Menu

Nasuni Bolsters Cybersecurity, Integrates with Microsoft Sentinel

Nasuni Bolsters Cyber Security, Integrates with Microsoft Sentinel

The News: Cloud global file system vendor Nasuni added targeted restore capabilities to the Nasuni Ransomware Protection add-on service to streamline recovery, and integrated its ransomware recovery with Microsoft Sentinel. You can read more about the news on the Nasuni website.

Nasuni Bolsters Cybersecurity, Integrates with Microsoft Sentinel

Analyst Take: The Nasuni File Data Platform stores files, data, and metadata as objects in public clouds. It caches frequently-accessed files and on-premises virtual appliances for quick access. The architecture allows geographically-dispersed workers to collaborate while providing enterprise data availability and protection.

Nasuni’s targeted restores allow customers to:

  • Minimize impact of a ransomware attack on the business, dramatically reducing risk that an attack on file shares will impact operations
  • Recover only encrypted files identified in the incident
  • Automatically save key details on affected files and the last clean snapshot of data when engaging in the restore process
  • Manage IT and SecOps timelines and reduce administrative tasks, fully documented attack details to meet reporting, regulatory, and insurance requirements
  • Simplify setup of Nasuni’s Rapid Recovery process with a few clicks

Sentinel is Microsoft’s security information and event management (SIEM) platform. Integration with Sentinel allows Nasuni to automatically capture threat events and send them to Sentinel for analysis. SIEM systems such as Sentinel can help detect anomalies in file behavior, and use AI to automate incident response and act to:

  • Disable Active Directory accounts of targeted users
  • Analyze user activity leading up to the event
  • Investigate threats and hunt suspicious activities

Microsoft Log Analytics Workspace gathers and shares Nasuni event and audit logs at any Nasuni distributed device for constant monitoring with the Sentinel platform.

Security Needs to Be Built in, Not Bolted On

Security can be a challenge for companies that store critical data in public clouds. Storing data in such a distributed manner provides criminals with a larger attack surface. Strong encryption is required, plus a secure connection to the cloud. And those capabilities must be delivered with little or no impact on performance.

So, it’s no surprise that Nasuni has made security a focus from the start, building immutable snapshots, versioning, and encryption into its global file system. It added the Ransomware Protection add-on service in 2022. Like its cloud global file system rival CTERA, Nasuni has continued to add security capabilities. Nasuni claims it can recover millions of files in seconds with its Ransomware Protection’s targeted restores.

Disclosure: The Futurum Group is a research and advisory firm that engages or has engaged in research, analysis, and advisory services with many technology companies, including those mentioned in this article. The author does not hold any equity positions with any company mentioned in this article.

Analysis and opinions expressed herein are specific to the analyst individually and data and other information that might have been provided for validation, not those of The Futurum Group as a whole.

Other insights from The Futurum Group:

Cyber-Detection and Recovery Drive Commvault’s Strategy

IBM Augments its Cyber-Resiliency Stack with Storage Defender, in Collaboration with Cohesity

Cybersecurity is Everyone’s Job

Author Information

Dave focuses on the rapidly evolving integrated infrastructure and cloud storage markets.

Related Insights
Will MS Copilot Cowork Enable Real Enterprise AI Collaboration?
April 1, 2026

Will MS Copilot Cowork Enable Real Enterprise AI Collaboration?

Keith Kirkpatrick, VP & Research Director at Futurum, discusses Microsoft’s Copilot Cowork in Frontier, and discusses the steps Microsoft will need to take to enable enterprise-grade usage by customers....
CrowdStrike Deepens Agentic SOC Strategy Across Partners, Services, and Devices
April 1, 2026

CrowdStrike Deepens Agentic SOC Strategy Across Partners, Services, and Devices

Fernando Montenegro, VP & Practice Lead for Cybersecurity & Resilience at Futurum, examines CrowdStrike’s agentic SOC expansion across partners, IBM, and Intel, and what it means for security execution and...
LevelBlue–SentinelOne Partnership: Does Unified Security Improve Outcomes?
April 1, 2026

LevelBlue–SentinelOne Partnership: Does Unified Security Improve Outcomes?

Fernando Montenegro, VP & Practice Lead for Cybersecurity & Resilience at Futurum, analyzes the LevelBlue SentinelOne partnership and its focus on integrating threat intelligence, AI detection, and response to improve...
Palo Alto Bets on Agentic Endpoints Before Anyone Else Does
April 1, 2026

Palo Alto Bets on Agentic Endpoints Before Anyone Else Does

Palo Alto Networks bets big on AI agent security through Koi acquisition, with CEO Nikesh Arora backing it with a $10M stock purchase, positioning the company as first to formally...
IBM Pushes Voice AI Into watsonx. Can It Drive Enterprise Adoption
March 31, 2026

IBM Pushes Voice AI Into watsonx. Can It Drive Enterprise Adoption?

Nick Patience, VP and AI Practice Lead at Futurum, examines IBM ElevenLabs voice AI integration and how it enables multilingual, secure, voice-first AI agents within watsonx Orchestrate for enterprise workflows....
Bluesky's Attie Backlash Reveals the AI Trust Deficit in Social
March 31, 2026

Bluesky’s Attie Backlash Reveals the AI Trust Deficit in Social

Bluesky's Attie AI became the platform's second-most blocked account, revealing users' deep distrust of uninvited AI in personal spaces—a critical signal for enterprise AI strategies....

Book a Demo

Newsletter Sign-up Form

Get important insights straight to your inbox, receive first looks at eBooks, exclusive event invitations, custom content, and more. We promise not to spam you or sell your name to anyone. You can always unsubscribe at any time.

All fields are required






Thank you, we received your request, a member of our team will be in contact with you.