Please fill in the form below to subscribe to our blog

Security Highlights from Kaseya Connect 2025

May 06, 2025

Cybersecurity was front and center at Kaseya Connect 2025. As IT professionals continue to face rising threats and growing client demands, this year’s event delivered a full slate of security-focused programming designed to help attendees harden defenses, sharpen skills and stay ahead of attackers.

From expert-led keynotes and hands-on workshops, the event offered actionable strategies and practical tools to tackle today’s most pressing security challenges.  Kaseya also unveiled several exciting innovations to make life a little easier for IT professionals. Attendees learned how to strengthen identity protection, enhance incident response and leverage AI-driven defenses.

Kaseya Connect 2025 provided insights to help IT professionals succeed. Here’s a roundup of the key security sessions and innovations that made waves at this year’s event.


Get expert advice for protecting your organization’s most vulnerable gateway in this infographic. DOWNLOAD IT>>



With security top of mind for many attendees, Kaseya introduced a new pre-day event designed to equip IT professionals with the insights they need to protect their networks and data. Kaseya Security Live is the latest addition to Kaseya Connect’s pre-day programming. This inaugural event featured sessions packed with expert insights, hands-on learning opportunities and smart strategies for proactive security.

Jim Lippie, Chief Product Officer at Kaseya, and Andrew Morgan, Founder and CEO of Right of Boom, opened the day with an energetic presentation. Their strong, upbeat introduction framed the importance of the day’s topics against the backdrop of the latest cybercrime statistics. The high-energy start got the audience excited and ready to dive into the sessions ahead.

The excitement was well warranted with the keynote presentation that followed. “Keys to the Kingdom: Safeguarding Identity in Electronic Communications,” led by Patterson Cake, DFIR Consultant at Black Hills Information Security. Cake provided an inside look at the importance of identity protection. He detailed how easily bad actors can gather information that enables them to access networks, steal data and conduct cyberattacks using hard-to-spot phishing lures and deepfakes.

In one striking example highlighted during the session, attendees learned of a devious business email compromise attempt that was thwarted not by the company’s defenses, but by a small mistake the attackers made. Cybercriminals targeted a company by posing as a vendor it had previously done business with, seeking immediate payment for a fraudulent invoice. They claimed a company executive had already authorized the payment.

Before transferring the funds, the employee diligently followed the company’s security protocols, which included scheduling a Zoom call with the relevant executive to confirm the authorization. However, the attacker intercepted the invitation and set up a fake Zoom meeting using a highly convincing deepfake of the executive, someone the employee personally knew. The scheme ultimately failed because the fake executive addressed the employee by her full name, rather than the familiar nickname her colleagues typically used.


Are you feeling overwhelmed by IT tasks? Let us show you how to reduce your security workload! GET TIPS>>



The learning continued after the introductory portion of the program with three hands-on workshops that gave attendees the opportunity to hone their skills in expert-led sessions.

  • AiTM Attacks on Microsoft 365: The Adversary-in-the-middle attack (AiTM) spotlight showed how attackers can intercept authentication, how to stop them and how to strengthen defenses.
  • Demystifying EDR: This exciting session explained how endpoint detection and response boosts threat detection and how to use the MITRE ATT&CK framework.
  • Incident Response Planning: Attendees learned why incident response planning is critical for every business, including a practical walk-through about how to build and execute incident response plans.

The Kaseya Security Live pre-day event proved to be an interesting and educational addition to Kaseya’s pre-day programming lineup.


Get to know the players, commodities and places that are shaping today’s dark web. DOWNLOAD EBOOK>>



On the main stage, attendees were treated to a flurry of announcements about Kaseya’s latest innovations, including the launch of Kaseya 365 Ops. Among the many forward-looking advancements, Kaseya unveiled several key security-related developments:

  • Kaseya SIEM: Chief Product Officer Jim Lippie introduced a game-changing, cost-effective SIEM (Security Information and Event Management) response system with SaaS Alerts and MDR protection. Kaseya SIEM correlates threat data from RocketCyber and SaaS Alerts, combining endpoint and cloud telemetry to deliver unified, faster and more actionable threat detection.
  • Backup and recovery streamlined: Frank Debenedetto, GTM General Manager, MSP Suite, introduced enhancements to Kaseya’s backup solutions. The headline announcement was the introduction of free-to-use Datto BCDR hardware, available for any appliance model and any term length.
  • The return of an old favorite: The new, long-awaited ALTO 5 dropped. The ALTO 5 features bolstered security, including enhanced encryption, offering stronger data protection at no additional cost.
  • Disaster recovery in a single click: One highly anticipated enhancement is one-click disaster recovery. Launched from a user friendly wizard, this feature enables IT professionals to restore a company’s operations after an incident in minutes with a single click.
  • Cleanup after an incident made easy: IT professionals can tear down their disaster recovery environment in a single click when the cloud resources are no longer needed. 

This showcase was the perfect way to launch a dynamic event focused on Kaseya’s innovations that make IT professionals’ lives easier and defending business networks simpler.


IDA-GRP-Blog-Image-May

Take a deep dive into why an AI-powered anti-phishing solution is a smart financial choice. GET EBOOK>>



As cybercriminals continue to evolve their tactics, modern defenses built on automation, AI and cyber resilience will be critical. From eye-opening deep dives into emerging attack techniques to hands-on workshops and groundbreaking product innovations, this year’s security programming armed Connect attendees with knowledge, tools and strategies to better protect their clients and businesses.

With new enhancements across Kaseya’s cybersecurity solutions and a sneak peek into an expanding security roadmap, Kaseya demonstrated how it is giving IT professionals the power to meet security challenges head-on. Kaseya Connect 2025’s security programming made one thing clear: The cyberthreat landscape isn’t slowing down, and neither is Kaseya’s commitment to IT professionals.

Learn more about the exciting programming on offer at Kaseya Connect in our event recaps in the Kaseya blog.


Read our case studies and see how MSPs and businesses have benefited from using our solutions. READ NOW>