
Kiteworks & Wasabi partner to lower cloud storage costs
The collaboration combines Kiteworks' secure managed file transfer platform with Wasabi's hot cloud storage, delivering a solution designed to meet the needs of highly regulated industries such as healthcare, financial services, government, legal services, and media and entertainment.
According to both companies, the combined offering addresses market demand for alternatives to traditional cloud storage that offer robust security, compliance, and automation features, while reducing operational costs.
Laurie Mitchell, Senior Vice President, Global Alliances and Partner Marketing at Wasabi Technologies, said, "Our partnership with Kiteworks creates a powerful solution that transforms how organisations manage, secure, and transfer their data. By combining Wasabi's affordable, high-performance and scalable cloud storage with Kiteworks' secure managed file transfer capabilities, we're helping customers achieve operational excellence while meeting the most stringent security and compliance requirements."
The integrated solution is positioned to deliver four primary benefits to organisations. Firstly, it claims to optimise total cost of ownership by offering cloud storage with no egress fees at costs up to 80% lower than providers such as AWS S3, Azure Blob, and Google Cloud. The companies state that this, combined with governance and security automation, results in immediate cost savings and long-term reduction in risk associated with compliance penalties, security incidents, and inefficiencies.
Secondly, the partnership aims to enhance data security and compliance. Wasabi's secure cloud storage is paired with the Kiteworks Private Data Network, which manages risk associated with sending, sharing, and receiving sensitive information. Kiteworks is validated with security standards including FedRAMP Ready High and FedRAMP Moderate Authorised, SOC 2 Type II, IRAP, ISO 27001, 27017, and 27018. Wasabi has also achieved FedRAMP Ready status, supporting use by government customers.
The third benefit centres on simplifying migration and ongoing integration. Kiteworks Secure MFT allows organisations to automate and secure both data migration and daily operations with Wasabi through a visual workflow tool. A dashboard and centralised audit log support tracking and compliance, enabling users to monitor data transfers, address issues, and demonstrate adherence to relevant security policies and regulations.
Fourth, both companies highlight a reduced IT burden and risk profile. The Kiteworks Private Data Network offers a hardened virtual appliance with multiple built-in defences, including antivirus, zero-trust interfaces, and scale-out clusters for high availability. Organisations can implement least-privilege policies, robust encryption, and network scans integrated with existing data loss prevention and content disarm and reconstruction servers.
David Byrnes, Vice President Global Channels at Kiteworks, commented, "Organisations today are looking for solutions that deliver measurable business impact across multiple dimensions. This partnership creates a powerful combination where the whole is greater than the sum of its parts. Together, we're enabling organisations to achieve operational efficiency, reduce risk, and improve governance at scale. Customers can now seamlessly manage their entire data life cycle – from storage to secure sharing – with complete visibility, control, and compliance, creating tangible business value beyond what either solution could deliver independently."
The joint solution is specifically targeted at sectors facing stringent data protection and regulatory requirements. It seeks to address key concerns for IT and security leaders regarding cost management, data privacy, and regulatory compliance when handling sensitive and private data.
The partnership also offers managed service providers strategic benefits, as it allows them to position themselves as advisors on security and compliance, going beyond just providing basic cloud storage. The solution supports the creation of tiered service offerings, which can potentially increase customer retention and enable differentiation in the marketplace through measurable business results.
Hashtags

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles


Techday NZ
2 hours ago
- Techday NZ
Google Cloud unveils advanced AI security tools & SOC updates
Google Cloud has announced new security solutions and enhanced capabilities focused on securing AI initiatives and supporting defenders in the context of growing enterprise adoption of artificial intelligence technologies. With the introduction of AI across various sectors, organisations are increasingly concerned with the risks presented by sophisticated AI agents. Google Cloud has responded by expanding on the security measures available within its Security Command Centre, emphasising protection for AI agents and ecosystems using tools such as Sensitive Data Protection and Model Armour. According to Jon Ramsey, Vice President and General Manager, Google Cloud Security, "AI presents an unprecedented opportunity for organizations to redefine their security posture and reduce the greatest amount of risk for the investment. From proactively finding zero-day vulnerabilities to processing vast amounts of threat intelligence data in seconds to freeing security teams from toilsome work, AI empowers security teams to achieve not seen before levels of defence and efficiency." Expanded protection for agentic AI Google Cloud has detailed three new capabilities for securing AI agents in Google Agentspace and Google Agent Builder. The first, expanded AI agent inventory and risk identification, will enable automated discovery of AI agents and Model Context Protocol (MCP) servers. This feature aims to help security teams quickly identify vulnerabilities, misconfigurations, and high-risk interactions across their AI agent estate. The second, advanced in-line protection and posture controls, extends Model Armour's real-time security assurance to Agentspace prompts and responses. This enhancement is designed to provide controls against prompt injection, jailbreaking, and sensitive data leakage during agent interactions. In parallel, the introduction of specialised posture controls will help AI agents adhere to defined security policies and standards. Proactive threat detection rounds out these developments, introducing detections for risky behaviours and external threats to AI agents. These detections, supported by intelligence from Google and Mandiant, assist security teams in responding to anomalous and suspicious activity connected to AI agents. Agentic security operations centre Google Cloud is advancing its approach to security operations through an 'agentic SOC' vision in Google Security Operations, which leverages AI agents to enhance efficiency and detection capabilities. By automating processes such as data pipeline optimisation, alert triage, investigation, and response, Google Cloud aims to address traditional gaps in detection engineering workflows. "We've introduced our vision of an agentic security operations center (SOC) that includes a system where agents can coordinate their actions to accomplish a shared goal. By offering proactive, agent-supported defense capabilities built on optimizing data pipelines, automating alert triage, investigation, and response, the agentic SOC can streamline detection engineering workflows to address coverage gaps and create new threat-led detections." The new Alert Investigation agent, currently in preview, is capable of autonomously enriching events, analysing command-line interfaces, and building process trees. It produces recommendations for next steps and aims to reduce the manual effort and response times for security incidents. Expert guidance and consulting Google Cloud's Mandiant Consulting arm is extending its AI consulting services in response to demand for robust governance and security frameworks in AI deployments. These services address areas such as risk-based AI governance, pre-deployment environment hardening, and comprehensive threat modelling. Mandiant Consulting experts noted, "As more organizations lean into using generative and agentic AI, we've seen a growing need for AI security consulting. Mandiant Consulting experts often encounter customer concerns for robust governance frameworks, comprehensive threat modeling, and effective detection and response mechanisms for AI applications, underscoring the importance of understanding risk through adversarial testing." Clients working with Mandiant can access pre-deployment security assessments tailored to AI and benefit from continuous updates as threats evolve. Unified platform enhancements Google Unified Security, a platform integrating Google's security solutions, now features updates in Google Security Operations and Chrome Enterprise. Within Security Operations, the new SecOps Labs offers early access to AI-powered experiments related to parsing, detection, and response, many of which use Google Gemini technology. Dashboards with native security orchestration, automation, and response (SOAR) data integration are now generally available, reflecting user feedback from previous previews. On the endpoint side, Chrome Enterprise enhancements bring secured browsing to mobile, including Chrome on iOS, with features such as easy account separation and URL filtering. This allows companies to block access to unauthorised AI sites and provides enhanced reporting for investigation and compliance purposes. Trusted Cloud and compliance Recent updates in Trusted Cloud focus on compliance and data security. Compliance Manager, now in preview, enables unified policy configuration and extensive auditing within Google Cloud. Data Security Posture Management, also in preview, delivers governance for sensitive data and integrates natively with BigQuery Security Centre. The Security Command Centre's Risk Reports can now summarise unique cloud security risks to inform both security specialists and broader business stakeholders. Updates in identity management include Agentic IAM, launching later in the year, which will facilitate agent identities across environments to simplify credential management and authorisation for both human and non-human agents. Additionally, the IAM role picker powered by Gemini, currently in preview, assists administrators in granting least-privileged access through natural language queries. Enhanced Sensitive Data Protection now monitors assets in Vertex AI, BigQuery, and CloudSQL, with improvements in image inspection for sensitive data and additional context model detection. Network security innovations announced include expanded tag support for Cloud NGFW, Zero Trust networking for RDMA networks in preview, and new controls for Cloud Armour, such as hierarchical security policies and content-based WAF inspection updates. Commitment to responsible AI security Jon Ramsey emphasised Google Cloud's aim to make security a business enabler: "The innovations we're sharing today at Google Cloud Security Summit 2025 demonstrate our commitment to making security an enabler of your business ambitions. By automating compliance, simplifying access management, and expanding data protection for your AI workloads, we're helping you enhance your security posture with greater speed and ease. Further, by using AI to empower your defenders and meticulously securing your AI projects from inception to deployment, Google Cloud provides the comprehensive foundation you need to thrive in this new era."


Techday NZ
20 hours ago
- Techday NZ
Google Cloud warns backup systems face rising cyber threats
Google Cloud has published its latest Cloud Threat Horizons Report H2 2025, detailing key trends and findings around cyber threats targeting cloud environments worldwide. The report draws on analysis conducted by Google Cloud's Office of the CISO, Google Threat Intelligence Group (GTIG), Mandiant Consulting, and internal security teams. It underscores the increasing sophistication of threat actors and the growing risk that organisations face. Credential compromise and misconfiguration Analysis indicates that credential-based attacks remain the most prevalent threat vector within cloud ecosystems. According to the report, weak or absent credentials were responsible for 47.1% of recorded cloud incidents during the period under review. Misconfigurations contributed to 29.4% of incidents, while compromises via API or user interface accounted for 11.8%. The report notes that these figures highlight the persistent vulnerabilities in identity management and system configuration, which malicious actors continue to exploit at scale. Backup systems under direct attack One new trend identified is the direct targeting of backup infrastructure by financially motivated threat actors. Google Cloud's security experts observed a pattern of backup system sabotage, including deletion of automated backup routines, data corruption, and manipulation of permissions. "Financially motivated threat actors have escalated tactics, sabotaging backup systems by deleting routines, corrupting data, and manipulating permissions to disrupt recovery and force ransom payouts." Such activity is intended to hinder organisations from recovering after an incident, increasing the leverage available to attackers in extortion attempts. MFA bypass by social engineering The report outlines the emergence of advanced social engineering campaigns that result in multi-factor authentication (MFA) bypass. These attacks involve techniques such as credential theft and session cookie hijacking. A particular focus is given to groups aligned with North Korea. The report singles out UNC4899, also known as TraderTraitor, for its efforts targeting cryptocurrency platforms. "Sophisticated social engineering attacks are enabling MFA bypass, including credential and session cookie theft - especially by North Korea‐aligned group UNC4899 (TraderTraitor) targeting crypto‐asset platforms." Abuse of trusted cloud services Increased exploitation of mainstream cloud and code-hosting services for malware delivery is highlighted by the report. Attackers are reported to be hosting decoy files - such as .desktop files disguised as PDFs - on platforms including Google Drive, GitHub, and Dropbox. These files are designed to trigger silent malware downloads in the background when accessed. "Attackers increasingly exploit platforms like Google Drive, GitHub, Dropbox, and others to host decoy files (e.g., .desktop files masquerading as innocuous PDFs) that trigger background malware downloads." Such activity makes detection more complex due to the abuse of otherwise trusted platforms. Evolving persistence and evasion techniques The publication describes a shift in threat actor tactics towards advanced evasion and persistence strategies. These include efforts to compromise the integrity of recovery chains and supply chain systems, threatening not just data but the infrastructure designed to facilitate post-incident recovery. Expert recommendations Google Cloud security experts emphasise a multi-layered defence approach. Recommendations include strengthening identity and access management practices, prioritising least-privilege principles, enforcing robust credential hygiene, and implementing credential leak detection mechanisms. The report advocates for isolating recovery environments to counter backup sabotage. For instance, Cloud Isolated Recovery Environments (CIRE) can provide additional protection for backup data and help ensure recovery capabilities remain intact after an attack. Vigilance for signs of threat activity is also recommended, particularly with respect to deployment of decoy files and potential MFA bypass attempts enabled via deceptive use of cloud services. Addressing supply chain risk and developer ecosystem security is identified as a further requirement. Google Cloud recommends validation mechanisms - such as Verified CRX Upload for Chrome extensions - as means of preventing malicious software updates within cloud ecosystems. Shifting strategic priorities for defenders The report argues that as organisations increasingly transition to cloud-native environments, attackers have adapted their playbook in response. The new focus targets recovery and backup systems as primary objectives, requiring companies to improve their security posture not only around data, but also recovery infrastructure. "The report underscores that recovery systems are now primary targets, signalling an urgent need for stronger defensive posture across identity, access, and infrastructure resilience." Google Cloud's Cloud Threat Horizons Report H2 2025 is designed to equip security leaders and practitioners with intelligence-backed insights to respond proactively to these developing threats by implementing appropriate mitigation and defence mechanisms.


Techday NZ
6 days ago
- Techday NZ
Oracle & Google Cloud boost AI with Gemini model access
Oracle and Google Cloud have expanded their partnership to provide Oracle customers with direct access to Google's Gemini AI models through the Oracle Cloud Infrastructure Generative AI service. The collaboration gives Oracle customers the ability to leverage Gemini 2.5 and its upcoming model family for enterprise-grade applications, including advanced coding, workflow automation, and domain-specific solutions such as MedLM for healthcare. Expanded AI offerings Through the integration, enterprises will have the opportunity to use Gemini's multimodal capabilities, enabling applications that can handle text, code, and industry-specific tasks. Oracle plans further integrations with Google Cloud's Vertex AI, which will make the entire Gemini model suite - including video, image, speech, and music generation - accessible within Oracle Fusion Cloud Applications across various departments such as finance, HR, supply chain, sales, service, and marketing. Oracle customers will also be able to deploy Gemini models using their existing Oracle Universal Credits, potentially simplifying adoption and controlling costs. Use cases and industry impact Gemini models are designed to provide accuracy and performance for enterprise use cases, partly due to their grounding in up-to-date Google Search data, large context windows, and data privacy features. The models can be used for knowledge retrieval, productivity tools, advanced software development, and sector-specific solutions. Specialised industry models like MedLM for healthcare are among the offerings expected for future integration. The presence of these models within existing Oracle platforms aims to streamline the adoption of AI across industries, supporting teams in tasks that range from automating business processes to building AI-powered agents. Customer access and integration With the expanded partnership, Oracle states customers will have more flexibility and choice over the models they use. As future integrations are developed, customers will be able to select from a range of Gemini models via Vertex AI, directly within Oracle's cloud applications ecosystem. "Today, leading enterprises are using Gemini to power AI agents across a range of use cases and industries," said Thomas Kurian, CEO, Google Cloud. "Now, Oracle customers can access our leading models from within their Oracle environments, making it even easier for them to begin deploying powerful AI agents that can support developers, streamline data integration tasks, and much more." Google's Gemini models have been cited for their enterprise suitability due to features such as encryption, privacy controls, and reasoning abilities. Clay Magouyrk, President, Oracle Cloud Infrastructure, stated, "Oracle has been intentional in offering model choice curated for the enterprise, spanning open and proprietary models. The availability of Gemini on OCI Generative AI service highlights our focus on delivering powerful, secure, and cost-effective AI solutions that help customers drive innovation and achieve their business goals." Performance and scalability Oracle continues to position its infrastructure as a foundation for running intensive AI workloads. According to the companies, Oracle Cloud Infrastructure offers specialised, cost-effective GPU instances suitable for applications in generative AI, natural language processing, computer vision, and recommender systems. The collaboration is described as a means for customers to apply generative and agentic AI to business needs, with a focus on meeting enterprise requirements for security, adaptability, and performance. Through this partnership, both companies aim to facilitate the deployment of multimodal and AI agent technologies in a broad range of enterprise scenarios.