Artificial Intelligence | News | Insights | AiThority
[bsfp-cryptocurrency style=”widget-18″ align=”marquee” columns=”6″ coins=”selected” coins-count=”6″ coins-selected=”BTC,ETH,XRP,LTC,EOS,ADA,XLM,NEO,LTC,EOS,XEM,DASH,USDT,BNB,QTUM,XVG,ONT,ZEC,STEEM” currency=”USD” title=”Cryptocurrency Widget” show_title=”0″ icon=”” scheme=”light” bs-show-desktop=”1″ bs-show-tablet=”1″ bs-show-phone=”1″ custom-css-class=”” custom-id=”” css=”.vc_custom_1523079266073{margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}”]

Data443 Announces Another Successful Contract Expansion with Leading US Bank for Data443 Enterprise File Transfer

Data443 Risk Mitigation, Inc. (Data443), a data security and privacy software company for “All Things Data Security,” announces an additional contract win of $483,788 from one of the ‘Big Four’ US-based banks and largest fintech companies.

The Client has expanded its usage of Data443’s leading secure file transport platform for the core of its intra-bank and governmental federal reserve data interchanges. Data443’s Data Placement Manager continues to deliver secure, stable and high-performance services for its thousands of partner banks, brokerage houses and multi-national government clients.

Operating on the HPE Non-Stop platform, this fintech leader has enjoyed years of 100% uptime service delivery at an improving cost-per transaction model. In light of recent ransomware and malware attacks for other MFT (managed file transfer) software providers, the unique capability of secure code implementations and hardened infrastructure, such as the HPE Non-Stop platform, are a major differentiator for the platform and why Data443 is in the upper echelon of providers to financial services organizations.

AiThority: How AI Can Improve Public Safety

In Gartners report, “Innovation Insight for Leveraging Isolated Recovery Environments and Immutable Data Vaults to Protect and Recover From Ransomware,” ransomware attacks have become so common that it’s no longer a matter of if you will be attacked, but when. Even worse is the focus of ransomware attacks to target backup systems, compromising backup data and even taking administrative control to change settings and expire data.

Related Posts
1 of 38,751

Jason Remillard, CEO and Data443 founder commented: “We are happy that Gartner includes Ransomware Recovery as a major capability requirement for data immutable data storage. Our unique capabilities in restoring data and devices are a major differentiator for us and when it’s matched with our MFT capabilities – it really checks many boxes for our customers. This most recent deal is pure organic growth with another longtime customer and is indicative of where we think the market is going – new requirements, tough and complex operating environments and proven runtime are key to winning in this small segment of the data security marketplace.”

Read More: The Practical Applications of AI in Workplace

Mr. Remillard added: “We’ve always been focused on our ‘better together’ product roadmaps for customers. Based on the teams’ expertise in product design and operational deployments, we are uniquely positioned to deliver next-generation capabilities. The multi-cloud operating environment is a perfect world for our capabilities as they have been available for some time on Microsoft Azure, Amazon AWS and Google Cloud Platform. Some of our larger EFT clients use the multi-cloud operating approach for their business-as-usual operations, garnering cost efficiencies that are significant for scale, cost savings and disaster recovery options. Our clients’ significant uptime, volumes and multimillion-dollar investments in Data443 product lines drive our focus and passion for All Things Data™.”

Data443’s Ransomware Recovery Manager provides an immutable data stance and a recovery approach that is second to none – a simple reboot that any user can execute.  Competitors such as Rubrik, Veeam, and Cohesity all require actual explicit IT administrator interactions. This usually includes searching for the backup data files, initiating a restore action, waiting for completion, and eventually getting the data to the end user. These options generally have no capability to actually restore the end-user device itself, which typically requires a full workstation replacement or reinstallation. Recovery timelines vary, but they are not insignificant.

Latest Insights: What Techniques Will Deliver for Measuring Attention in 2023?

[To share your insights with us, please write to]

Comments are closed.