SecurityBrief Asia - Technology news for CISOs & cybersecurity decision-makers
Asia
Everpure adds 1touch data discovery to cyber recovery

Everpure adds 1touch data discovery to cyber recovery

Thu, 21st May 2026 (Today)
Joseph Gabriel Lagonsin
JOSEPH GABRIEL LAGONSIN News Editor

Everpure has expanded its cyber resilience offering by adding data discovery technology from 1touch, putting greater emphasis on the storage layer in cyber recovery.

The addition gives customers more context about the data they hold, helping them decide which systems to restore first after an attack instead of relying on broad recovery processes.

That reflects a wider shift in cybersecurity as companies increasingly plan for the possibility that perimeter defences will fail. In this model, the ability to preserve clean copies of data and recover them quickly has become central to business continuity planning.

Everpure's approach relies on immutable snapshots and an isolated control layer designed to protect recovery points from tampering or deletion, even if an attacker gains high-level administrative access elsewhere in an organisation's environment.

Sensitive recovery actions also require multi-party approval outside the normal production environment. The structure is intended to prevent attackers, or automated systems acting without oversight, from destroying protected data during or after a breach.

Recovery focus

Executives at the storage supplier are framing recovery speed and confidence as the key test of resilience. Its systems are designed to cut restoration times from days to minutes while reducing the operational burden that often follows a cyber attack.

Everpure linked that argument to rising financial pressure on companies dealing with security incidents, citing an average data breach cost of USD $4.44 million and the risk of incomplete recovery after ransomware attacks.

A central part of the strategy is the integration of 1touch, a business acquired earlier this year. Its data discovery tools add context by mapping links between business applications and the data they rely on, helping customers identify which operations are most important to restore first.

That could matter in incidents where organisations must bring systems back in stages. Rather than restoring infrastructure in the order it was lost, businesses may choose to prioritise services tied to revenue, customer operations or regulated data.

"The modern enterprise is defined by its data, yet most organisations are flying blind, treating their most valuable asset as a commodity to be warehoused," said Prakash Darji, General Manager of Digital Experience at Everpure.

"We are doubling down on that reality. By architecting our platform to be both data-aware and inherently resilient, we aren't just managing data-we are delivering an insurance policy against the chaos of the AI era. We are giving our customers the certainty that no matter what happens at the perimeter, the heartbeat of their business stays strong," Darji said.

Attack example

Everpure also pointed to a recent incident involving a Fortune 100 organisation in which attackers used stolen credentials and built-in software tools to disable identity and compute systems without deploying malware. The attackers deleted thousands of endpoints and virtual clusters, but could not access protected snapshots in the data layer, according to the company.

That separation allowed the customer to restore revenue-critical operations within hours rather than weeks. Everpure did not name the organisation.

The case illustrates a growing concern among security teams that attacks are becoming harder to detect through traditional methods alone, especially when intruders use legitimate credentials and native tools already present in the environment.

For storage providers, the trend has created an opening to argue that infrastructure once viewed mainly as a back-end utility now plays a direct role in cyber defence and incident response. Everpure is positioning its platform around that argument, linking data management, governance and recovery into a single operational layer across on-premises and cloud systems.

It also integrates with external threat intelligence, security analytics and data protection products so that signals from security systems can inform actions at the storage layer.