LOAD Strengthens Its Validated Cyber Recovery Offering Through Partnership with Celerity

by | Feb 17, 2026

LOAD enters into a strategic partnership with UK-based Celerity to strengthen its offering in validated cyber recovery and operational resilience for IBM Power environments in Sweden and the Nordic region.

In an era where regulatory requirements such as DORA and NIS2 tighten the demands for verified recovery capability, traditional backup or classic disaster recovery is no longer sufficient. Organizations must be able to demonstrate that their recovery points are tested, clean, and functional—before an incident occurs.

Through the collaboration with Celerity, LOAD introduces a more advanced framework for cyber resilience, based on IBM Power Cyber Vault methodology and continuous validation of immutable copies.

From Backup to Validated Recoverability

CopyAssure, now offered through LOAD, is a managed service for IBM i, AIX, and Linux on IBM Power that:

  • Creates immutable, air-gapped snapshots every hour
  • Performs automated complete system validation in a clean-room environment
  • Ensures that only verified and malware-free copies are restored
  • Reduces RTO from hours to minutes
  • Documents recovery results for audit and compliance

This means that recovery is no longer an assumption—but a proven fact.

Support for DORA, NIS2, and Regulatory Requirements

DORA and NIS2 establish clear requirements for:

  • Tested and documented recovery capability
  • Continuous risk management
  • Traceability and auditability
  • Operational resilience in business-critical systems

Through validated cyber recovery and continuous testing in isolated environments, LOAD can now support organizations with:

  • Documented RTO/RPO performance
  • Audit-ready reporting
  • NIST-aligned architecture
  • Protection against ransomware and logical corruption

This strengthens both the security posture and regulatory preparedness.

Integrated Resilience for IBM Power

As an IBM Platinum Partner, LOAD combines:

  • IBM FlashSystem and HyperSwap for high availability
  • IBM Power Cyber Vault architecture
  • CopyAssure for validated recovery
  • Proactive monitoring and managed services

The result is a cohesive model where:

Availability + Cyber Recovery + Compliance + Operations Monitoring
are integrated into a comprehensive solution for business-critical environments.

Statement from LOAD

“Operational resilience is now a boardroom priority. It is no longer sufficient to simply have backups—you must be able to prove that recovery works. Through our partnership with Celerity, we can now offer validated cyber recovery for IBM Power environments in the Nordic region, while simultaneously supporting our customers’ compliance efforts with DORA and NIS2.”
— Torbjörn Appehl, CEO, LOAD

Next Steps

The partnership is a strategic step in LOAD’s continued focus on:

  • Business-critical IBM infrastructure
  • Cyber resilience and ransomware protection
  • Regulatory preparedness
  • Managed services and proactive operations

More News

Digital & Data Sovereignty – Control Without Isolation

Digital and data sovereignty has evolved from a policy issue to a business-critical reality. Now that IT has become critical infrastructure and data a strategic asset, it is no longer sufficient to rely on assumptions about control, jurisdiction, and security. In this...

Webinar: Modernizing Business-Critical IT with Power11

In this webinar, LOAD presents how Power11 can be used as a platform to modernize business-critical systems – with a focus on stability, security, and long-term control. A strategic perspective for organizations that want to modernize without compromising operations.

Elite performance requires purpose-built equipment

Elite performance isn't just about talent—it's about having the right equipment.In this video, cross-country skier Lisa Eriksson shares her perspective on how modern, purpose-built equipment is crucial for performing at the highest level. The same principle applies to...

Q-Day is approaching – is your encryption ready?

Quantum computers will be able to break many of today's most common encryption algorithms. At the same time, encrypted data is already being collected for future decryption. In this video, we explain what Q-Day means, why the threat is real today, and how...

More News from Load

FlashSystem.ai – when storage goes from necessary infrastructure to a business-driving capability

FlashSystem.ai – when storage goes from necessary infrastructure to a business-driving capability

FlashSystem.ai marks a clear shift in how enterprise storage is used and creates value.
Through intelligent grid architecture, Agentic AI, and computational storage with FlashCore Module 5, IBM demonstrates how storage can go from passive infrastructure to an active, business-driving capability. For organizations looking to reduce complexity, increase resilience, and create space for innovation, this is an important step forward.

Centralized key management and orchestration for enterprises

Centralized key management and orchestration for enterprises

Managing encryption keys across multiple platforms, applications, and storage environments is complex—and manual processes increase both risk and administrative burden.

In this video, we introduce IBM Security Guardium Key Lifecycle Manager, IBM’s on-premises solution for key management in Linux environments. You’ll see how built-in key orchestration simplifies the creation, distribution, rotation, and decommissioning of cryptographic keys in heterogeneous IT environments, while strengthening security, control, and regulatory compliance.

The solution is particularly relevant for organizations running business-critical workloads on IBM Power, LinuxONE, enterprise storage, and other security-sensitive platforms where central governance and traceability are critical.

Digital & Data Sovereignty – Control Without Isolation

Digital & Data Sovereignty – Control Without Isolation

Digital and data sovereignty has evolved from a policy issue to a business-critical reality. Now that IT has become critical infrastructure and data a strategic asset, it is no longer sufficient to rely on assumptions about control, jurisdiction, and security. In this...

Webinar: Modernizing Business-Critical IT with Power11

Webinar: Modernizing Business-Critical IT with Power11

In this webinar, LOAD presents how Power11 can be used as a platform to modernize business-critical systems – with a focus on stability, security, and long-term control. A strategic perspective for organizations that want to modernize without compromising operations.

Elite performance requires purpose-built equipment

Elite performance requires purpose-built equipment

Elite performance isn't just about talent—it's about having the right equipment.In this video, cross-country skier Lisa Eriksson shares her perspective on how modern, purpose-built equipment is crucial for performing at the highest level. The same principle applies to...

Q-Day is approaching – is your encryption ready?

Q-Day is approaching – is your encryption ready?

Quantum computers will be able to break many of today’s most common encryption algorithms. At the same time, encrypted data is already being collected for future decryption. In this video, we explain what Q-Day means, why the threat is real today, and how organizations can begin the journey towards quantum-safe encryption. Contact LOAD to take the first step towards a quantum-safe future.

Real Modernization – a Conversation between IBM and LOAD

Real Modernization – a Conversation between IBM and LOAD

An open conversation with Louise Gunsjö, Vice President IBM EMEA, and Torbjörn Appehl, CEO LOAD, about modernizing IT infrastructure in an era characterized by AI, cybersecurity, and digital sovereignty. How can companies regain control of their IT and build future...

Modern Infrastructure for Linux Workloads

Modern Infrastructure for Linux Workloads

Stuck in the Sand Have you also felt that Linux has made significant strides forward?How it is distributed, the new automation tools, the ability to run modern containerized applications and services – everything has evolved rapidly. Even security and encryption have...

Smarter Infrastructure with IBM Power11 and LOAD

Smarter Infrastructure with IBM Power11 and LOAD

In an era where IT is strategy, LOAD demonstrates how IBM Power11 provides businesses with power, security, and AI in real terms. Discover how modernization with Power creates future-proof environments with higher performance, lower costs, and seamless cloud integration.

How to Handle a Disk Crash on IBM FlashSystem

How to Handle a Disk Crash on IBM FlashSystem

In this video, Jan Finnerman from LOAD demonstrates step-by-step how to handle a disk crash on IBM FlashSystem. Get practical tips and learn how to quickly restore operations with minimal impact on business – thanks to the built-in intelligence and robust architecture of FlashSystem.