Workflow
HYCU Delivers Industry-First Backup for Microsoft 365 and Cloud Services With 100% Data Control and Storage Efficiency
MSFTMicrosoft(MSFT) GlobeNewswire News Room·2025-05-20 19:01

Core Insights - HYCU, Inc. announced enhanced support for Dell PowerProtect Data Domain Virtual Edition to protect SaaS and Cloud workloads, providing comprehensive solutions for backup, disaster recovery, data retention, and offline recovery [1][4] - The rapid growth of SaaS applications has led to increased targeting by cybercriminals, with 70% of organizations reporting data loss in SaaS applications over the past year, highlighting a significant gap in data protection for these environments [2][3] - The partnership between HYCU and Dell Technologies aims to deliver enterprise-grade backup and recovery solutions across various infrastructures, enhancing data protection for over 80 workloads [4][5] Company Overview - HYCU is recognized as a leader in multi-cloud and SaaS data protection, providing data backup and recovery solutions that simplify the process and reduce costs associated with legacy systems [9] - The company has raised $140 million in venture capital funding and boasts an industry-leading Net Promoter Score (NPS) of 91, indicating strong customer satisfaction [9] Product Features - Key features of HYCU R-Cloud include customer-owned immutable backups, flexible and granular recovery options, and long-term data retention solutions that comply with regulatory mandates such as HIPAA and DORA [6] - The solution allows for automatic policy-driven backups stored securely on customer-managed systems, ensuring data accessibility during outages or supply chain attacks [6] Market Context - The increasing reliance on SaaS applications by enterprises, with the average midsize company using over 200 SaaS applications, has created a pressing need for robust data protection solutions [3] - The collaboration with Dell aims to address the challenges faced by organizations in safeguarding their data landscape, particularly in the context of evolving cyber threats [3][5]