Predatar’s APEX partner program is so much more than a traditional reseller channel. It’s built on the foundations of a long-standing, multi-disciplinary collaboration with Empalis Consulting GmbH, and the result is a global community of exceptional collaborators. In this interview, Markus Stumpf, Business Development Manager at Empalis, explains what it takes to be an APEX partner, and why you should talk to one if cyber resilience is a concern in your business.
Predatar: How did the partnership between Empalis & Predatar first come about?
Markus: It started almost 10 years ago. At the time, we were on the verge of launching our first managed backup and recovery service. Until then, Empalis had focussed on consulting and one-off engineering projects. It was an exciting time, but like any new venture, it was also a bit of risk. Would the service be a success? and if it was, could we scale it?
I met Alistair (Mackenzie, Predatar CEO) by chance at an IBM Storage conference in Las Vegas. He told me about Predatar, and I could instantly see how the automation and reporting features could help us. By automating daily reporting and other repetitive tasks, our service engineers could bring value to more customers.
Predatar:How did this partnership evolve?
Markus: Once we started using Predatar, our team began to see opportunities to enhance the platform further – to deliver even more value for our customers. Since the beginning, the Predatar team has actively looked for feedback, and we were more than happy to share our insights and ideas.
It soon became obvious that we would be great collaborators. We would challenge one another’s ideas and push the boundaries together. Before long, we were having a direct influence on the Predatar product roadmap, and Predatar was helping to shape the future of Empalis too.
Predatar:Can you give an example of how you’ve influenced the innovation of the Predatar Platform?
Markus: There are so many features and functions in Predatar that Empalis has influenced, but let me tell you about one of the more significant collaborations.
Today, Predatar is known for its innovative CleanRoom. In my opinion, it really is the most advanced Cyber Recovery Cleanroom solution available today. But let’s rewind a few years, before Predatar’s CleanRoom was even a spark of an idea.
I met with Alistair (Mackenzie) for a catch-up while he was in Germany on business back in 2019. We met in a small meeting room in Stuttgart. We weren’t intending for the session to be an R&D workshop, but by the time we were done, we’d mapped out the architecture of what would become Predatar’s first generation CleanRoom on a whiteboard.
Predatar: How else have you supported Predatar’s R&D?
Markus: Innovation at Predatar is rapid, but balancing this with rigorous testing has been a challenge for the Predatar team. We’ve been really happy to get hands-on and support with QA and usability testing. We want to get the latest tech to our customers, fast – but not before my team has put it through its paces – so this is a win, win.
Last year, Predatar formalised this process. They now run an Early Access Program (EAP) where Empalis and other APEX partners can test-drive new features. We’ve been putting CleanRoom 3.0 through its paces. Predatar’s third generation of Cyber Recovery Cleanroom will be a game-changer, making Recovery Assurance achievable for many more businesses.
Predatar:How has Predatar shaped Empalis?
Markus: Around 2 years ago we launched Viking Backup Guardian, our flagship managed backup and recovery service with Predatar baked-in. The service provides an immutable copy of customer’s backup data in our cloud, which we proactively verify for recoverability and cleanliness in a Predatar CleanRoom.
What our customers love about this service is that it takes away the cost and complexity of CleanRoom setup, it’s scalable – so you only pay for what you need, and it’s completely managed. Empalis will deal with all the day-to-day operational stuff.
When we launched Viking, it was totally unique, and even today, with the exception of other Predatar APEX partners, I’m not aware of any MSPs that offer anything similar.
Predatar:Can you explain a bit about the APEX program?
Markus: It’s no secret that Predatar has designed the APEX program with an ambition to replicate the success of the collaborative relationship between Predatar and Empalis. You could say that our partnership has been the blueprint for the program. Today, there are 24 Apex partners globally.
Of course, like any channel program this helps Predatar access markets around the world – but APEX is about so much more. The selection criteria is rigorous. APEX partners must demonstrate they have the vision and capabilities to deliver world-class, value-added services with Predatar under the hood.
Any IBM channel partner can resell Predatar, but only APEX partners are authorised to integrate Predatar into their own products and services.
Predatar:What’s next for Empalis and Predatar?
Markus: We will continue to help more and more customers achieve recovery confidence with the Empalis Viking Guardian service. But when it comes to innovation, anything could happen. Ask me again after our next whiteboard session!
To find out how Markus and the team at Empalis can help you manage complexity and boost data resilience in your organisation, contact them here.
A common question we hear is; should you build a cleanroom or invest in an off-the-shelf (productised) solution? This article explores the pros and cons of each approach and provides a simple decision tree to help guide your choice.
This discussion assumes that you intend to use a cleanroom for proactive recovery testing rather than solely for post-attack recovery. While productised solutions can expedite deployment after an attack, their primary strength lies in pre-emptive recovery testing and assurance.
Cleanroom customisation
If your environment requires significant customisation, building your own cleanroom might be the best option. A DIY solution allows for precise tailoring to your infrastructure, whereas productised solutions are designed to serve a broad market.
For example, if your workloads include mainframes or iSeries systems that productised solutions do not support, a self-build approach may be your only choice. However, if your environment primarily consists of virtualised workloads—such as VMware, Windows, and Linux file systems—then a productised solution is a viable and often preferable option.
CleanRoom Security
For organisations operating dark sites with no permissible cloud connectivity, a DIY approach may be necessary. Many productised solutions rely on cloud-based control planes for features like AI-driven anomaly detection, and losing this connectivity can limit their effectiveness.
However, an isolated environment comes with trade-offs. Without internet access, you forfeit real-time malware definitions, security updates, and continuous product enhancements—features that productised solutions deliver automatically.
Cleanroom Automation
Productised cleanrooms benefit from advanced workflow automation that optimises resource allocation for recovery testing and malware scanning.
A key component of modern recovery assurance solutions is the use of data lakes and AI/ML models to prioritise anomalies for deeper analysis. The best cleanroom solutions leverage feedback learning to refine anomaly detection and minimise false positives over time.
If you lack in-house data scientists and software engineers, a DIY solution will likely lack the automation and orchestration capabilities of a commercial product.
Cleanroom ease-of-use
If ease of deployment and maintenance is a priority, a productised solution is the clear choice. Here’s why:
Rapid Deployment – Modern cleanroom software can be deployed in under a day using standard infrastructure.
Automated Security Patching – Productised solutions can integrate with repositories like GitHub, continuously downloading updates and enhancements to stay ahead of emerging threats.
Vendor Support & Testing – Purchasing a product means gaining access to enterprise-grade testing, support, and maintenance. Many organisations opt for productised solutions to offload the burden of software development and patching.
Summary & Decision Process
For comparable costs, a productised solution will always provide a more feature-rich and automated cleanroom for supported workloads. Security concerns may restrict the use of some cloud-dependent cleanrooms, but some vendors offer private cloud deployments as an alternative.
As adoption increases and cleanroom solutions become more mainstream, productised offerings will continue to improve while costs decline, making the build-your-own approach increasingly less viable.
By following this structured approach, you can determine the best path forward for implementing a cyber recovery cleanroom tailored to your organisation’s needs.
Learn about Cyber Recovery Cleanrooms from Predatar
Predatar is a leader in Recovery Assurance technology. Our unique CleanRoom solution provides preemptive recovery testing and advanced malware scanning for backups and snapshots from many leading storage vendors including Veeam, Rubrik, IBM, Cohesity and Pure – with support for more technologies on the way.
Complex, multi-vendor storage environments don’t need complex, multi-vendor resiliency tools. In this short blog, we look at the benefits of unified Recovery Assurance with a centralised CleanRoom.
What is Recovery Assurance?
Put simply, Recovery Assurance is the process of validating that IT systems can be successfully restored following a data loss event.
By far, the most common type of significant data loss scenarios today are cyberattacks. That’s why there’s a new breed of Recovery Assurance technologies emerging, designed to verify that backups are recoverable and have not been compromised before they are used to restore production IT systems.
You can learn more about the different types of solutions in the Recovery Assurance Buyer’s Guide.
What is a Cyber Recovery Cleanroom?
Cyber Recovery Cleanrooms are an integral component of Recovery Assurance, and are quickly becoming seen as an essential tool for cyber resilience. Essentially, a cleanroom is a secure, isolated environment where potentially harmful data can be analysed and validated without putting other IT systems at risk.
Typically, cleanrooms are seen as reactive tools that are only utilised when a large scale recovery is required. Predatar is leading the way with a new generation of pre-emptive cleanroom technology that automates continuous recovery testing and advanced malware scanning on backups and snapshots. This means that when a cyber incident hits, Predatar users already know that their backups (and primary snapshots) are recoverable and free from malware.
What is Unified Recovery Assurance?
Many of the big backup and storage vendors offer data resilience solutions including cleanrooms, anomaly detection and more. In most cases these solutions are designed to work solely with the vendor’s own products. For example, Veeam’s SureBackup solution is designed to validate the recoverability of Virtual Machines backed up with Veeam’s Backup and Replication platform, IBM’s Storage Defender Cleanroom architecture is intended to validate IBM SafeGuarded Copies and IBM Defender Data Protect backups, while Rubrik’s Cyber Recovery toolset is built to orchestrate recoveries on data backed-up in the Rubrik Security Cloud.
Predatar’s Recovery Assurance technology is different. It has been designed to provide data validation across multiple workload types, on both primary storage and backup storage, and is vendor-agnostic. That means that Predatar users can run automated recovery testing and advanced malware scanning across complex storage environments in a single, centralised CleanRoom – with just one Predatar subscription.
What are the benefits of Unified Recovery Assurance?
Benefit 1. Simplicity
Fragmented storage, doesn’t have to mean fragmented recovery. By choosing a unified approach to Recovery Assurance, IT and Security teams can simplify day-to-day management of resiliency and gain greater observability though a holistic approach to data validation.
As well as daily operations, greater simplicity will really make a difference during incident response too. Coordinating high-stakes recoveries, with complex interdependencies is always going to be stressful, but with a unified Recovery Assurance solution, automated recovery sequences can be pre-defined and tested in preparation for a cyber incident.
Benefit 2. Cost
While some storage and backup vendors include data resilience features within their products, often they are not part of the core licensing/subscription plans. In many cases these features will only be available as upgrade options or to customers on premium plans.
It is worth contacting your backup and storage vendors to understand what tools are available to you, but for organisations that have multiple storage and backup products in play, achieving resilience across all platforms could quickly become costly. You’ll also need to consider the additional training and resources required to learn, manage, and maintain multiple tools.
Predatar’s unified, vendor-agnostic approach to Recovery Assurance means Predatar customers can achieve parity of resilience across multiple platforms and technologies with a single solution.
Benefit 3. Future-proof
Technologies are always evolving. New storage products come to the market, while others are retired. Trends change. From tape storage, to mainframe, to Virtual Machines, to containers… How you store your data today might not be how you store it tomorrow.
With a unified, vendor-agnostic approach to recovery assurance, organisations can future-proof their investment, safe in the knowledge that if their storage solutions change, their CleanRoom won’t need to.
Predatar’s approach
Predatar is on a mission to give organisations complete recovery confidence. Our unique Recovery Assurance platform uses automation and AI to continually prove that your backups and snapshots are always recoverable and free from hidden malware. Here’s how:
With a single Predatar subscription, and one centralised Predatar CleanRoom, Predatar customers can validate Virtual Machines, Databases and files systems backed-up by Cohesity, IBM Storage Protect/Plus, IBM Storage Defender Data Protect, Rubrik, and Veeam. Immutable snapshots from IBM FlashSystem, and Pure Storage can be checked too.
Find out how Predatar can simplify Recovery Assurance in your organisation. Book a demo today.
Today, cyber threats are sophisticated, they are evolving and they are relentless. While traditional cybersecurity measures focus on preventing attacks, the inevitability of a data breach necessitates a robust cyber resilience strategy. This approach emphasises not only prevention, but also the ability to respond to, recover from, and learn from cyber incidents. Achieving true cyber resilience requires a collaborative effort across various departments, particularly between storage and security teams.
The Shift from Cybersecurity to Cyber Resilience
Historically, organisations have concentrated on building their defences to prevent cyber breaches. However, recent trends and regulatory requirements underscore the importance of accepting that breaches will occur and preparing accordingly. This shift moves organisations from a purely preventive stance to one that also prioritises response and recovery.
The National Institute of Standards and Technology (NIST) Cybersecurity Framework exemplifies this approach. The framework outlines five core functions:
1. Identify: Understand and manage cybersecurity risks.
2. Protect: Implement safeguards to ensure service continuity.
3. Detect: Develop activities to identify cybersecurity events.
4. Respond: Take action regarding detected cybersecurity incidents.
5. Recover: Maintain plans for resilience and restore impaired capabilities.
Traditionally, organisations have focused heavily on the first three functions. However, the increasing complexity of cyber threats and regulatory mandates necessitate a stronger emphasis on the Respond and Recover functions—a shift known as ‘shifting to the right.’
The Cyber Resilience Gap
Cybersecurity teams meticulously monitor metrics including patch rates, incidents raised, and mean time to fix. Meanwhile, IT operations and storage teams prioritise system availability and downtime reduction. Yet, few firms rigorously track recovery metrics, creating a cyber resilience gap.
Predatar’s data reveals that organisations recover less than 1% of their data annually, and 1 in 14 backup recoveries is compromised. This stark reality highlights the gap between firms’ cybersecurity measures and their actual ability to recover from cyber incidents.
Barriers to Closing the Cyber Resilience Gap
Security officers and organisations may not conduct extensive data storage recovery testing due to:
1. Resource Constraints: Recovery testing requires time, manpower, and budget, which may be deprioritised.
2. Perceived Low Risk: Many organisations assume their backup processes are sufficient without rigorous testing.
3. Complexity: Recovery testing is intricate and requires simulated disaster scenarios.
4. Responsibility Challenges: Coordination between IT, security, and management can be difficult, hindering testing efforts.
Whose Role is Cyber Resilience?
Cyber resilience is a team effort, requiring coordination across departments. Here’s how different roles contribute:
Role
Responsibility
CISO
Oversees cybersecurity strategy and ensures response plans are in place.
IT Security Team
Develops technical recovery strategies and validates system integrity.
Storage & IT Operations
Manages backup systems, ensures redundancy, and restores data.
Incident Response Team
Coordinates containment and investigation efforts post-breach.
Legal & Compliance
Ensures regulatory alignment and manages compliance issues.
Communications & PR
Handles external communication in case of breaches.
Closing the Gap: A Cyber Resilience Framework
To enhance cyber resilience, organisations should focus on two key areas: Recovery Speed and Data Integrity.
1. Recovery Speed
Prioritisation
Organisations should identify the critical business systems that make up their Minimum Viable Business —those essential for operational continuity. Recovery Assurance software can automate recoveries based on prioritisation and reduce resource waste.
Early Detection
Security teams should integrate data storage systems into Security Orchestration, Automation, and Response (SOAR) systems to improve recovery speed. AI-powered metadata analysis and storage scanning enhance threat detection.
Offline secondary backups provide air-gapped protection against ransomware.
2. Data Integrity
Storage Architecture Design
A resilient storage architecture follows five key principles:
1. Data Encryption: Protects data from unauthorised access, reducing its value to attackers.
2. Access Controls: Enforce MFA, quorum approvals, and complex passwords.
3. Three Plus Copies: Follow the 3-2-1-1-0 rule: three copies, two media types, one off-site copy, one offline, and zero errors.
4. Immutability: Prevents data tampering but requires proper implementation.
5. Air-Gap Solutions: Isolate critical data from the network to prevent malware spread.
Recovery Planning & Testing
Recovery plans should be frequently tested. New Recovery Assurance technologies including Cyber Recovery Cleanrooms with AI and automation built-in are making this achievable at scale. These solutions provide:
Randomised Testing – Periodically tests a subset of systems.
Scheduled Testing – Ensures all systems undergo recovery trials.
Event-Based Testing – Triggers tests based on security alerts or anomaly detection.
To further ensure data integrity, storage volumes should be scanned for malware during recovery.
Reporting for Continuous Improvement
Cyber resilience is an ongoing effort. Organisations should track key metrics beyond just backup success rates, including:
Recovery Time Objectives (RTOs) & Recovery Point Objectives (RPOs)
According to a recent study, ransomware payments have dropped by over a third as more victim organisations refuse to pay up. In this short article we dig deeper into the story. We ask: what’s driving the trend? And explore how organisations, like yours, can be ready to so “No” to extortion.
The study, published earlier this month by US-based blockchain analysis firm Chainalysis, highlights a significant drop in total reported ransomware payments from $1.25 billion(USD) in 2023, down to $813 million(USD) in 2024 – that’s a drop of 35%. The statistic is uncommon in the sense that overwhelmingly, studies into cybercrime tend to tell a negative story, where attacks are on the rise and the criminals are on the front foot.
Is ransomware as an attack strategy in decline?
Sure, ransom payments are down, which means less money flowing into the bank accounts of criminal gangs. This, in turn, will diminish the incentive for the attackers, and ultimately could lead to a reduction in the prevalence of ransomware attacks – but, there is no sign of that yet. It’s worth noting that while ransom payments fell last year, the number of ransom demands actually increased. This tells us that criminal gangs are continuing to succeed in breaching defences and locking down networks.
If perimeter cybersecurity measures aren’t stopping more ransomware, then what’s changed? Why are more ‘victim’ organisations choosing to take on the complex and often risky task of recovering their systems over paying to have them unlocked?
Choosing Recovery Over Ransom
In an ideal world, no organisation would pay a ransom demand. While the number that do pay is falling, Coveware’s quarterly ransomware report shows that in 25% of cases in Q4 2024, demands were paid with an average payment cost of over $550,000(USD).
So, what are the considerations to weigh up when deciding whether to pay up? And what’s changed that is shifting the needle.
The moral question: The moral question is, should your organisation fund criminal activity? Of course this sounds like a no-brainer, but rather than being a binary choice, it’s actually more nuanced. Really, it’s about balancing the ethical position of your organisation against the negative (and potentially devastating) impacts that not paying the ransom will have on your employees, your customers, and your supply chain.
The legal question: The question here is, is it illegal to pay the ransom? While there is no universal legal position on payment of extortion demands associated with ransomware, many governments around the world have put measures in place to prohibited, limit, and discourage payment. So, in some circumstances, payment the ransom is actually illegal.
As an example, The U.S. Department of the Treasury’s Office of Foreign Assets Control (OFAC) has prohibited payments to certain sanctioned organisations, including some known ransomware groups.
When it comes to similar legal sanctions, the direction of travel is clear. The European Union and 48 individual countries have signed up to the International Counter Ransomware Initiative, which states that government authorities should not pay ransomware extortion demands.
Meanwhile, the UK government has declared that a ban on ransom payments by public sector entities including schools, the National Health Service (NHS), and local councils is under consideration.
There is no doubt that these measures at a governmental level are contributing to the decrease in ransom demand payments. Essentially, in some scenarios they remove the option of payment entirely.
The confidence question: Fundamentally, choosing to pay an extortion demand, or not, is about calculating risk. The question is, how confident are you that your business can recover its IT systems quickly, and completely without the risk of re-infection?
Over the last 3 years many organisations have shifted from a cybersecurity strategy to a more holistic cyber resiliency strategy – putting processes and technology in place to ensure that if the worst happens, they are ready to mount a rapid and robust recovery.
We believe this has been the biggest contributing factor to the decrease in ransom demand payments. When an organisation is confident in it’s own ability to recover, the criminals’ leverage is removed.
Achieving Recovery Confidence
Saying ‘No’ to a ransomware extortion demand is a bold move, and if you lack certainty in your ability to recover, it could be a disastrous one. That’s where Recovery Assurance technology comes into play.
The Recovery Assurance Buyer’s Guide is a useful resource to help you understand the different technologies in this emerging marketplace and guide you towards the right ones to make your organisation ‘recovery confident.’
Predatar, for example, is designed to prove that your backups and snapshots are recoverable and infection-free – before a crisis hits. Thanks to AI and automation, you can validate your recovery plans daily, and continually check that your storage hasn’t been compromised.
In conclusion
Early signs indicate that the ransomware tide may be turning, but organisations can’t be complacent. The risks are still very real, particularly for organisations that don’t have robust cyber resiliency practices in place. By shifting from a cyber security approach to a more holistic cyber resiliency one, and investing in the right technologies, organisations can build recovery confidence and say “No” to extortion demands.
You’ve likely heard the term “Minimum Viable Product” – a concept popular in the tech startup world. But in the established enterprise, a more critical concept has emerged: the Minimum Viable Business (MVB).
This isn’t just a buzzword; it’s an important principle for ensuring operational resilience, especially in today’s unpredictable business landscape.
What Does Minimum Viable Business Actually Mean?
The term Minimum Viable Business refers to the smallest version of a business that can sustain day-to-day operations. Imagine every system and process, in every department, in your business was shut down tomorrow… which ones would need to start up again before you could ‘do business’?
For a manufacturer; production lines and supply chain operations would likely be considered amongst the most essential functions. In retail; Point of Sale transactions would be a top priority.
Think about what is absolutely essential in your organisation to ‘keep the lights on’ and you’ll begin to get an idea of your MVB.
Why is the concept of Minimum Viable Business gaining traction?
Understanding your MVP has several strategic benefits, including helping to prioritise investment, and improving operational efficiencies – but it’s not these benefits that’s driving the dramatic uptick in interest and adoption of the concept.
The driving force is cyber crime.
Minimum Viable Business and Cyber Crime?
Many businesses don’t need to imagine what it would be like if their whole business was shut down without warning. Cyber crime has made it a very real (and relatively likely) occurrence.
According to IBM’s most recent Cost of a Data Breach Report, 75% of businesses that had experienced an attack, took more that 100 days to fully recover. Less that 3% recovered in under 50 days.
The same study reports that the average cost of a cyber attack to a business is now a massive $4.88 million (USD).
By defining their MVB, businesses can be better prepared for a cyber crisis. They can prioritise the recovery of the IT systems that support their most critical systems – and importantly put their plans to the test. The goal is to significantly reduce disruption and costly business downtime, by getting core operations up and running as fast as possible.
Regulatory Compliance and The Minimum Viable Business
It’s often the case – particularly in large organisations – that regulatory compliance trumps good-practice when it comes to priorities. Put another way, businesses often do what they have to do (compliance), rather than what they should do (good-practice).
When it comes to the rapidly increasing interest and adoption of the concept of the MVB, their is no doubt that it’s regulations that have been the catalist. But in this instance, compliance and good-practice go hand-in-hand.
A raft of regulatory frameworks are coming into force around the world with an emphasis on operational resilience – DORA, HIPAA, FISMA and PRA to name a few. While none of them specifically use the term Minimum Viable Business, there is a common requirement for organisation to demonstrate a robust understanding of their critical operations and demonstrate they have measures in place to ensure they are resilient.
Validating MVB Resilience: Beyond Traditional Approaches
Assuring the recoverability for your most critical IT systems is now a necessity, but traditional approaches, such as tabletop exercises and manual disaster recovery drills, often feel like trying to hit a moving target. Not only are these methods time-consuming and resource-intensive, but they represent a point in time. The don’t accurately reflect the ever changing state of your data or the rapidly evolving threat landscape.
Today, a more proactive, data-driven approach to validating your most critical data and IT systems is needed. Automation and AI have a big role to play. They can:
Enhanced Speed and Efficiency: Automated testing accelerates the validation process, allowing organisations to quickly identify and address vulnerabilities before they can exploit weaknesses. For example, a retail business can automate tests for its order fulfilment systems, ensuring that critical order processing functions can be restored quickly in the event of a system failure. –
Proactive Threat Detection: Continuous monitoring allows for identification and response to threats, minimising downtime and accelerating recovery. –
Uncovering Hidden Vulnerabilities: Automated malware scanning plays a crucial role in identifying and neutralising malicious software that could take down your MVB. For the retail business, this would include regular scans of all systems and devices connected to their network to detect and remove any malware that could compromise customer data, disrupt online sales, or interfere with supply chain operations.
Predatar and Your Minimum Viable Business
Predatar has been designed specifically to validate that backups and snapshots are recoverable and virus free. Many Predatar customers use Predatar’s automation rules and priority node groups to continually validate their MVB systems.
Thanks for Predatar, a national utilities operator is able to validate the recoverability and cleanliness of their most important backups 24/7. For this organisation, system downtime would mean that millions of customers would be without essential utilities. You can read the case study here.
If you’re not familiar with Predatar Recovery Assurance this short video will give you an overview in less than 2 minutes.
Conclusion
In today’s threat-driven environment, organisations must embrace a proactive and dynamic approach to MVB validation. By leveraging automated testing, continuous monitoring, and advanced malware scanning capabilities, organisations can significantly enhance their resilience, minimise downtime, and ensure business continuity in the face of unforeseen challenges. This proactive approach not only protects the bottom line but also strengthens customer trust and solidifies a competitive advantage in the marketplace.
POCABAR’s journey began unexpectedly in 2014, sparked by a phone call. Wolfgang Mair, a seasoned IT professional, was approached by an old client with an urgent infrastructure issue. After resolving the problem, Wolfgang woke the next day inspired, registering ‘POCABAR’ as the company’s name. There was no initial master plan—just the resolve to deliver excellent service. However, as the business matured, a structured focus on cybersecurity and enterprise infrastructure emerged, shaping POCABAR’s unique identity.
Building a Foundation for Success
For the first two years, POCABAR thrived on organic growth, getting the “right people on the bus” and fostering a work culture rooted in collaboration and enjoyment. “Once the ship is moving,” Wolfgang says, “steering it becomes much easier.” This philosophy of adaptability and fun has been central to the company’s evolution. Starting with its core expertise in enterprise infrastructure, POCABAR developed an innovative cybersecurity strategy from the ground up.
Leading Through Innovation: The SADDI Service
One of POCABAR’s standout innovations is its SADDI Cyber Resilience Service, featuring a mobile recovery solution. This service, initially a ‘ruggedized’ rack-mounted mobile data center, allowed clients to recover operations quickly, even in remote areas. Over time, this evolved into a cloud recovery solution offering enhanced accessibility and separation of duties. These advancements ensure clients can recover securely and efficiently, particularly in today’s regulated environment shaped by frameworks like DORA and NIS2.
The adoption of automation has further cemented POCABAR’s leadership. Tools like Predatar Recovery Assurance enable POCABAR to scale its services while maintaining operational efficiency. Automated testing and validation processes have allowed the company to deliver value to clients without significantly increasing operational overhead.
A Commitment to Quality
POCABAR’s success is driven by an unwavering commitment to quality—a principle deeply rooted in its German heritage. Wolfgang emphasizes quality in every aspect of the business, from hiring practices to customer relationships. The company’s hiring process ensures cultural fit and excellence, fostering a team dynamic akin to a family. Many team members have worked together for decades, contributing to a cohesive and highly productive environment.
When it comes to customers, POCABAR prioritises those who align with its values and vision. Wolfgang describes the selection process as finding the right fit for a long-term partnership, where mutual compatibility and shared goals are essential. Clients unwilling to adopt POCABAR’s rigorously tested, single-source technology solutions are politely declined, ensuring that the company maintains its commitment to quality and seamless service. This approach fosters strong, collaborative relationships that deliver exceptional outcomes for both parties. Wolfgang cited an example where a customer wanted a particular brand of firewall to customise the SADDI service, a request which was declined. POCABAR’s approach is the antithesis to that of the more common reseller type business.
Looking Ahead: Talent and International Expansion
As POCABAR embarks on its next decade, Wolfgang is focused on maintaining the company’s high standards. By partnering with local universities, POCABAR nurtures young talent through apprenticeships, ensuring the next generation upholds the company’s values and innovation.
International expansion is the next frontier. Following initial success in the Gulf states, POCABAR aims to replicate its model globally, bringing its unique blend of innovation and quality to new markets. The company’s branding—evoking the Bavarian Alps and mountaineering—reflects its ethos: encouraging the team to step out of their comfort zones and strive for the next challenge.
POCABAR and Predatar
POCABAR’s relationship with Predatar goes much deeper than a typical customer/supplier arrangement. POCABAR has been selected as one of Predatar’s APEX partners, an elite group of service providers around the world with the capabilities and ambition to deliver world-leading cyber resiliency services with Predatar tech under the hood. Predatar CEO, Alistair Mackenzie explained “There was never any doubt that POCABAR has what it takes to be one of our elite partners. Not only do they have the skills and the vision, but we love their culture and energy too.”
Conclusion
POCABAR’s journey from accidental beginnings to a trailblazer in cybersecurity exemplifies the power of adaptability, innovation, and commitment to excellence. With tools like Predatar enabling operational efficiency and a focus on talent and international growth, POCABAR is poised to scale new heights over the next decade.
Agentic AI systems are gaining attention as a potential game-changer for overstretched security and infrastructure operations teams tasked with maintaining cyber resilience. But what exactly is meant by ‘agentic’ in this context?
Let’s start with a definition: Agentic(adjective): Able to express agency or control on one’s own behalf or on the behalf of another.
Put simply, agentic AI is Artificial Intelligence that is able to make its own decisions. Think of any AI or robotics themed movie and there is probably an agentic machine at the heart of story. I,Robot, The Terminator, or our favourite… Short Circuit. Yes, Johnny 5 is alive, and is undeniable proof that agentic technology can be positive force in the world 😂.
Today, most AI is non-agentic. It’s generally used as a reactive tool and aims to deliver a specific type of output defined by a user or programmer. A human is setting the problem, and defining the type of solution required.
Agentic AI on the other hand, will independently plan and take day-to-day actions towards long-term objectives, adapt dynamically to changing environments, and interact with the world – without requiring constant human intervention.
Clearly, we’re not predicting that humanoids will be running the world – or your storage, but the core principles of agentic AI will prove to be invaluable for boosting and maintaining data resiliency. Storage and backup operations represent a fertile ground for its application. With less than 1% of backup data validated annually for efficacy and cleanliness, the need for smarter tools to address time constraints is undeniable.
This article explores the incremental steps on the path to fully autonomous, agentic, cyber recovery orchestration.
Step 1: Scheduled Recovery Automation
The journey begins with basic automation. Scheduled recovery testing and malware scanning can be proactively added to daily operations. At this stage:
Human operators maintain full control over what gets recovered, when, and how to respond to detection events or failed restores.
Automation reduces manual effort but doesn’t replace human decision-making.
This foundational step builds confidence in automation while freeing up valuable time for other critical tasks.
Step 2: Self-Directed or AI-Driven Recovery Automation
The next phase involves introducing systems that respond autonomously to detected anomalies. Here’s how it works:
The system uses behaviour monitoring or integrates with third-party APIs, such as storage SaaS control planes or SIEM tools to detect potential threats.
Affected systems are recovered into isolated cleanroom environments and tested for malware.
Over time, AI algorithms refine themselves to reduce false positives, lightening the workload for human operators.
Even at this stage, humans retain control over final actions, ensuring trust and oversight remain intact. While highly efficient, this level doesn’t yet meet the threshold of ‘agentic’ autonomy.
Step 3: Fully Agentic Cyber Recovery Automation
In the final stage, systems achieve full agentic capabilities, executing complex, multi-step tasks and making independent decisions. Examples include:
Removing malware from infected production systems as well as the backups.
Isolating compromised systems in a secure vault.
Applying software patches to remediate vulnerabilities across the network.
These advanced capabilities could raise concerns among operators about relinquishing control. However, the trade-off is significant: reducing repetitive work and accelerating the response to evolving threats.
Pros and Cons for Storage and Backup Professionals
The rise of agentic AI in cyber recovery presents both opportunities and challenges.
Pros:
Enhanced Oversight: By automating repetitive tasks, professionals can focus on strategic initiatives.
Improved Efficiency: Faster recovery processes minimise downtime and mitigate the impact of ransomware and other cyber threats.
Adaptive Learning: AI-driven tools continuously learn from new threats, improving accuracy and reducing false alarms.
Cons:
Potential for Edge Cases: Systems might encounter scenarios unfamiliar to the AI but recognisable to experienced operators, leading to potential vulnerabilities.
Training Requirements: Storage administrators may need to adapt to managing and refining AI systems, adding a layer of complexity to their job description.
Loss of Direct Control: Trust in autonomous systems requires cultural and procedural shifts, which may not come easily.
Conclusion: A Welcome Development
For many organisations, the processes governing backup and recovery have remained largely unchanged for decades, even as threats have evolved dramatically. Agentic AI offers a way to modernise these systems, addressing the growing cyber resiliency challenge with tools that are both efficient and adaptive.
While the shift to full autonomy will require careful implementation and oversight, agentic AI systems promise to revolutionise cyber recovery, empowering teams to stay ahead of threats and enabling a more resilient future. For now, incremental adoption—starting with scheduled automation and progressing towards self-directed systems—is the key to building trust and demonstrating the value of these transformative technologies.
Start Your Journey to Agentic AI in Cyber Recovery Today
Organisations around the world have already introduced scheduled and AI-powered cyber recovery automation for backups and snapshots with the Predatar Recovery Assurance platform. Starting your journey to resilience with automation and AI is easier than you think.
Watch this video to Discover Predatar in less than 2 minutes.
As cyber threats grow more sophisticated by the day, organisations are under pressure to protect their critical assets. Cyber recovery cleanroom technology has emerged as a powerful tool in this fight, offering a secure, isolated environment to test and validate restore operations and/or carry them out after a breach.
Cleanroom Technology isn’t a niche solution anymore. It’s on the cusp of widespread adoption, poised to leap from an ’emerging market’ to the ‘high-growth’ phase on the adoption curve.
This article explores five key accelerators fuelling the rapid uptake of cyber recovery cleanroom technology, and explains why you should consider deploying one in your organisation.
The adoption curve is a well-known framework for understanding how technologies evolve in the marketplace. Typically, it includes phases such as the innovation/emerging market stage, the high-growth phase, and eventually, maturity and saturation.
Currently, cyber recovery cleanroom technology sits at the tipping point between the emerging and high-growth phases. While early adopters have tested and proven its effectiveness, the broader market is just beginning to recognise its value. The transition to high-growth is often catalysed by external drivers that validate the technology’s relevance and practicality. In the case of cleanroom technology, five accelerators are acting as the spark.
The 5 Accelerators Driving Rapid Adoption
1. Growing Use Cases and Proof Points
One of the most compelling drivers of adoption is the growing body of use cases and proof points demonstrating the effectiveness of new technologies. Across all industries (but especially highly regulated ones such as finance, utilities and healthcare), organisations have leveraged cleanrooms to help avoid or improve their recovery from potentially debilitating ransomware attacks and data breaches.
Take, for instance, a national utilities operator in Austria which successfully identified and removed malware in its backup system before an attack could take place, thanks to its cleanroom-based recovery strategy. Or a US healthcare provider that safeguarded patient data by isolating and neutralising malware using recovery assurance software technology from Predatar.
These success stories are building trust and confidence in the technology by proving its value in real-world scenarios. The standout proof point is that Predatar’s Cyber Recovery Cleanroom technology has helped to identify malicious files in over 75% of all deployments, despite customers having existing cyber security scanning tool in place.
The diversity of use cases also highlights the flexibility of cleanroom technology. Initially it was designed as a safe place to recover data into after an attack, but it’s the new use cases which will help the technology cross the chasm from emerging to high growth market.
Value was added when the technology was put to work as a proactive recovery testing tool which appealed to business continuity and disaster recovery managers.
In early 2024, we saw the adoption of the technology by Managed Service Providers (MSPs) who added recovery assurance software as part of their managed backup and disaster recovery services.
Finally, we started to see the technology incorporated as part of mobile emergency cleanrooms as well as cyber vault solutions.
As more organisations share their success stories, the perception of cleanroom technology is shifting from an experimental tool to a proven necessity.
2. Increasing Platform and Workload Support
Another critical accelerator is the increasing platform and workload support now available for cleanroom technology. In its early days, cleanroom adoption was hindered by limited compatibility with existing IT environments. Today, however, the technology has evolved to seamlessly integrate with a wide range of platforms, from on-premises data centres to hybrid and cloud environments.
This expanded compatibility allows organisations to deploy cleanroom solutions without overhauling their infrastructure. Whether managing legacy systems, modern hypervisor workloads, or a mix of both – cleanrooms can now accommodate diverse environments.
An early pioneer of recovery orchestration technology, Veeam Software, offered recovery testing as a feature of its enterprise backup solution, but its support was limited to VMware workloads only. For large enterprises, cyber recovery cleanrooms need to support more than just VMware – other popular hypervisors such as Microsoft’s Hyper-V and Nutanix’s AHV are required. Support for UNIX platforms such as AIX which often house the most critical business applications are non-negotiable for many organisations too.
We believe cyber recovery cleanrooms are primarily a security technology, not a storage one. The largest security companies including Palo Alto, CrowdStrike and Fortinet are server and storage vendor agnostic. For the acceleration of cleanroom adoption, multi-vendor support is a prerequisite since security officers want to invest in tools which support a range of different server, storage and network vendors.
Additionally, many cleanroom solutions now offer integrations with popular cybersecurity tools, SIEM and SOAR platforms. These advancements simplify deployment and ensure that cleanrooms can connect into existing security ecosystems. As compatibility and support continue to improve, the barriers to adoption are quickly falling away.
3. Reduced Cost and Complexity
Adoption of the automobile in the early twentieth century accelerated dramatically as the price of the Ford Model T fell from $780 in 1910 (equivalent to $25,506 in 2023) to $290 in 1924 (equivalent to $5,156 in 2023) [Wikipedia].
One of the biggest challenges to cyber recovery cleanroom adoption has been its perceived cost and complexity. Early implementations required significant investment in hardware, software, and services, making it an option primarily for large enterprises. In addition, the hardware technology was proprietary, a good example being the Dell Cyber Recovery Vault – a highly successful (if expensive) solution targeted at large enterprises.
Today, advancements in technology are driving down cost and complexity, making cyber recovery cleanrooms more accessible to organisations of all sizes. At Predatar, we have seen the average time for implementation reduce from 20 days for Predatar’s first generation Cleanroom (1.0) to just 2 hours for Cleanroom 3.0. And by utilising commoditised infrastructure, cleanrooms are becoming affordable for all.
Automation and orchestration have played a significant role in this transformation. Modern cleanroom solutions often come with preconfigured templates, automated workflows, and user-friendly interfaces with integrated AI chatbots, that reduce the need for specialised expertise. This democratisation of technology has opened the door for mid-sized businesses and small enterprises to adopt cleanroom strategies.
Furthermore, as competition in the market increases, providers are offering more affordable pricing models, including pay-as-you-go and SaaS subscription options.
4. Increasing Regulation and Awareness of Cybercrime
The regulatory landscape is another powerful driver of cleanroom adoption. Whilst no regulation explicitly demands the use of cyber recovery cleanrooms, the direction of travel is clearly towards proving recoverability, in addition to the current focus of threat detection and mitigation. Nowhere is this more apparent than in the European Union, with DORA and NIS2 coming into force in 2024 and 2025.
For a country-by-country view on where each country stands on NIS2, this blog is very useful.
At the same time, the rising prevalence of cybercrime is driving awareness and urgency. According to QBE Insurance , the number of disruptive and destructive global cyber-attacks taking place each year has doubled from 2020 to 2024. The cost to UnitedHealth Group of its subsidiary’s Change Healthcare cyber-attack has risen to $2.457 billion, according to the Group’s Q3 2024 earnings report.
And remember, recovery assurance is not just about protecting businesses from human-driven cyber-crime but also plain old accidents and acts of nature. In the second half of 2024, in the largest IT outage in history, Fortune 500 companies alone suffered more than $5 billion in direct losses because of the CrowdStrike outage.
As I write this, 2025 has already witnessed the costliest wildfire in US history, with losses expected to exceed $135 billion. The risk premium will continue to rise as growing losses from traditional disasters are compounded by cybercriminals targeting organisations of all sizes, across all geographies and verticals – causing widespread damage. This growing threat landscape is compelling organisations to invest in solutions that can mitigate the impact and ensure business continuity.
Cleanroom technology, with its ability to isolate and neutralise threats while facilitating rapid recovery is emerging as a cornerstone of compliance and resilience strategies. As regulatory pressure and cybercrime awareness continue to grow, the demand for cyber recovery cleanroom technology is set to accelerate.
5. Focus from Major Tech Vendors
The involvement of major IT vendors is perhaps the strongest signal that cleanroom technology is moving into the high-growth phase. When industry leaders invest in, acquire, and promote a new technology, it validates its importance and potential.
In recent years, we’ve seen significant activity from major vendors in the cleanroom space. Some have launched dedicated cleanroom solutions as part of their cyber resilience portfolios, while others have formed strategic partnerships with specialist providers. These moves not only enhance the credibility of the technology but also expand its reach through established sales channels and customer bases.
Here are a few examples. In 2024 Commvault launched the Commvault Cloud Cleanroom Recovery, a secure Microsoft Azure cloud environment to help recover an environment post attack. IBM continued to advance its Storage Defender solution, a multi-vendor cyber solution spanning both primary and secondary storage, with options to add cyber recovery cleanrooms. HPE has made significant strides in establishing market presence with its HPE GreenLake Cyber Resilience Vault, a new air-gapped solution offering ‘superfast’ recovery.
Moreover, major vendors are investing in R&D to further enhance cleanroom capabilities. From AI-driven threat detection to advanced automation, these innovations are making cleanroom technology even more robust and appealing. The focus from IT giants is a clear indicator that cleanrooms are no longer a niche solution—they’re a critical component of modern cybersecurity strategies.
The Road Ahead: From Emerging to High-Growth Market
The convergence of these five accelerators is creating a perfect storm for the adoption of cyber recovery cleanroom technology. As use cases multiply, compatibility improves, costs decrease, regulations tighten, and major vendors double down, the conditions are ripe for rapid growth.
In the coming months, we can expect to see cleanroom technology move firmly into the high-growth phase of the adoption curve. Organisations that act now to explore and implement cleanroom solutions will be well-positioned to stay ahead of cyber threats and regulatory requirements. Those that delay may find themselves at the mercy of rising insurance premiums and damaging losses.
Conclusion: Recommendations for adopting Cyber Recovery Cleanrooms
Cyber recovery cleanrooms are rapidly transitioning from niche tools to essential components of cybersecurity strategies. To capitalise on this momentum, organisations should:
Prioritise Proactive Implementation: Don’t wait for a breach or regulatory pressure to take action. Implement cleanroom solutions early to build resilience and validate recovery processes. Start with a pilot project to demonstrate value before scaling.
Invest in Compatibility and Training: Ensure your cleanroom solutions integrate seamlessly with existing IT environments and security ecosystems. Equip teams with the necessary training to maximise effectiveness, leveraging vendor support and automation tools for simplicity.
Collaborate with Leading Providers: Partner with vendors offering proven, multi-platform solutions and a focus on continuous improvement. Opt for partners who demonstrate commitment to innovation, regulatory compliance, and flexibility to meet your organisation’s unique needs.
By addressing these areas, organisations can position themselves at the forefront of cyber resilience, safeguarding operations while adapting to the evolving threat landscape.
Learn more about Predatar’s unique Cyber Recovery Assurance capabilities at www.predatar.com
Disaster Recovery testing, or DR testing has been a cornerstone of business continuity for more than 3 decades. While the need for validating recoverability has never been greater, the way that DR testing is done hasn’t kept pace with new technology or the evolving risk landscape.
It’s an inconvenient truth that the simulated scenarios of DR tests no longer reflect real-world threats. Whether they choose to acknowledge it or not – most IT professionals already know it.
Rubrik’s EMEA CTO Harpinder Singh Powar recently discussed the role of DR testing at Predatar’s annual user summit. He states,
“The value of DR testing has dramatically diminished, and for many organisations the practice has become little more than a tick-box exercise.”
DR testing has the potential to once again become a powerful tool for business continuity. And what’s more, it has a big role to play in the fight against cybercrime. DR testing must evolve. And here’s the exciting part – the evolution is already underway. New approaches to DR testing will help organisations rise from the metaphorical flames of any disaster – and even help to avoid them.
What is Disaster Recovery testing (aka DR testing)?
Disaster Recovery testing is the process of validating an organisation’s disaster recovery plan (DRP) to ensure that IT systems, data, applications, and infrastructure can be effectively restored after a disaster or disruption.
Typically, most organisations execute DR tests on a quarterly, or annual basis. During these tests specific elements of the DRP will be tested, for example failover mechanisms or backup restores.
Why does Disaster Recovery testing need to evolve?
Resource challenges: IT systems are getting bigger and more complex by the day. At the same time, there is an ongoing global shortage of skilled technical people. DR testing is already time-consuming and resource intensive. This is only getting worse with more edge devices, Internet of Things 4.0 (IoT 4.0), and big data models for AI.
Under-resourced IT teams are struggling to keep up with basic scheduled DR testing, let alone expand the scope to reflect the new data landscape. The threat landscape: As the name suggests, Disaster Recovery testing is all about how an organisation will respond in a disaster. It’s always wise to plan for the worst-case scenario, and historically the worst-case scenario was something like a fire or flood taking out your data centre. Following 9/11, terror attacks became a very real concern too.
Fast forward 20 years. Today the biggest threat is a very different beast. Where once the odds of a ‘disaster’ striking were perhaps 1 in a million, now it’s closer to 1 in 50. The big threat is cyber attacks.
Where ‘traditional’ disasters have tended to be indiscriminate and hit suddenly, cyber attacks are often super-targeted, and are executed over an extended period. They silently spread across networks to cause maximum disruption. Disaster Recovery wasn’t built to deal with this new type of scenario.
How is Disaster Recovery Testing changing?
1. Continuous DR testing
Few people would disagree that increasing the frequency of testing is a good thing to do. But cost, complexity and resource limitations mean that most organisations only run DR tests periodically – typically, on a quarterly, or annual basis. What’s more, these tests only check a very small subset of the data the organisation stores (less than 1% on average).
DR testing is a perfect use case for automation. Organisations that deploy automated DR testing workflows can run continuous recovery tests, 24/7 – with no additional burden on busy IT teams, and no disruption to day-to-day IT systems and operations.
This new approach to testing means that organisations can validate the recoverability of all of their data every few weeks. The most critical systems can be checked every few days.
2. AI-powered DR testing
Artificial intelligence is changing the world, and it’s got a significant role to play in the future of DR testing. AI is already being put to work in many organisations to identify data with the highest likelihood of recovery failure. These potential ‘problem’ workloads can then be prioritised for testing – boosting the chances of finding and fixing issues. This approach will ultimately increase the efficacy of recoveries. AI can also be used to detect signs of a cyberattack by spotting tell-tale patterns of nefarious behaviour in your data. This will enable IT and security teams to act early – before the issue escalates into a crisis.
The third and final application of AI for DR testing we want to highlight is AI-generated scenarios. By understanding the complex data patterns of real-world disaster scenarios, and how the responses play out, AI will be able to test drive DR plans against realistic scenarios and automatically optimise the response for maximum success.
3. DR testing with integrated security tools
In most modern cyber attacks, malicious files are present within the victim’s IT network for weeks – sometimes months – before the attack is activated. Traditional DR methods won’t detect this dormant malware. As a result, a DR test might produce a successful result for recoverability of an infected workload, even though the data could become encrypted and rendered useless as part of a cyber attack.
It’s an eye-opening fact that Predatar has uncovered hidden malware in more than 70% of its customer environments within just a few weeks of deployment. In most cases the malware had been present for several months, and had the potential to cause significant disruption if left undetected.
By integrating cyber security tools such as Endpoint Detection & Response (EDR) and Extended Endpoint Detection & Response (XDR) into DR testing procedures, organisations can validate the cleanliness of their data and remove malware before it can cause damage.
What’s more, by integrating DR testing with SIEM and SOC platforms, DR testing can become more responsive to the real-world threats that cyber security teams are managing every day.
4. DR testing as a proactive threat detection weapon
We’ve just highlighted how a new generation of DR testing capabilities will uncover hidden threats and vulnerabilities within stored data. In some cases, the DR test will be the first alert of a potential issue within an organisation.
Integration with SOC and SIEM platforms not only means IT teams can receive intelligence from security teams, they can provide intelligence to security teams too. DR testing has the potential to be an early warning system for prevailing cyber attacks. In the new world of DR testing, backups are elevated from reactive insurance policy to a proactive threat intelligence tool.
5. Joined-up DR testing
Today, DR tests are often compartmentalised, with tests executed on a systems-by-system basis. In a real-world scenario, bringing back one system at a time is far from optimal. Your business’s most critical applications may have dependencies across multiple systems. By using unified recovery environments and recovery orchestration applications, businesses can build and test recovery plans to restore data from different systems in an optimised sequence. This will enable them to get the most vital systems up and running faster. By minimising operational downtime, IT teams can and reduce the impacts of a cyber incident or other data loss event.
6. DR testing for compliance
the business case for efficiency and cyber resilience are compelling drivers for change. But it’s regulations that are really accelerating the innovation and adoption of new DR testing practices. A new wave of operational resilience regulations is being introduced around the world – FISMA, DORA, HIPAA, PRA and NIS2 to name a few. Not to mention more stringent requirements from cyber insurance too. The need to provide evidence of recoverability is rapidly becoming essential.
As you evolve your DR testing processes and toolsets, be sure to evaluate your reporting capabilities too. In the new world of DR testing, spreadsheets and hand-cranked reports will be a thing of the past. Most modern applications include easy-to-use, configurable dashboards and reporting features. These tools are designed specifically to boost visibility, save time and provide the evidence that regulators and auditors need.
In Conclusion
Disaster Recovery testing needs to evolve to meet the operational resilience challenges facing organisations today. Automation, Artificial Intelligence and integration with security applications will provide the biggest wins. The future of DR testing is closer than you think. Predatar’s Recovery Assurance platform is a practical way to get started with AI-powered, automated recovery testing and malware scanning for backups and snapshots.
Find out more about the world’s most innovative Recovery Assurance platform at www.predatar.com or book a demo now.