Druva, a leading data security provider, has announced the launch of Threat Watch, a zero-touch, automated, cloud-native solution built to proactively monitor threats hidden within backup data. As cyber threats grow more sophisticated and increasingly evade perimeter defenses, Threat Watch enables organizations to continuously scan backup snapshots for dormant malware and indicators of compromise (IOCs), helping security and IT teams respond faster and recover with confidence.
Today’s security landscape assumes that breaches are inevitable. Consequently, organizations must quickly determine what data was impacted and identify clean recovery points. Because backup data mirrors production environments, it offers a reliable source of truth during incident response and cyber recovery. Threat Watch addresses this need by providing continuous, peace-time monitoring—rather than relying solely on reactive, manual forensic efforts during a crisis.
As regulatory requirements such as DORA and SEC cyber disclosure rules impose tighter reporting timelines, the ability to assess data integrity rapidly has become essential. Threat Watch supports this shift by helping organizations validate recovery readiness early and demonstrate compliance under pressure.
Cyber Technology Insights: Druva Recognized as a Leader in IDC MarketScape 2025
“Cyber resilience isn’t just about having a copy of your data, it’s about the certainty that you can recover without reinfecting your environment,” said Yogesh Badwe, Chief Security Officer at Druva. “Threat Watch brings a peace-time proactive monitor to what has historically been a war-time manual forensic process. With this new capability, we are giving customers the forensic evidence they need to meet strict regulatory windows and have clearer proof of what is safe to restore when the business is under pressure.”
Unlike traditional security tools that require additional infrastructure or agents, Threat Watch operates entirely within Druva’s cloud-native architecture. It scans backup data directly in the Druva Data Security Cloud, outside production systems, ensuring zero impact on live workloads. By eliminating the need to move data to external tools, Druva avoids unnecessary delays and offers the industry’s only Data Movement Latency SLA, enabling near real-time threat detection without added cost or complexity.
This architecture also provides customers with consistent visibility into backup health, which becomes critical during high-stress recovery scenarios.
Cyber Technology Insights: Druva Elevates Agentic Data Security with MetaGraph and New AI Agents
“Reporting timelines are getting tighter, and that puts pressure on teams to confirm what was impacted and what is safe to restore,” said Yong Jie Tan, IT Infrastructure Manager, at Woh Hup. “Threat Watch gives us ongoing visibility into backup health and the evidence we need to support both recovery decisions and audit requirements. It helps reduce uncertainty during an incident and strengthens our overall resilience posture.”
Threat Watch delivers several key benefits, including a curated and customizable IOC library powered by intelligence from CISA, Google Mandiant Threat Intelligence, and Druva ReconX Labs. Customers can also upload their own IOCs through APIs. Continuous scanning shortens breach duration by detecting threats early, while tight integration with Druva’s cyber resilience portfolio enables safe, lossless recovery using Recovery Intelligence.
In addition, Threat Watch is built on Dru MetaGraph, Druva’s real-time data intelligence foundation. Over time, threat signals will feed into DruAI, allowing teams to prioritize risks, assess blast radius, and take decisive action with greater confidence. Automated compliance reports aligned with NIST, ISO, and DORA further strengthen audit readiness.
Threat Watch is generally available for cloud and data center workloads, including Amazon EC2, Azure VMs, and VMware environments, with expanded workload support planned.
Cyber Technology Insights: Druva Launches AI Agents to Transform Cyber Resilience
To participate in our interviews, please write to our CyberTech Media Room at info@intentamplify.com





