Cayosoft today reported record growth, product innovation and customer momentum in 2025. Cayosoft significantly expanded its presence across enterprise and government sectors, adding the Internal Revenue Service (IRS), U.S. Department of War (DoW), CCL Industries, athenahealth, Australian Trade and Investment Commission, and Heartland Coca-Cola, among others. The company also invested in new technology innovations and earned industry accolades from Gartner, CISA, and other organizations.
Used by 90% of large organizations worldwide, Microsoft Active Directory and Entra ID remain the backbone of enterprise identity, serving as the central hub for managing permissions, logins, and access. Cayosoft delivers the industry’s only unified solution for identity security and operational resilience that supports all on-premises and cloud Microsoft environments, including Active Directory, Entra ID, Microsoft 365, and Intune.
In addition to expanding its customer base, Cayosoft achieved other significant milestones and accolades last year, including:
Industry Recognition & Analyst Validation
In 2025, Cayosoft earned expanded industry and analyst acclaim, including:
- Named a finalist for the InfoWorld 2025 Technology of the Year Award in Cloud Backup and Disaster Recovery.
- Affirmed the technical and economic advantages of Cayosoft Guardian Instant Forest Recovery by analyst firm Paradigm Technica, validating that the Cayosoft solution is at least 99% faster than specialized or general-purpose alternatives—setting a new industry benchmark for identity resilience.
- Featured in seven Gartner reports in the last 12 months, including a newly released January 2026 report, Market Guide for Microsoft 365 Governance Tools, reinforcing Cayosoft’s growing influence and credibility with prominent analysts and enterprise buyers.
- Recognized by CISA and listed on the Secure by Design page, validating Cayosoft’s secure-by-default approach to identity governance and resilience.
Product Adoption, Innovation & Velocity
Cayosoft’s innovation engine saw one of its biggest years ever:
- Secured SOC 2 Type II certification, reinforcing its commitment to enterprise-grade security and compliance and confirming that Cayosoft maintains robust, independently audited security controls that perform effectively over an extended period.
- Delivered over 148 net-new features and enhancements in Cayosoft’s core platform in 2025, reflecting one of the most active innovation cycles in the company’s history.
- Released Cayosoft Guardian Protector, the industry’s first free, always-on threat detection for Active Directory and Entra ID.
- Announced the upcoming Cayosoft Guardian SaaS to be generally available in Q2 2026.
Business Momentum, Customer Expansion & Adoption
Cayosoft reported 76% year-over-year annual recurring revenue growth, driven by:
- A significant increase in net-new enterprise customers and expanding adoption across highly regulated industries and complex environments.
- Continued strength in legacy AD vendor tool replacement business from Quest Software and Semperis.
- Strong demand and traction from large enterprises and state, local and federal government organizations, including:
- Heartland Coca-Cola
- Australian Trade and Investment Commission
- Los Angeles County Employees Retirement Association (LACERA)
- CCL Industries
- athenahealth
- Internal Revenue Service (IRS)
- U.S. Department of War (DoW)
- Yukon Hospital Organization
For more information about Cayosoft’s solutions for managing and protecting the modern Microsoft enterprise, visit cayosoft.com.
The CISA Has Provided Two Warnings That You Should Pay Attention To
Posted in Commentary with tags CISA on February 19, 2026 by itnerdThe CISA has given US government agencies three days to patch their systems against a maximum-severity hardcoded credential vulnerability (CVE-2026-22769)in Dell’s RecoverPoint solution exploited by the UNC6201 Chinese hacking group since mid-2024 https://www.cisa.gov/news-events/alerts/2026/02/18/cisa-adds-two-known-exploited-vulnerabilities-catalog.
Ensar Seker, CISO at threat intelligence company SOCRadar:
“When CISA orders agencies to patch within three days, that signals confirmed active exploitation and real operational risk. This is not theoretical exposure. A hardcoded credential vulnerability like CVE-2026-22769 effectively removes authentication as a barrier. If exploited, it can lead to root-level persistence, which is extremely difficult to detect and eradicate.
“The three-day mandate reflects two things: first, the vulnerability likely provides reliable post-exploitation value; second, federal systems running backup and recovery platforms are high-value targets. Backup infrastructure is especially sensitive because compromising it weakens an organization’s last line of defense against ransomware and destructive attacks. What makes this particularly concerning is that exploitation reportedly began in mid-2024. That means adversaries may have had months of dwell time in some environments. Even after patching, agencies must assume possible compromise and validate integrity, credentials, and persistence mechanisms.
“The real takeaway for enterprises is this: if federal agencies get three days, the private sector should not assume they have three weeks. When a vulnerability combines maximum severity, hardcoded credentials, and active exploitation, patching becomes a board-level risk discussion, not just an IT task.”
On top of that, the CISA published an advisory warning that a critical security vulnerability (CVE-2026-1670) has been identified in four Honeywell CCTV camera models that could allow attackers to bypass authentication and take control of device accounts.
The flaw is classified as “missing authentication for critical function” and has been given a CVSS severity score of 9.8.
According to the advisory, the vulnerability stems from an unauthenticated API endpoint that lets attackers remotely change the “forgot password” recovery email address associated with a camera account. By modifying this recovery email without needing credentials, an attacker could potentially take over the account and gain unauthorized access to live camera feeds or administrative functions.
Honeywell is a widely deployed global supplier of security and video surveillance equipment, including many NDAA-compliant cameras used in government, industrial, and commercial critical infrastructure environments.
Nick Mo, CEO & Co-founder, Ridge Security Technology Inc. provided this comment:
“IoT assets like cameras and smart printers remain massive security blind spots. While organizations obsess over protecting “crown jewel” databases, attackers exploit these overlooked devices as easy entry points.
“The Honeywell zero-day (CVE-2026-1670) shows how a single vulnerability in a CCTV system can compromise critical infrastructure. Whether it’s a sophisticated exploit or a basic failure—like the 2025 Louvre heist where the password was just “Louvre”—the risk is the same: neglected hardware creates an open door.
“Security testing must include every connected device. Find the holes before the hacker does.”
Michael Bell, Founder & CEO, Suzu Labs had this comment:
“The device you installed to protect the building just became the way into the network. CVE-2026-1670 lets an unauthenticated attacker change the password recovery email on affected Honeywell cameras and take over the account, no credentials needed. These are NDAA-compliant models that go into government facilities and critical infrastructure, and the vulnerability is an open API endpoint on a password reset function.
“A physical security contractor puts the cameras up, plugs them into whatever network is available, and IT may never know they’re there. Nobody patches a device nobody knows they own, and nobody segments a device that isn’t in the asset inventory. CISA hasn’t seen active exploitation yet, so there’s still a window to get ahead of this one.”
John Carberry, Solution Sleuth, Xcape, Inc. adds this comment:
“The discovery of CVE-2026-1670 in Honeywell CCTV cameras serves as a stark reminder that the surveillance systems safeguarding our critical infrastructure are frequently exposed to the public Internet. By leaving a “forgot password” API endpoint unauthenticated, Honeywell inadvertently enabled remote hijacking of device accounts. Attackers could simply redirect recovery emails to themselves, gaining unauthorized access.
“This vulnerability, boasting a near-perfect CVSS score of 9.8, grants attackers a straightforward route from digital compromise to physical surveillance. This affects NDAA-compliant systems in government and industrial sectors. For Security Operations Center (SOC) teams, the presence of these devices on public-facing networks without VPNs or stringent access controls now constitutes an immediate liability.
“This issue highlights a fundamental lapse in secure-by-design principles for hardware entrusted with protecting our most sensitive assets. As we increasingly adopt “smart” security solutions for our perimeters, it’s crucial to understand that an unpatched camera is not only a guardian, but it can also become an open portal for pivoting to other sensitive systems.
“Organizations utilizing affected models must prioritize firmware updates, limit external access through network segmentation, and diligently monitor for any unauthorized configuration changes.
“When your security cameras can be commandeered remotely, the watcher becomes the watched.”
The CISA does a lot of good work to keep people safe from a cybersecurity standpoint. Thus I would heed their warnings and take action ASAP when they appear.
Leave a comment »