovery assurance

25 March 2026

DR-Rex

5 Signs That Your Disaster Recovery Testing is Prehistoric.

Let’s be honest. In most businesses, Disaster Recovery (DR) testing still looks suspiciously like it did 20 years ago. Runbooks, war room, late night pizza delivery, a colossal spreadsheet for tracking the whole thing.

If that sounds familiar, it’s time to face up to the truth. Your outdated DR tests are putting your business continuity at serious risk. The woolly mammoth in the room is this… the world has changed and your processes are no longer fit-for-purpose.

Here are 5 warning signs that your DR testing approach is stuck in the past – and some practical advice to bring it into the 21st century.

#1. You test once or twice a year.

Traditional DR testing was designed around big, periodic exercises. Typically, annually or quarterly. Everyone gathers, the scripts come out, systems get failed over, and someone ticks the box.

Job done.

The problem here is that the data that your business runs on is changing every single day. New user profiles, software updates, hardware refreshes, security patches. Any of these can knock a restore off track and potentially derail the recovery of important services or applications that your business relies on. 

Your environment will change hundreds, if not thousands of times between DR tests. Just because a system was recoverable yesterday, it doesn’t mean that it will be today.

Resilience shouldn’t be something you check from time to time. It should be continuously validated as part of the everyday operations of your business.

#2. Your DR test relies on heroic manual effort

The people that manage the data in your business are unsung heroes. They quietly keep your organization running – every day. But, if your DR tests require dozens of these heroes to assemble, and follow a 200-page runbook into the early hours – that’s not resilience – that’s a liability.

Manual recovery processes are:

Slow
Prone to human error
Inconsistent
Impossible to scale

In a real-world data outage, when the pressure is high, and time matters – the last thing you want is a room full of people following a big, complicated document.

Modern recovery needs automation, orchestration, and repeatability.

#3. Your DR tests are designed for hardware failures — not cyberattacks

The most likely type of disaster to hit your business isn’t an earthquake, a flood, or a fire. It’s a cyberattack.

You know it. Your IT team knows it. The Business Continuity team know it. Even the executives know it – But few dare to ask the question, “Does our DR testing simulate cyber recovery scenarios?”

Ransomware doesn’t politely failover your servers. Attackers move laterally across systems. They lock-out administrators. They Infect backups. They encrypt your data. Most DR testing rarely replicates this reality. Instead, it tests a clean failover scenario where everything behaves exactly as expected. It’s just not how cyber incidents unfold.

Modern DR testing must validate whether you can recover clean, trusted data and restore operations after a cyberattack – not just after a hardware failure.

#4. Your DR tests prove compliance, not recovery.

Let’s be blunt: Most DR testing exists primarily to satisfy auditors.

• A report gets generated.
• Boxes get ticked.
• Someone signs it off.
• Everyone gets back to the day job.

But compliance reports don’t restore systems. What matters is whether you can recover quickly, recover cleanly and recover completely.

If your DR testing produces documentation but not real operational confidence, you’ve got a reporting exercise, not a resilience strategy.

#5. You don’t actually know if your recovery plan works

This might be the most dangerous problem of all.

Many organisations assume their DR plan works because it worked the last time they tested it.

But if testing is:

Infrequent
Highly manual
Limited in scope

…then what you really have is a lot of hope and not much proof.

That’s a risky place to be.

Bring your business continuity into the modern world

Modern recovery testing needs to move beyond periodic testing and manual exercises.

It should be:

• Automated — removing reliance on manual runbooks and risk of human error
• Continuous — validating recovery readiness regularly, not annually
• Realistic — simulating modern threats, including cyber incidents
• Actionable — giving teams real insight into recovery performance

This is exactly the shift Predatar was built to enable. Predatar orchestrates Recovery Assurance testing across complex enterprise environments, allowing you to automate recovery workflows, run low-impact recovery test, identify issues early, and prove recovery readiness with confidence.

Make sure your recovery processes actually work — not just on paper, but in practice.

Learn how to reduce your reliance on outdated DR tests and bring your DR testing into the modern world. Read our Recovery Assurance Buyers Guide or visit predatar.com

Learn more about
Predatar recovery assurance

27 February 2026

Predatar’s GUI Refresh Starts Here

R18.1 Black Widow is now live – introducing a significantly enhanced user interface for one of Predatar’s most-used features… And this is just the beginning!

The headline news in our last major release, R18 Black Widow, was support for Zerto workloads. This means that Zerto customers can benefit from Predatar’s unique Recovery Assurance capabilities. But that’s only part of the Black Widow story.

Behind the scenes, our development team laid the groundwork in R18.0 for a big evolution of the Predatar GUI (Graphic User Interface).

As Predatar CEO, Rick Norgate explains: “Over the coming months, Predatar users will see an exciting evolution of the platform. Moving forward, Predatar will not only look more modern and polished, but – importantly – it will become more intuitive and easier to use.”

While there’s no doubt the new direction for the GUI looks great, the changes are far more than cosmetic. At their core is a UX/UI framework designed to make Predatar more intuitive and boost productivity for users.

For Predatar customers the journey begins today, with the launch of R18.1 Black Widow. This new release includes a dramatically enhanced Data Explorer interface. Not only will users notice the impactful new look – setting the tone for future GUI enhancements – they’ll also find that Data Explorer is simpler, clearer, and more efficient to use.

Filter Faster.

Feedback from customers told us that the filters and display options in Data Explorer felt overwhelming. Backend analytics supported this – showing that roughly half of the available options were rarely, if ever, used.

Previously, there were more than 20 ways to filter data and 4 different ways to visualise the results. We’ve reduced the options by around 50%. Now, there is a more streamlined control panel highlighting just three filters that our users utilise time and time again, with a further 7 ‘advanced’ filters just a click away. The ones that no one was using? They’ve gone!

Dashboard interface with search filters for nodes, node group, grade, and test status.

We’ve also removed the ‘scatter’ and ‘graph’ view options. While they were cool features, they simply weren’t adding practical value – so they’ve gone too. By focusing on the tools our users actually rely on, we’ve decluttered the interface, making it easier and faster to get to the answers you need. It’s also created more space for the data ’tiles’ themselves. And those have been enhanced too…

More insights. Fewer Clicks.

Users will immediately notice the evolution of the Data Explorer tiles. They now surface far more of the information you need — without requiring multiple clicks. Previously, users would regularly have to drill into individual nodes to get important information. Now, essential detail are visible at a glance, including backup platform, workload type, storage size, and resilience fundamentals, and anomaly count.

Dashboard view showing server nodes with storage metrics and anomalies on IBM Spectrum platform.

The result? Clearer analysis. Reduced friction. Faster decision-making.

Accessibility Matters.

Improving accessibility is a key objective in the evolution of the Predatar GUI. Data Explorer, with its need to communicate dense information in a compact space, presented a particular challenge.

The previous interface relied heavily on colour — using a traffic light system to indicate node health. While effective for many users, this approach could create barriers, particularly for those with colour vision deficiencies.

The new design still uses a traffic light model, but colour is no longer the primary signal. Health grades, anomaly counts, and recovery indicators are now clearly displayed as text and structured data — ensuring users can understand node status without relying solely on colour.

Server dashboard showing VM, Physical, and Container types with storage info and anomalies for Cohesity and Veeam platforms.

In addition, Predatar continues to offer both dark and light display modes, so you can choose the right visual settings for you and your environment.

Accessibility isn’t an afterthought — it’s becoming foundational to the Predatar experience.

What’s next?

This is just the start. The Predatar team will continue to enhance the user experience. With each update, the platform will become more powerful, more intuitive and easier to navigate.

To be among the first to hear about upcoming releases. Follow Predatar on LinkedIn, or join our mailing list for updates delivered straight to your inbox.

Learn more about
Predatar recovery assurance

05 January 2026

Your Backups: The Upside Down of Resilience

As the dust particles settle on the epic finale of Stranger Things, we can’t help but see some parallels between Hawkins and a typical enterprise storage and backup environment. Bet you’ve been thinking the same thing, right?

Your Hawkins

The world that everyone interacts with, every day. The data your employees rely on lives here, the applications they use are run from here, the systems your customers use to access your products and services are here too. Your production storage is your Hawkins.

Your digital citizens go about there everyday lives, safe in the knowledge there are people and systems designed to keep things running smoothly and to make sure the world is safe. Think of business continuity teams as the local government, and your cyber security team as Hawkins Police Department.

The Upside Down

Just like the Upside Down is a mirror of Hawkins, there’s a mirror of your production data. It’s right there, just out of sight and beyond the reach of your citizens. It’s your backup environment. A constantly evolving replica of your data world.

Almost every business has an ‘Upside Down’ and if you’re lucky, yours is free from evil. But ‘lucky’ is exactly the right word – because Predatar has uncovered malware in the backups of more than 90% of its users.

The unsettling reality is that your backups are very likely to be infected. Left unchecked, just like the Mind Flayer’s tendrils, the infection will spread. Silently, turning your backup environment into a deeply dangerous world.

The Abyss

Just like the Upside Down in Stranger Things is a bridge to access – and ultimately – to destroy the real world by plunging it into the Abyss, cybercriminals are infecting your backups as a part of a bigger, more sinister plan. They want to take your entire organisation offline and make recovery impossible.

This is the Abyss – a world of chaos and total operational paralysis.

Staying away from the Abyss

Here are 3 takeaways from Stranger Things to help you keep your organisation’s ‘Hawkins’ safe, and avoid plunging into the Abyss.


Fight evil at the source
Fighting demidogs, possessed humans, Vecna, or even the Mind Flayer itself in Hawkins was never going to be enough. Just like the heroes of Stranger Things, you’ll need to get tooled-up and go hunting in the Upside Down.

Danger comes from all angles
The Mind Flayer took on many forms, but there were other threats at play too. Dr Brenner, the Russians, and the US Government all put the safety of Hawkins at risk.

Don’t be fooled into thinking that cybercrime is the only risk to your operational resilience. Untested software updates, hardware failures, human error, natural disasters, and more can put your resilience at risk.

You need super-powers
There is at least a dozen heroes in Stranger Things. Most don’t have any superhuman abilities. We love these characters, but lets be clear – Ultimate victory against the forces of evil simply wouldn’t have been possible without Eleven.

You need to get yourself some superpowers.

What next?

Become the Eleven of resilience with Predatar – Your operational resilience superpower. Predatar hunts down and eliminates signs of danger including malware and unrecoverable workloads in your backups and snapshots before they become a real world nightmare.

Watch the video to learn more, book a demo, or send us a message.

Learn more about
Predatar recovery assurance

16 December 2025

Creeping Closer to Total Recovery Confidence with Support for Zerto.

The new Predatar Black Widow release adds support for Zerto-replicated workloads to extend recovery assurance across even more of our customers’ storage and backup environments.

Businesses need recovery confidence — They need to know that they can quickly and safely restore critical systems after incidents like ransomware attacks, data-centre outages, or any other unforseen issue. That’s our mission – to give customers total recovery confidence.

We’ve made epic strides over the last few years, but with storage environments growing ever-more complex and disjointed it’s not an easy goal to achieve. That’s why expanding platform support is essential.

Predatar already supports leading backup and storage vendors including IBM, Veeam, Rubrik, Cohesity, and Pure — and with R18 Black Widow, Zerto is now included too, taking our customer’s even closer to total recovery confidence.

Why Zerto?

Innovation at Predatar is driven by our customers. Zerto support has been one of the most frequent requests in the last 12 months – and it makes perfect sense.

Just like Predatar, Zerto is complementary to traditional backup. And just like Predatar, it’s a popular choice for organisations that take resilience seriously and understand the need for fast, safe data recovery.

Many existing Predatar customers that are already benefiting from automated recovery testing and malware scanning for their backups – are also using Zerto for continuous replication of their most critical data. Now, these customers can also validate the data they replicate with Zerto in their Predatar CleanRoom. No need for a new Predatar licence or a separate CleanRoom.

Zerto and the rise of cloud vaults

The concept of vaults, particularly as a method for protecting data from cyber-attacks has been around for a few years now, but it’s really been gaining traction in the last couple of years. Leading storage and cloud providers have productised the concept and made it easy to spin up a secure vault in the Cloud.

The Cloud vault market will continue to grow, and for businesses that are deploying vaults, Zerto is a strong choice. Zerto’s unrivalled recovery speed means that if/when an organisation needs to retrieve data from their vault – the disruption is minimised. This is useful in any scenario, but in the event of a major outage, the benefit will be huge. That’s why Zerto is built in to the HPE Cyber Resiliency Vault.

Many HPE customers are also choosing to add Predatar to their Cyber Resilience Vault. Here’s why…

What Zerto and vaults don’t do

A vault makes sure that cybercriminals can’t compromise or encrypt your data once it’s locked away. Zerto makes sure you can get the data back, fast, if you need to. But what if your data was already infected before it was replicated to your vault?

This isn’t a hypothetical question. Predatar has uncovered malware in the backups and snapshots of more than 90% of its customers. If malware is left undetected inside your vault it will seriously impact your ability to recover quickly and can even lead to reinfection of your production systems following a cyberattack.

Learn more about Predatar for Zerto

To find out more about how Predatar can give you confidence that your Zerto replicated workloads are recoverable and safe, take a look at the R18 Black Widow release page.

What’s next?

The R18.0 Black Widow release isn’t all about Zerto. It lays the groundwork for some big UI and usability updates early next year. And of course, support for more backup and storage products are the pipeline too. Sign-up for Predatar news here to stay in the loop.

Learn more about
Predatar recovery assurance

09 December 2025

Rubrik & Predatar

Do you really need both?

At first glance, it’s easy to think that Predatar’s capabilities are the same as the resiliency features that are available natively inside Rubrik Cloud Data Management.

You might hear both Rubrik and Predatar talking about things like Threat Hunting, Cyber Recovery, and Clean Rooms. So why would Rubrik customers consider adding Predatar Recover Assurance?   

This article will answer that question by focussing on 3 key areas:

1. Cost and feature availability
2. Automated recovery testing
3. Vendor and workload support

Core Functionality

Before we dig into the details, it’s important to recognise that when looking at Rubrik and Predatar, it’s not an ‘apples for apples’ comparison. Rubrik aims to be an all-in-one backup and resiliency platform. Predatar, on the other hand, doesn’t do the backup management bit. Predatar is designed to work with leading backup products, including Rubrik, to give customers unprecedented recovery confidence.

Predatar’s core purpose is to prove that all of your backups, whether they’re managed in Rubrik or another backup product, are always recoverable and free from infection. So if the worst happens, you know you’re good.

1. Cost and feature availability

When weighing up the options for boosting resilience in your backup environment, it’s important to know that many of Rubrik’s resiliency features are only available with a Rubrik Enterprise Edition License.

Rubrik customers on the top subscription tier – Enterprise Edition – will benefit from one of the most comprehensive cyber resiliency toolsets on the market with features including data classification, advanced threat hunting powered by Google’s Mandient threat intelligence, SIEM integrations and Cyber Recovery Simulation.

However, Rubrik customers with Foundation Edition or Business Edition licenses will likely find that the resiliency features that are available to them are pretty basic.

Check out our features comparison and FAQ for more detail.

Upgrading your Rubrik Subscription:

For lower-tier Rubrik customers with a need to boost resilience, upgrading your subscription is the obvious option. While we can’t say exactly what the cost of upgrading your Rubrik subscription would be (your price will be specific to your organisation and dependent on several factors), a Foundation Edition customer should expect to pay something in ballpark of an additional 40-50% to switch to an Enterprise Edition licence.


In most cases, the cost to add the Predatar Recovery Assurance platform to you existing Rubrik backup will be significantly lower. What’s more, Predatar doesn’t have complicated subscription tiers. Your Predatar price is based on the size of your backup environment, and all of our features (even the really cool ones) are available to all of our Recovery Assurance customers.

If you’re a Rubrik customer, a Predatar subscription is a great way to add features like enterprise grade anomaly detection, and threat hunting (powered by Trend Micro Vision One) to your backup estate. Not to mention our totally unique automated recovery testing and deep malware interrogation. Let’s talk about that now…

2. Automated recovery testing and deep malware interrogation

Continuous, pre-emptive testing in a CleanRoom environment is what really sets Predatar apart. Predatar is all about proving that your data is recoverable, proving that it can be recovered quickly, and proving it’s free from malware. So, if the worst happens – like a natural disaster, cybercrime incident, or another type of IT outage – you know you’re recovery will be effective.

When it comes to Recovery Assurance, there is no other product on the market that does it as thoroughly, or as easily as Predatar does.

Predatar customers don’t wait for a cyberattack, or even for a threat alert to validate their data is recoverable and clean. They do it every day.

With out-of-the-box automations that can be set-up with a few clicks, Predatar can be up and running in under an hour. Once live, it’s always-on, continually recovering your backups into the CleanRoom, powering them on, and interrogating them for malware – 24 hours a day, 7 days a week.

The result?… Predatar has found malware in the backups or snapshots of more that 90% of its customers. The reality is, regardless of which backup product you use, you probably have malware hiding in backups. If you use immutable snapshots, you might have malware in those too. We’ll talk about multi-vendor and multi-workload support in just a minute.

What about Rubrik Cyber Recovery Simulation?

Rubrik customers looking to achieve a similar capability to Predatar’s automated Recovery Assurance can use Rubrik’s Cyber Recovery Simulation (Enterprise Edition licence required) as a starting point. While this does enable users to validate backups for recoverability, integrity, and cleanliness in an isolated sandbox, there is no out-of-the box automation. Users must manually select the workloads they want to test. Automation is only be possible with custom scripting using Powershell modules or third-party tools like Ansible or Terraform. You’re going to need specialist skills in-house to build and maintain these workflows.

So, what is Rubrik’s Clean Room Recovery in the Cloud?

It’s easy to see why there is a common misconception that Rubrik’s Clean Room Recovery, created in partnership with Google, provides the same capability as Predatar’s CleanRoom. But there is a very significant difference.

The Rubrik/Google CleanRoom is a reactive tool. In a cyber incident, every second counts. This Clean Room solution is designed to ensure that Rubrik customers can restore data into a safe, secure, location in the cloud immediately when an attack is detected – and quickly begin forensic analysis – using Google’s Mandiant threat intelligence tools.

Predatar flips this model. Your Predatar CleanRoom is always-on, continually validating the integrity, recoverability and cleanliness of your data. And if the worst does happen – you can switch your CleanRoom to ‘Response mode’ and use it for post-attack analysis too.

3. Vendor and Workload Support

Backup application support:

Rubrik’s threat detection and resiliency capabilities are designed exclusively for, and are built into the Rubrik platform. This is great from a simplicity point of view, particularly if your organisation is ‘all-in’ on Rubrik. For Rubrik customers that don’t have important data or critical IT systems backed-up using other backup platforms, Rubrik’s own resiliency features may be adequate.

For organisations with more than one backup solution in play, Predatar is a strong choice. Predatar is vendor-agnostic. It works with backup platforms including Veeam, IBM Storage Protect, IBM Defender Data Protect, Cohesity – and of course, Rubrik too.

Additionally, Both Predatar and Rubrik can also be used to boost data resilience on some primary storage platforms too. Both can be used with Pure Storage, while Predatar also supports IBM FlashSystems.

For organisations with complex storage environments, Predatar provides a standardised approach to recovery assurance and across different systems. There’s also the added benefit of a centralised user interface for management and reporting.

Workload Support:

Rubrik’s resiliency features focus primarily on virtualised workloads, however it does provide integrations for files servers, M365, and Oracle workloads too.

Predatar supports full validation of Windows and Linux VMs, physical servers, AIX workloads and SQL databases too. If your organisation has important data and systems running on these workloads, you should consider deploying Predatar to continuously validate they are clean and recoverable.

Final Thoughts

While Rubrik’s cyber resilience features are arguably the most innovative and robust of the big backup vendors, many of them are reserved for their top-tier customers only. Additionally, they can only be used for the workloads in your Rubrik cluster. You should consider adding Predatar if:

#1. You have business critical data backed-up on platforms other than Rubrik.

#2. You want the benefits of advance resiliency features, but you’re not a Rubrik Enterprise customer.

#3. You have a requirement to prove your ability to recovery quickly, cleanly, and completely.

#4. You simply want the piece of mind that comes from continuous, pre-emptive Recovery Assurance.

Want to dig deeper?

Take a look at our Rubrik & Predatar features comparison table and FAQs.

It’s easy to get started with Predatar

A Predatar Recovery Assurance Platform can be deployed and configured for your Rubrik environment in under an hour. Contact our team here, send us an email at hello@predatar.com or book a demo to start your journey to recovery confidence.

Keep us honest:
At Predatar, we make every effort to ensure our content is accurate. If you believe anything in this blog is misleading, incorrect, or out-of-date, please let us know.

Learn more about
Predatar recovery assurance

21 November 2025

A Ghost in the Machine

Ransomware files were found hiding just out of sight in the backups of a European insurance company. They had been there, undetected, for almost 2 years.

On a quiet Friday afternoon in November, a small team from a major European insurance company were reviewing the results of a routine recovery test. They had recently introduced Predatar as part of a broader effort to strengthen their cyber resilience. Until then, they had relied heavily on their annual disaster recovery exercise as evidence that their environment could be recovered if needed. It was a long-established practice, familiar and predictable, but it had not kept pace with the reality of modern cyber threats.

Traditional disaster recovery procedures are built for outages and physical disruption. They focus on restoring services by failing over from one site to another. This approach works when the threat is external to the data. It does not work for ransomware. By the time an organisation triggers a failover from Site A to Site B, the ransomware has usually already replicated itself across both. Cyberattacks require a completely different mindset. Recovery must prove that the data itself is clean, safe and fit to return to production.

This was the reason the company had failed its recent cyber resilience audit. They had no reliable way to perform regular recovery testing. The engineering effort required to stand up clean environments, restore data, analyse behaviour and run malware scans was far beyond what their teams could sustain manually. In practical terms, they had no means of validating the integrity of their backups.

When they evaluated their options, Predatar stood out. It worked across all major backup and storage technologies, including the Veeam and IBM FlashSystem platforms already in place. It provided automated cleanroom validation at a scale that would have been unrealistic to achieve manually. Most importantly, it allowed the company to begin performing daily recovery tests, something that had previously been impossible.

They began with a small but critical subset of their systems, referred to internally as their Minimum Viable Company. These were the essential servers they would need to restore first in the event of a cyberattack in order to re-establish a basic, functioning version of the business. The early results were consistent, reliable and easy to interpret. They quickly took the decision to expand the testing to all backups and all servers.

Only a week after the full rollout, an automated recovery test inside the isolated CleanRoom surfaced something unexpected. Within a restored workload, Predatar identified encrypted files and a ransomware note. The files were not new, but they were remnants of a previous incident.

The company investigated and confirmed that they had suffered a ransomware attack two years earlier. A specialist incident response provider had managed the remediation at the time. However, this particular server had not been included in the cleanup. As a result, the encrypted files and the ransom note had remained unnoticed in production for almost two years.

The location of the server was also significant. It hosted the organisation’s SIEM and wider SecOps platform. Despite being a central point for security monitoring, neither the platform nor the additional security tools running on it had detected the remnants of the old attack.

The finding prompted a broader realisation. If this evidence of ransomware had remained hidden on a highly visible system, similar issues could easily exist elsewhere without detection. The value of continuous recovery testing became immediately clear. It provided visibility not only into whether data could be restored, but whether that data was genuinely safe.

Predatar’s ongoing analysis has shown that hidden malware is present in the backup data of the vast majority of organisations, with discoveries in more than ninety per cent of customer environments worldwide. This does not reflect a failure of security teams. It reflects the sophistication of attackers, the complexity of modern infrastructure and the limitations of relying on a single set of tools to identify every threat.

For the insurance company, continuous recovery testing is now a fundamental part of their cyber strategy. They have moved from annual exercises to daily assurance. They can verify the integrity of their backups with confidence. And they have a far clearer understanding of what it takes to recover safely in a world where cyberattacks often unfold long before they are detected.

Hunt down and eliminate recovery threats in your backups and snapshots.

To discover how you can start pre-emptive recovery testing in an easy to deploy Recovery Assurance CleanRoom, watch this short explainer video or contact the Predatar team.

Learn more about
Predatar recovery assurance

05 November 2025

Reunification, Reinvention and Resilience.

Author: Alistair Mackenzie.

Within a year of the Berlin Wall coming down, two former East German soldiers set about building a new business. Fuelled by the optimism of the era and a passion for technology, ADICOM© was born. 35 years later, it’s one of the most innovative storage and backup businesses in Germany, leading the way with ground-breaking recovery assurance services.

This week I took some time out to reconnect with two people that continue to drive the ADICOM© business forward every day. Chris Hogrefe [IT System Specialist] and Ralf Brummack [Chief Marketing Officer] told me the story behind ADICOM© and explained how they have embraced the bold optimism of the founders.

The Story Begins

Frank Lasinski and Peter Schulz met during their time in the military. They shared an interest in technology and studied computer science during this time. By the time Germany was reunified in 1990, the pair had become firm friends. Within a year of the Berlin Wall coming down, they had left the army to set up their own technology business in the south of Berlin.

In the early years, ADICOM© was a technology broker, specialising in reconditioning and selling the big IBM enterprise systems of the day – like Mainframe and AS/400.

More skills. More recognition. More customers

As the team grew, so did its expertise. The company’s ambitions grew too. By 1995, ADICOM© was recognised as a leading expert in IBM technology and became an authorised IBM Business Partner in Germany, authorized for AS/400, IBM Storage, IBM INTEL based servers and IBM Printing systems.

The team began reselling new IBM systems to medium and large enterprises in Berlin and beyond, expanding their capabilities to incorporate IBM AIX and Power systems.

Ralf Brummack explained: “Frank and Peter have always been quick to recognise new opportunities and move fast. They encourage us to do the same. We’re proud to be early adopters of innovative technologies that we know will make a difference to our customers.” 

When IBM moved into the backup software space with the acquisition of Tivoli, including TSM (Tivoli Storage Manager), ADICOM© was right there.

As well as reselling TSM (later renamed as IBM Storage Protect) ADICOM© launched managed backup and recovery services with TSM under the hood. Led by Chris Hogrefe, ADICOM©’s backup service offerings have proven to be popular with existing ADICOM© customers and have helped the business attract new clients too.

Evolution with Predatar

Backup sales and services were a great driver for growth at ADICOM© for more than a decade, but times have changed. “You can no longer grow a business selling backup products and services” Chris explains. “Today everyone has a backup solution in place, and for big businesses, moving to a different one is really hard and, in most cases, too expensive.”

Always looking for the next evolution, Chris was actively searching for ways to move ADICOM©’s backup services forward – to add more value for customers, and more differentiation in the marketplace. When he discovered Predatar at IBM Storage Expert event in Augsburg (Germany) in 2022 he knew it would be the beginning of something exciting.

Following an intensive hands-on technical bootcamp with the Predatar Team in UK, Chris and his team wasted no time in building the ADICOM© Data Resiliency Service (ADRS).

Data Resiliency with ADICOM©

ADRS, powered by Predatar is available to businesses that use IBM Storage Protect or IBM Defender Data Protect backup software. Additionally, ADICOM© can also deliver this unique service for Veeam users too.

With ADRS, ADICOM© will take care of the day-to-day maintenance of your backup environment, ensure that all of your backup runs are successful, and fix any problems. But the real differentiation comes in ADICOM©’s ability to run continual recovery tests and malware interrogation. This capability is achieved with the Predatar Recovery Assurance platform and gives ADICOM© customers complete confidence in their ability to recover quickly, cleanly and completely in the event of a cyber incident.

What’s next for ADICOM© ?

35 years on, the original founders of ADICOM©, Frank Lasinski and Peter Schulz remain active in their leadership of the business, and it’s clear from my conversations with Ralf and Chris that their bold approach to innovation, their passion for technology and their optimism for the future has become infused into culture at ADICOM©.

When I asked, “what’s next for ADICOM©?” the answer was simple. Chris explained “We’ll keep on innovating with a very clear focus. We want to be the best at what we do. We want to offer the very best storage and recovery solutions to tackle the challenges facing businesses in Germany today.”  

Boost your data resiliency with ADICOM© 

If boosting resiliency in your business is a priority, you can find out more about ADICOM© at www.adicom.group or email the team at consulting@adicom-group.de 

Find an APEX partner near you.

The Predatar APEX program is a global network of service providers with elite data resiliency capabilities. Find an APEX partner in your region here.  

Learn more about
Predatar recovery assurance

30 October 2025

How To Avoid a Digital Bloodbath

At Predatar, we’re getting into the spooky season by watching some of our favourite scary movies. Here are five lessons from the original 1996 Scream movie to help you avoid a digital bloodbath.

⚠️ Warning! This blog contains spoilers. But seriously, if you haven’t seen Scream, where have you been for the last 29 years?

Locking the door isn’t enough

Countless times in this classic slasher movie, a door is locked to keep the killer out – but moments later, he’s inside, knife in hand, ready to strike. If you’ve seen Scream, you’ll know how he does it, but that’s not really important here. The point is this:

If someone really wants to get inside, they will.

Cybercriminals are just as determined, creative, and motivated. You might think your IT perimeter is locked down with leading enterprise cybersecurity tools, but the evidence tells us these defences are far from infallible – especially when you consider that over half of ransomware attackers use compromised login credentials to gain access to critical systems.

Hackers don’t hack anymore. They log in.

Lesson #1: Prepare for the breach. You need to know exactly how you’ll respond when the bad guys get in – because we all know that running up the stairs in a panic never ends well.

Anyone can be next

Just as certain industry sectors are at high risk from ransomware attacks, the Ghostface slasher in Scream has a “type”. Most of his victims are teenage girls (and their boyfriends), but there are a few exceptions. Principal Himbry of Woodsboro High School, for example, meets a particularly messy end when he’s stabbed in his office and left hanging from the football goalposts.

Does his murder drive the plot? Not really. But it adds tension, and reminds us that the attacker is calling the shots. He’s unpredictable. Anyone could be next.

When it comes to ransomware, the same is true. While industries such as manufacturing, financial services, healthcare, and utilities are at highest risk, the reality is that any organisation can be hit.

Lesson #2: Don’t be complacent. Face up to the fact that your organisation could be a target.

Attackers do their homework

In the opening (and, in our opinion, the most intense) scene, the phone rings. The sinister voice on the other end walks Casey through a sequence of ‘games’, culminating in the gruesome deaths of her and her boyfriend, Steve. The double murder takes just minutes to play out – but it’s been planned impeccably.

The attacker knows everything about the victim and her home. He knows the floor plan. He knows where the exits and light switches are. He even knows how she’ll react to certain triggers.

Just eleven minutes after Casey first picks up the phone, her disembowelled body is hanging from a tree while her boyfriend sits duct-taped to a deckchair, his vital organs exposed. But here’s the thing, for that attack to run like clockwork, there had to be weeks of surveillance and planning.

That’s the modus operandi for ransomware attackers, too. They conduct detailed reconnaissance before executing a clinical and devastating attack.

In more than 90% of ransomware incidents, surveillance tools such as keyloggers and infostealers have been found inside victims’ systems. If you can catch attackers in this reconnaissance phase, you can stop an attack before it begins.

Lesson #3: Assume you’re already under surveillance. Look for the digital clues of hacker reconnaissance in your IT environment – every day.

The odds are against you

For the masked slasher, each murder is a game – but it’s a game he’s designed himself, so the odds are stacked in his favour. This is best illustrated when he tells Sidney,

“I ask a question… Get it wrong, you die. Get it right, you die.”

All too often, ransomware attacks are lose–lose situations too. Paying the ransom doesn’t guarantee anything. Of the organisations that pay, only 8% get all of their data back.

Worse still, double extortion is now commonplace. Even if you’re “lucky” enough to have your data decrypted after paying a ransom (which typically costs more than $1 million USD), the attackers may deliver a second ransom demand – threatening to publish your sensitive data on the dark web.

But – big spoiler alert –Sidney doesn’t die. She outsmarts the attackers. She refuses to play their game. And you can too.

The best way to survive a ransomware attack is to stop the game before it begins. Thanks to Predatar’s recovery-driven threat detection, you can detect and prevent attacks before they start.

Lesson #4: Think differently. Outsmart the attackers with new and innovative solutions.

Timing is everything

The attacks in Sidney’s and Casey’s homes take place when their parents are out — they’re home alone. Of course, this isn’t a coincidence; it’s an integral part of the killer’s plan.

Ghostface strikes at carefully chosen moments to maximise his chances of success and minimise the risk of intervention.

Cybercriminals do the same. It’s no coincidence that there’s a spike in reported cyberattacks during public holidays, when most organisations are shut down or operating with skeleton staff (Halloween pun not intended).

A rapid response to an active cyberattack dramatically reduces its impact. In a cyber crisis, every minute counts. But when your staff – including IT and security teams – are offline, those response times are significantly extended.

Lesson #5: Act now. The biggest holiday season of the year is just weeks away, but it’s not too late to stop an attack with pre-emptive, recovery-driven threat detection.

Join the next Predatar Webcast – and avoid a digital bloodbath

Join the next Predatar webcast to:

  • Hear about a real world use-case where hacker’s surveillance tools were uncovered inside a customer’s storage environment thanks to pre-emptive data validation.
  • Discover how automated recovery testing and malware interrogation in a CleanRoom can stop cyberattacks, before damage is done.
  • Learn how you can deploy your own Recovery Assurance CleanRoom quickly and easily.

Predatar event promotion: Stop the Boom! Before It Happens with tech presenters on Nov 19.


Learn More and Register Now







Learn more about
Predatar recovery assurance

15 October 2025

Say Yes to Hard Problems

Why STORServer and Predatar Are Building the Future of Resilience Together.

All too often, companies stick to what’s easy. They take the path of least resistance. But the history of STORServer is different. For more than 30 years, the company has built its reputation on saying “yes” to the hard problems – tackling the complex, stubborn challenges that other vendors would rather avoid. Why? To make life simpler for their customers.

That ethos has shaped STORServer into what it is today: a trusted partner to organizations that depend on backup and recovery not just as a compliance checkbox, but as the lifeline of their business. And it’s why the company’s partnership with Predatar feels less like a transaction and more like a shared mission.

Built on a Big Idea: Simplifying Backup

When STORServer was founded in Colorado in the mid-1990s, backup was overwhelming for most IT teams in a small and mid-sized business. Dropping in massive, complex systems was a recipe for frustration.

STORServer’s solution was radical in its simplicity: deliver pre-configured appliances that worked out of the box, with built-in tools and responsive support. Customers could finally stop wrestling with backup and start trusting it.

That commitment to simplicity, backed by deep technical expertise, became STORServer’s DNA. It’s a mindset that Predatar shares, as both companies look to simplify one of today’s hardest challenges in IT: building cyber resilience.


Legacy Matters. But So Does Innovation

One of the most powerful examples of STORServer’s “yes” mindset is its ongoing support for legacy systems like VMS. While many backup vendors have walked away from supporting those environments, STORServer still invests in building and maintaining tools to protect them.

As Scott Jangro, STORServer’s Head of Operations, put it:

“Supporting those legacy systems is important for us. We’re still actively developing VMS backup clients so customers can work those systems into their overall strategy.”

At the same time, STORServer isn’t standing still. With Predatar, the company is now applying its proven appliance model to cyber resilience, creating clean room recovery appliances that make one of today’s most complex challenges—bouncing back after a cyberattack—far more manageable.

A Meeting of Minds: Fresh Perspectives and Deep Roots

STORServer’s story is not just about technology, but about people. After decades of leadership that began with six founders – three of whom continue to guide the company today – Jangro has stepped in to help to take the business into its next era. His background – spanning SaaS, startups, and product marketing – brings a fresh perspective that complements the deep experience of the long-standing team.

He sees his role as asking the hard questions, just as Predatar’s leaders once did when they challenged traditional views of backup.

“There’s only upside in bringing in a fresh pair of eyes,” Jangro said. “Asking questions, identifying things that maybe haven’t been thought of—that’s how we move forward.”

It’s this balance of deep heritage and fresh energy that makes the Predatar and STORServer partnership so powerful.

Saying Yes Together

At its heart, the partnership between Predatar and STORServer is about giving customers confidence in a world that’s only getting more complex. STORServer’s legacy is built on decades of saying yes to tough backup problems. Predatar exists to tackle the hard new problem of cyber resilience.

Together, they’re offering businesses something unique. STORServer’s new Cleanroom Appliance ships with Predatar’s unique Recovery Assurance capabilities baked-in.

If you’re looking to remove the complexity of cyber resilient backup and recovery in your organisation, ask the team at STORServer if they can help.

I think we all know the answer is yes!


Learn more:
Discover STORServer’s cyber-resilient backup appliances, powered by Predatar here or contact the STORServer team today!

Learn more about
Predatar recovery assurance