Something BIG is Coming! Find Out >>

Blog

May 16, 2024 | 8 min to read

Not Zero Trust Backup Architectures

In blog #2 of this series, we delved into the central principles of the Zero Trust Data Resilience (ZTDR) model: segmentation, multiple data resilience zones, and immutable backup storage. This model and architecture, a collaborative effort between Veeam and Numberline Security, extends CISA’s Zero Trust principles and Maturity Model to the enterprise data backup and recovery use case. 

May 09, 2024 | 7 min to read

3 Zero Trust Principles for Data Backup

In blog #1 of this series, we have outlined Zero Trust principles and introduced the new Zero Trust Data Resilience (ZTDR) model. The ZTDR model and architecture have been developed in collaboration between Veeam and Numberline Security. It extends the tenets of CISA’s Zero Trust Maturity Model with the following principles that cover enterprise data backup and recovery.

April 25, 2024 | 5 min to read

Aces Community Blog April

Welcome back to the Object First Aces Blog for April. It’s an exciting time for us, as we are now one month into the Object First Aces program! If you missed our previous announcement and blog about the Object First Aces, be sure to give it a read.

April 18, 2024 | 7 min to read

Zero Trust and Enterprise Data Backup and Recovery

The Zero Trust model represents the current best practice for organizations seeking to protect and secure their data and business. However, this model has not been substantively applied to data backup and recovery. Zero Trust advisory firm Numberline Security and Veeam recently collaborated on research to fill this gap and reduce risk for organizations seeking to evolve beyond perimeter security. 
 

April 11, 2024 | 3 min to read

Implementing The Airport Security Model for Data Protection

In today's digital age, safeguarding critical data is paramount. We've all experienced the tightened security measures at airports, where protecting passengers and assets is non-negotiable. Likewise, the principles of secure data storage reflect the rigorous security protocols observed in airport terminals. The parallels between airport security and data security are abundant because we have realized that we must protect the things that keep us moving – air travel and data. 

April 04, 2024 | 7 min to read

Top Seven Cybersecurity Threats in 2024

As cybercrime is projected to take a toll of $9.22 trillion on global internet users in 2024, the urgency to understand and interact with diverse cyber threats has never been more critical. These looming dangers pose significant risks to business operations, financial stability, and reputation, underscoring the need for robust defensive strategies. Discover insights into navigating these challenges and implementing effective countermeasures to safeguard your enterprise. 

March 28, 2024 | 5 min to read

3 Ways to Improve Recovery Rates on World Backup Day

This year, I wanted to enhance some of the tips I shared last year and mix some spicy new ones to help all backup-minded individuals find the peace of mind they deserve. Consider this blog an amendment to the previous World Backup Day constitution.  

March 26, 2024 | 5 min to read

Unlocking the Secrets of Veeam Hardened Linux Repository

Veeam Hardened Repository (VHR) is an option for secure, immutable backup storage and is a popular choice among Veeam enterprise customers. However, IT security and Linux expertise are required to deploy and manage VHR properly over time, and as such, it is not a suitable option for environments lacking in-house IT security skills. This blog post series is intended to provide an overview of the pros and cons as well as technical and operational considerations while choosing VHR for your environment.

March 21, 2024 | 6 min to read

Why Object Storage Is Best for Backup and Recovery

2024 Cybereason's study reveals that 78% of organizations targeted by ransomware faced a second attack, often with higher ransom demands. For businesses, falling victim not only means financial loss but also significant disruptions to operations and a drop in customer trust. 
Object storage is a critical line of defense against escalating ransomware attacks, ready to redefine how you protect your most precious digital assets.