The 2020 Tech Innovator Awards
The delivery of truly differentiated offerings that create opportunities for partners during this unprecedented period is the crowning achievement of our 2020 Tech Innovators.
Veeam Backup For Microsoft Office 365 v4
While Microsoft provides resilient infrastructure for Office 365, customers are responsible for protecting the critical data that sits on top of it. Veeam enables partners and customers to do just that with its Backup for Microsoft Office 365 offering. With the version 4 update, key enhancements include an improved way to keep Office 365 data in Microsoft’s Azure cloud through direct integration with Azure Blob Storage. Also added in v4 are performance upgrades for SharePoint and OneDrive for Business backups; file-level recovery of Veeam backups and native snapshots; and capabilities to restore to any environment that’s supported by Veeam, including on-premises data centers.
Concentric Semantic Intelligence
Using natural language processing, the Concentric Semantic Intelligence offering enables security teams to detect risks and then remediate threats including incorrectly classified documents and inappropriate third-party access. The SaaS platform is agentless and does not require up-front development of rules or policies.
Leveraging unique encryption methodology—which uses 256-bit AES to directly embed boundaries into data—the Datanchor Platform enables true zero-trust data security. Users are enabled to continue using their existing IT systems while safely supporting distributed workforces.
Fortanix Self Defending Key Management Service
With its Self-Defending Key Management Service, Fortanix offers a unified management approach covering encryption, keys, secrets and tokenization. The service, which spans multi-cloud infrastructures, provides cryptographic operations and life-cycle management such as key generation and key rotation.
McAfee Unified Cloud Edge
With features such as a single policy definition rule engine, McAfee’s Unified Cloud Edge makes it possible for organizations to define a single data protection or threat prevention policy, and have the rules applied consistently across the device, the network and the cloud.