Nasuni Bolsters Cybersecurity, Integrates with Microsoft Sentinel

Nasuni Bolsters Cyber Security, Integrates with Microsoft Sentinel

The News: Cloud global file system vendor Nasuni added targeted restore capabilities to the Nasuni Ransomware Protection add-on service to streamline recovery, and integrated its ransomware recovery with Microsoft Sentinel. You can read more about the news on the Nasuni website.

Nasuni Bolsters Cybersecurity, Integrates with Microsoft Sentinel

Analyst Take: The Nasuni File Data Platform stores files, data, and metadata as objects in public clouds. It caches frequently-accessed files and on-premises virtual appliances for quick access. The architecture allows geographically-dispersed workers to collaborate while providing enterprise data availability and protection.

Nasuni’s targeted restores allow customers to:

  • Minimize impact of a ransomware attack on the business, dramatically reducing risk that an attack on file shares will impact operations
  • Recover only encrypted files identified in the incident
  • Automatically save key details on affected files and the last clean snapshot of data when engaging in the restore process
  • Manage IT and SecOps timelines and reduce administrative tasks, fully documented attack details to meet reporting, regulatory, and insurance requirements
  • Simplify setup of Nasuni’s Rapid Recovery process with a few clicks

Sentinel is Microsoft’s security information and event management (SIEM) platform. Integration with Sentinel allows Nasuni to automatically capture threat events and send them to Sentinel for analysis. SIEM systems such as Sentinel can help detect anomalies in file behavior, and use AI to automate incident response and act to:

  • Disable Active Directory accounts of targeted users
  • Analyze user activity leading up to the event
  • Investigate threats and hunt suspicious activities

Microsoft Log Analytics Workspace gathers and shares Nasuni event and audit logs at any Nasuni distributed device for constant monitoring with the Sentinel platform.

Security Needs to Be Built in, Not Bolted On

Security can be a challenge for companies that store critical data in public clouds. Storing data in such a distributed manner provides criminals with a larger attack surface. Strong encryption is required, plus a secure connection to the cloud. And those capabilities must be delivered with little or no impact on performance.

So, it’s no surprise that Nasuni has made security a focus from the start, building immutable snapshots, versioning, and encryption into its global file system. It added the Ransomware Protection add-on service in 2022. Like its cloud global file system rival CTERA, Nasuni has continued to add security capabilities. Nasuni claims it can recover millions of files in seconds with its Ransomware Protection’s targeted restores.

Disclosure: The Futurum Group is a research and advisory firm that engages or has engaged in research, analysis, and advisory services with many technology companies, including those mentioned in this article. The author does not hold any equity positions with any company mentioned in this article.

Analysis and opinions expressed herein are specific to the analyst individually and data and other information that might have been provided for validation, not those of The Futurum Group as a whole.

Other insights from The Futurum Group:

Cyber-Detection and Recovery Drive Commvault’s Strategy

IBM Augments its Cyber-Resiliency Stack with Storage Defender, in Collaboration with Cohesity

Cybersecurity is Everyone’s Job

Author Information

Dave focuses on the rapidly evolving integrated infrastructure and cloud storage markets.

Related Insights
Contact Center Vendors
April 28, 2026

Will Microsoft’s Unified AI Agents Force Contact Center Vendors to Rethink Their Playbooks?

Keith Kirkpatrick, Vice President & Research Director, Enterprise Software & Di at Futurum, analyzes how Microsoft's Dynamics 365 Contact Center is forcing traditional vendors like Genesys and NICE to reimagine...
Enterprise WAN
April 28, 2026

Can T-Mobile’s SuperBroadband Break the Enterprise WAN Monopoly?

Tom Hollingsworth, Research Director, Networking at Futurum, T-Mobile's SuperBroadband service combines 5G, satellite, and fiber to disrupt the enterprise WAN market, offering distributed enterprises an emerging alternative worth evaluating....
ABB Q1 FY 2026 Earnings Driven by Data Center and Grid Demand
April 28, 2026

ABB Q1 FY 2026 Earnings Driven by Data Center and Grid Demand

Olivier Blanchard, Research Director & Practice Lead, Intelligent Devices at The Futurum Group, analyzes ABB’s Q1 FY 2026 earnings, focusing on electrification demand tied to data centers and grid upgrades....
IBM Q1 FY 2026 Earnings Show Software Growth and Mainframe AI Monetization
April 28, 2026

IBM Q1 FY 2026 Earnings Show Software Growth and Mainframe AI Monetization

Futurum Research reviews IBM Q1 FY 2026 earnings, focusing on software mix durability, Confluent-driven data streaming strategy, and mainframe AI inferencing as IBM maintains full-year growth and cash flow expectations....
Can Agentic ITOps Transform IT Incident Management or Will Complexity Stall Progress?
April 28, 2026

Can Agentic ITOps Transform IT Incident Management or Will Complexity Stall Progress?

AI-powered ITOps platforms automate incident detection and remediation, cutting costs from $14,000+ per minute downtime, yet integration challenges and security concerns hinder enterprise adoption....
Is Brave Setting a New Standard for Browser Privacy, or Just Raising the Bar?
April 28, 2026

Is Brave Setting a New Standard for Browser Privacy, or Just Raising the Bar?

Brave claims superior privacy defaults via three-layered tracker and fingerprint blocking, requiring no user setup. As regulators scrutinize tech, this aggressive stance may reset enterprise browser standards....

Book a Demo

Newsletter Sign-up Form

Get important insights straight to your inbox, receive first looks at eBooks, exclusive event invitations, custom content, and more. We promise not to spam you or sell your name to anyone. You can always unsubscribe at any time.

All fields are required






Thank you, we received your request, a member of our team will be in contact with you.