Search company, investor...

Founded Year



Acquired | Acquired

Total Raised




About Zerto

Zerto operates as a company focused on cloud data management and protection in the technology sector. It offers a software-only platform that simplifies the protection, recovery, and mobility of applications both on-premises and in the cloud, eliminating the risks and complexity of modernization and cloud adoption. It primarily sells to sectors such as the financial, government, healthcare, and legal industries, as well as managed service providers. The company was founded in 2009 and is based in Boston, Massachusetts. In July 2021, Zerto was acquired by Hewlett Packard Enterprise.

Headquarters Location

27-43 Wormwood Street Suite 530

Boston, Massachusetts, 02210,

United States




Expert Collections containing Zerto

Expert Collections are analyst-curated lists that highlight the companies you need to know in the most important technology spaces.

Zerto is included in 1 Expert Collection, including Cybersecurity.



7,290 items

These companies protect organizations from digital threats.

Zerto Patents

Zerto has filed 35 patents.

The 3 most popular patent topics include:

  • cloud infrastructure
  • data management
  • hardware virtualization
patents chart

Application Date

Grant Date


Related Topics




Cloud storage, Data management, Enterprise application integration, Backup, Data synchronization


Application Date


Grant Date



Related Topics

Cloud storage, Data management, Enterprise application integration, Backup, Data synchronization



Latest Zerto News

BrandPost: Combatting ransomware with layered Zero Trust Security

Nov 14, 2023

iStock Ransomware is a growing threat to organizations, according to research independently conducted by Enterprise Strategy Group and sponsored by Zerto, a Hewlett Packard Enterprise company. 46% of organizations experienced ransomware attacks at least monthly—with 11% reporting daily attacks. “Regardless of whether the attack was successful, the reality is that it’s not a matter of if an attack will occur, but rather when it will strike,” the report stated. “Therefore, it’s crucial to acknowledge that ransomware poses a significant and immediate threat that cannot be ignored, and immediate action must be taken to combat it.” Ransomware defense can be challenging. Sophisticated and well-funded cybercriminals often target high-profile organizations, conducting surveillance to effectively attack vulnerable users—employees and, more recently, third-party service providers with access to data from many different organizations. [ii] Social engineering and phishing emails (as well as texts and voice contacts) are the most common attack vectors for ransomware. [iii] Once the victim clicks on an infected attachment or link, malware is installed and ransomware can spread. Defending against ransomware with Zero Trust Security A good cybersecurity defense strategy starts with user education and threat awareness. When those measures fall short, Zero Trust Security can fill the gaps. Zero Trust Security models support least-privilege access—restricting user and device access to just the resources needed to do their job or fulfill their function, as long as the subject meets security posture requirements and is not suspected of compromise. Note that Zero Trust is a security paradigm—not a single product. In fact, the role-based network access controls at the core of Zero Trust are often cobbled together across multiple disparate solutions in a disjointed fashion, requiring manual effort, adding complexity, and increasing risk of inconsistencies. Five core capabilities form the foundation of Zero Trust Security. The importance of layered security A layered Zero Trust Security approach to combatting ransomware involves establishing and continuously monitoring trust across multiple layers—potential attack surfaces and propagation points—of the IT architecture. Zero Trust Security trust mechanisms can be fortified by additional defenses and security services. As a first step, consider the role the network can play in protecting the organization against ransomware. Identify and destroy malware before it takes hold. An employee receives an email with malware cloaked behind a legitimate-looking attachment—the organization is now just one click away from a potentially catastrophic ransomware incident. Organizations need a way to thwart malware-based attacks before they can propagate. HPE Aruba Networking SSE can help with a sandbox feature that enables organizations to test suspicious files in a safe virtual environment and destroy malicious files before they cause damage. Sandbox capabilities from HPE Aruba Networking SSE  thwart ransomware attacks by destroying malicious files before they cause damage. Prevent compromised devices from accessing the network. Should an attack originate via a corporate or BYOD endpoint device, endpoint and extended detection and response (EDR and XDR) systems can analyze and detect anomalous behavior to raise an alert. With HPE Aruba Networking ClearPass, IT teams can define policies that automate network enforcement and response based on threat telemetry data supplied by EDR/XDR solutions within the Aruba 360 Security Exchange. For example, when the EDR/XDR suspects a device is participating in an attack, ClearPass network access control can automatically limit or revoke network access pending further investigation. Limit lateral spread of attacks. Over-broad or poorly monitored network access policies can make it easier for attacks to expand throughout the organization. This lateral spread can lead to increased damage, more difficult remediation, and longer data breach response times. To avoid this, try a multi-pronged approach to delivering least-privilege access. For users that do not require corporate network access, HPE Aruba Networking ZTNA delivers least-privilege access to applications, providing a direct, secure path to the applications users need while restricting their access to other parts of the network, reducing potential attack surface. For users and devices on the network, Dynamic Segmentation unifies role-based access and continuous policy enforcement across network infrastructure, ensuring subjects only communicate with destinations consistent with their role, context, and security posture.—This prevents compromised devices from reaching corporate resources and external malware sites. Given the increasing sophistication of ransomware attacks, not all attacks may be thwarted at the network level. Continuous data protection plays an important part in comprehensive ransomware protection strategies by enabling organizations to manage, protect, recover, and move data and applications across on-premises or cloud destinations. Ransomware resilience solution Zerto detects  anomalous encryption activity in real-time, then allows organizations to quickly rewind to a point in time just prior to the infection and restore the unencrypted files and VMs. As a last line of defense, the Zerto Cyber Resilience Vault —including HPE Aruba Networking switching—uses an ultra-secure Zero Trust architecture to provide an ironclad recovery solution tailored to specific regulatory and compliance requirements. Protect your organization with Zero Trust Security Though Cybersecurity Awareness Month may be wrapping up, it’s always a good time to explore how Zero Trust Security can protect your organization from threats like ransomware. Check out these resources to learn more.

Zerto Frequently Asked Questions (FAQ)

  • When was Zerto founded?

    Zerto was founded in 2009.

  • Where is Zerto's headquarters?

    Zerto's headquarters is located at 27-43 Wormwood Street, Boston.

  • What is Zerto's latest funding round?

    Zerto's latest funding round is Acquired.

  • How much did Zerto raise?

    Zerto raised a total of $183.4M.

  • Who are the investors of Zerto?

    Investors of Zerto include Hewlett Packard Enterprise, 83North, Battery Ventures, U.S. Venture Partners, RTP Global and 12 more.

  • Who are Zerto's competitors?

    Competitors of Zerto include VMware and 5 more.


Compare Zerto to Competitors

Acronis Logo

Acronis unifies data protection and cybersecurity, delivering cyber protection. The company offers antivirus, backup, disaster recovery, endpoint protection management solutions, artificial intelligence (AI) based antimalware, and blockchain-based data authentication technologies through a service provider and information technology (IT) professional deployment models. Acronis primarily serves the cybersecurity sector. It was founded in 2003 and is based in Schaffhausen, Switzerland.

Continuity Software Logo
Continuity Software

Continuity Software is a cybersecurity company that operates in the data storage industry. The company offers a vulnerability management solution for enterprise storage systems, which continuously scans and analyses data storage systems to detect security risks, prioritizes these risks based on urgency and business impact, and provides clear recommendations for repairing these risks. Continuity Software primarily serves sectors such as banking and finance, telecom, energy and utilities. It was founded in 2005 and is based in New York, New York.

Tintri Logo

Tintri (NASDAQ: TNTR) provides artificial intelligence (AI) powered data management solutions. It helps information technology (IT) organizations to focus on virtualized applications and business services. The company offers databases, data protection, data recovery, and more. It was founded in 2008 and is based in Mountain View, California. In September 2018, Tintri was acquired by DDN at a valuation of $60 million.


HYCU provides multi-cloud backup and recovery-as-a-services. It provides data protection, migration, and disaster recovery to companies. It helps to eliminate the complexity, risk, and high cost of legacy-based solutions, providing data protection services, and more. The company was founded in 2018 and is based in Boston, Massachusetts.

DataCore Software Logo
DataCore Software

DataCore Software offers data protection and data storage solutions. It provides operating systems and infrastructure software for the emerging storage area networking (SAN) marketplace. Its solutions include storage solutions for business continuity and disaster recovery, hyper-converged infrastructure, data protection, infrastructure modernization, and more. The company was founded in 1998 and is based in Fort Lauderdale, Florida.

Scale Computing Logo
Scale Computing

Scale Computing is a company that specializes in edge computing, virtualization, and hyperconverged solutions. The company offers a fully integrated, highly available system for running applications, which eliminates the need for traditional virtualization software, disaster recovery software, servers, and shared storage. Its main customers are distributed enterprises, global retailers, and small to medium-sized businesses. It was founded in 2007 and is based in Indianapolis, Indiana.


CBI websites generally use certain cookies to enable better interactions with our sites and services. Use of these cookies, which may be stored on your device, permits us to improve and customize your experience. You can read more about your cookie choices at our privacy policy here. By continuing to use this site you are consenting to these choices.