Elastio and Advance2000 Partner to Launch Ransomware Recovery Assurance Platform | National Business | #ransomware | #cybercrime


BOSTON–(BUSINESS WIRE)–May 27, 2025–

Elastio, the leading ransomware recovery assurance platform, announced a strategic partnership with Advance2000 (A2K), a premier provider of private cloud infrastructure and managed IT services. This collaboration introduces the Advance2000 Ransomware Recovery Assurance Platform, a comprehensive solution powered by the Elastio Platform and integrated with Veeam in A2K’s secure cloud environment.


This page requires Javascript.

Javascript is required for you to be able to read premium content. Please enable it in your browser settings.

kAms6D:8?65 E@ 6?92?46 3FD:?6DD 4@?E:?F:EJ 2?5 4J36C C6D:=:6?46[ E9:D ?6H A=2E7@C> 6>A@H6CD paz 4FDE@>6CD E@ 56E64E C2?D@>H2C6 6?4CJAE:@? 2?5 52E2 4@CCFAE:@? 😕 3243:?:?8 t=2DE:@’D :?E6==:86?E D42??:?8 42A23:=:E:6D H:E9 paz’D 9:89\A6C7@C>2?46 AC:G2E6 4=@F5[ 4=:6?ED 82:? 4@?7:56?46 E92E E96:C C6DE@C6 A@:?ED 2C6 4=62?[ G2=:52E65[ 2?5 D276]k^Am

kAmk6>m“p5G2?46a___ 92D 3F:=E 2 ECFDE65 C6AFE2E:@? 2D 2 D64FC6 4=@F5 AC@G:56C 7@C :?5FDEC:6D H96C6 FAE:>6[ 4@>A=:2?46[ 2?5 52E2 AC@E64E:@? 2C6 A2C2>@F?E[”k^6>m D2:5 k6>mr9C:DE@A96C $2F6Ck^6>m[ v=@32= ‘:46 !C6D:56?E @7 $EC2E68:4 p==:2?46D 2E t=2DE:@] k6>m“qJ :?E68C2E:?8 t=2DE:@ :?E@ E96:C ‘662>\32D65 324H2C6 C64@G6CJ 2DDFC2?46—8:G:?8 4FDE@>6CD 4@?7:56?46 E92E E96J 42? 3@F?46 324< 7C@> C2?D@>H2C6 6G6?ED 4=62?=J[ BF:4<=J[ 2?5 D64FC6=J H:E9 F?4@>AC@>:D65 52E2]”k^6>mk^Am

kAmk6>mr=@D:?8 E96 v2AD 😕 %C25:E:@?2= q24mk^Am

kAm#2?D@>H2C6 4@?E:?F6D E@ 6G@=G6—>@56C? E24E:4D @7E6? :?7:=EC2E6 BF:6E=J[ 6?4CJAE:?8 52E2 D=@H=J @G6C H66@?E9D E@ 6G256 56E64E:@? 2?5 6?DFC6 4@>AC@>:D65 7:=6D 86E 324<65 FA] (96? @C82?:K2E:@?D ECJ E@ C64@G6C[ E96J C:D< C6DE@C:?8 E2:?E65 52E2[ =62G:?8 E96> F?46CE2:?[ D4C2>3=:?8 E@ 7:?5 2 4=62? 324@C6 GF=?6C23=6 E@ C2?D@> 56>2?5D]k^Am

kAm%96 p5G2?46a___ #2?D@>H2C6 #64@G6CJ pDDFC2?46 !=2E7@C> 255C6DD6D E9:D C:D< 9625\@? H:E9 25G2?465 762EFC6D :?4=F5:?8ik^Am

kF=mk=:mk6>mpFE@>2E65 $42??:?8k^6>m – }6H ‘662> 3242E:42==J[ 32D65 @? 4FDE@>:K23=6 A@=:4:6D]k^=:mk=:mk6>mtIA6CE #2?D@>H2C6 s6E64E:@?ik^6>m t=2DE:@’D |{ 6?8:?6 :56?E:7:6D C2?D@>H2C6\5C:G6? 52E2 4@>AC@>:D6 H:E9 hh]hhhT 244FC24Jk^=:mk=:mk6>m#6EC@24E:G6 $42??:?8k^6>m – !C6G:@FD=J F?D42??65 @C 2C49:G65 3242?5 E@ G2=:52E6 C64@G6CJ A@:?ED 367@C6 C6DE@C2E:@?]k^=:mk^F=m

kAmk6>m“%@52J’D 4J36C E9C62ED C6BF:C6 >@C6 E92? ;FDE 3242?5 2DDFC2?46[”k^6>m D2:5 k6>mqC:2? |2@F25k^6>m[ rt~ @7 p5G2?46a___] k6>m“~FC A2CE?6CD9:A H:E9 t=2DE:@ C6:?7@C46D @FC 4@>>:E>6?E E@ AC@G:5:?8 C6D:=:6?E[ D64FC6[ 2?5 9:89\A6C7@C>:?8 AC:G2E6 4=@F5 D@=FE:@?D] %96 p5G2?46a___ #2?D@>H2C6 #64@G6CJ pDDFC2?46 !=2E7@C> 6?23=6D FD E@ AC@E64E @FC 4=:6?ED 7C@> E96 8C@H:?8 C2?D@>H2C6 E9C62E 2?5 56=:G6C C64@G6CJ @FE4@>6D E96J 42? ECFDE]”k^6>mk^Am

kAm%9:D A2CE?6CD9:A F?56CD4@C6D 2 D92C65 >:DD:@? E@ C6567:?6 9@H @C82?:K2E:@?D 2AAC@249 C2?D@>H2C6 C64@G6CJ] qJ F?:E:?8 paz’D G6CE:42==J :?E68C2E65 AC:G2E6 4=@F5 :?7C2DECF4EFC6 H:E9 t=2DE:@’D :?5FDECJ\=625:?8 C64@G6CJ 2DDFC2?46 A=2E7@C>[ 4FDE@>6CD 42? C65F46 C64@G6CJ E:>6D[ D2768F2C5 4@>A=:2?46[ 2?5 249:6G6 8C62E6C 4J36C C6D:=:6?46]k^Am

kAmu@C >@C6 :?7@C>2E:@? @? 9@H t=2DE:@ 2?5 p5G2?46a___ 2C6 C6567:?:?8 324H2C6 AC@E64E:@?[ G:D:E k2 9C67lQ9EEADi^^4ED]3FD:?6DDH:C6]4@>^4E^r%n:5lD>2CE=:?AjFC=l9EEATbpTauTauHHH]6=2DE:@]4@>U2>Aj6D966Eldcae_adbU2>Aj?6HD:E6>:5la_ad_daf`gch_cU2>Aj=2?l6?\&$U2>Aj2?49@ClHHH]6=2DE:@]4@>U2>Aj:?56Il`U2>Aj>5dlae`cgfhe_35hg5bf72fbfdc77ffa5h`fQ C6=lQ?@7@==@HQ D92A6lQC64EQmHHH]6=2DE:@]4@>k^2m @C 4@?E24E r9C:D $2F6C[ v=@32= ‘:46 !C6D:56?E[ $EC2E68:4 p==:2?46D 2?5 r92??6=D[ 2E k2 9C67lQ>2:=E@iA2CE?6Co6=2DE:@]4@>Q C6=lQ?@7@==@HQ D92A6lQC64EQmA2CE?6Co6=2DE:@]4@>k^2m]k^Am

kAmk6>mp3@FE p5G2?46a___k^6>mk^Am

kAmk2 9C67lQ9EEADi^^4ED]3FD:?6DDH:C6]4@>^4E^r%n:5lD>2CE=:?AjFC=l9EEATbpTauTauHHH]25G2?46a___]4@>U2>Aj6D966Eldcae_adbU2>Aj?6HD:E6>:5la_ad_daf`gch_cU2>Aj=2?l6?\&$U2>Aj2?49@Clp5G2?46a___U2>Aj:?56IlaU2>Aj>5dl_dbaah`ag5_afhbcgg46geh_3a7fcb25Q C6=lQ?@7@==@HQ D92A6lQC64EQmp5G2?46a___k^2m 😀 2 AC:G2E6=J 96=5 x% 2?5 r=@F5 $6CG:46 !C@G:56C 56=:G6C:?8 D64FC6[ 9:89\A6C7@C>2?46 AC:G2E6 4=@F5 2?5 >2?2865 x% D6CG:46D 24C@DD E96 pC49:E64EFC6[ t?8:?66C:?8[ r@?DECF4E:@? WptrX[ {682=[ t5F42E:@?[ 2?5 w62=E942C6 D64E@CD] (:E9 2 ?2E:@?H:56 AC6D6?46 2?5 ac^f DFAA@CE[ p5G2?46a___ AC@G:56D G6CE:42==J :?E68C2E65 4=@F5 D@=FE:@?D E92E @776C F?>2E4965 A6C7@C>2?46[ D64FC:EJ[ 2?5 C6=:23:=:EJ] {62C? >@C6 2E k2 9C67lQ9EEADi^^4ED]3FD:?6DDH:C6]4@>^4E^r%n:5lD>2CE=:?AjFC=l9EEADTbpTauTauHHH]25G2?46a___]4@>U2>Aj6D966Eldcae_adbU2>Aj?6HD:E6>:5la_ad_daf`gch_cU2>Aj=2?l6?\&$U2>Aj2?49@ClHHH]25G2?46a___]4@>U2>Aj:?56IlbU2>Aj>5dl4fd365gcg7cf`ffd4f56ggffbbc“d4bQ C6=lQ?@7@==@HQ D92A6lQC64EQmHHH]25G2?46a___]4@>k^2m]k^Am

kAmk6>mp3@FE t=2DE:@k^6>mk^Am

kAmk2 9C67lQ9EEADi^^4ED]3FD:?6DDH:C6]4@>^4E^r%n:5lD>2CE=:?AjFC=l9EEATbpTauTauHHH]6=2DE:@]4@>U2>Aj6D966Eldcae_adbU2>Aj?6HD:E6>:5la_ad_daf`gch_cU2>Aj=2?l6?\&$U2>Aj2?49@Clt=2DE:@U2>Aj:?56IlcU2>Aj>5dl_cd7faea2a66fge7a3fchb`44ab7faf2Q C6=lQ?@7@==@HQ D92A6lQC64EQmt=2DE:@k^2m 😀 E96 =6256C 😕 C2?D@>H2C6 C64@G6CJ 2DDFC2?46] %96 t=2DE:@ !=2E7@C> AC@24E:G6=J G2=:52E6D 324D] qJ 6?DFC:?8 4=62? 2?5 F?4@>AC@>:D65 C64@G6CJ A@:?ED[ t=2DE:@ 6?23=6D @C82?:K2E:@?D E@ C64@G6C BF:4<=J 2?5 4@?7:56?E=J 7C@> K6C@\52J C2?D@>H2C6 2EE24@C6 2E k2 9C67lQ9EEADi^^4ED]3FD:?6DDH:C6]4@>^4E^r%n:5lD>2CE=:?AjFC=l9EEATbpTauTauHHH]6=2DE:@]4@>U2>Aj6D966Eldcae_adbU2>Aj?6HD:E6>:5la_ad_daf`gch_cU2>Aj=2?l6?\&$U2>Aj2?49@ClHHH]6=2DE:@]4@>U2>Aj:?56IldU2>Aj>5dl4aafe`be_eca_f55g5cd7a346453245`Q C6=lQ?@7@==@HQ D92A6lQC64EQmHHH]6=2DE:@]4@>k^2m]k^Am

kAm’:6H D@FC46 G6CD:@? @? k2 9C67lQ9EEAi^^3FD:?6DDH:C6]4@>Qm3FD:?6DDH:C6]4@>k^2mik2 9C67lQ9EEADi^^HHH]3FD:?6DDH:C6]4@>^?6HD^9@>6^a_ad_daf`gch_c^6?^Q C6=lQ?@7@==@HQm9EEADi^^HHH]3FD:?6DDH:C6]4@>^?6HD^9@>6^a_ad_daf`gch_c^6?^k^2mk^Am

kAmr~}%pr%i |tsxp r~}%pr%k^Am

kAm$E6A92?:6 qC@J=6Dk^Am

kAmr9:67 |2C<6E:?8 ~77:46C[ t=2DE:@k^Am

kAmgbb\cbd\afgck^Am

kAmk2 9C67lQ>2:=E@i>2C<6E:?8o6=2DE:@]4@>Qm>2C<6E:?8o6=2DE:@]4@>k^2mk^Am

kAmzt*(~#si |p$$prw&$t%%$ &}x%ts $%p%t$ }~#%w p|t#xrpk^Am

kAmx}s&$%#* zt*(~#si }t%(~#z$ $tr%* sp%p |p}pvt|t}% %trw}~{~v* $~u%(p#tk^Am

kAm$~rti t=2DE:@k^Am

kAmr@AJC:89E qFD:?6DD (:C6 a_ad]k^Am

kAm!&qi _d^af^a_ad `_i_b p|^sx$ri _d^af^a_ad `_i_a p|k^Am

kAmk2 9C67lQ9EEAi^^HHH]3FD:?6DDH:C6]4@>^?6HD^9@>6^a_ad_daf`gch_c^6?Qm9EEAi^^HHH]3FD:?6DDH:C6]4@>^?6HD^9@>6^a_ad_daf`gch_c^6?k^2mk^Am

Copyright Business Wire 2025.



Source link

.........................

National Cyber Security

FREE
VIEW