Welcome 192TB to the Ootbi Family | Learn more here >>

View All

| 7 min to read

VeeamON 2024 Being There in the Moment

VeeamON 2024 is behind us, and as always, it is time to reflect on the event and review some of the highlights.

Attending IT conferences is always special, but after experiencing the lockdowns of the COVID-19 pandemic, they have taken on even more meaning and significance. Often, one learns through deprivation, which was certainly the case regarding IT gatherings during the lockdowns.

| 5 min to read

It’s Conference Season: Zero Trust Perspectives on RSA Conference and VeeamON

Guest blogger Jason Garbis is the Founder of Numberline Security, co-chair of the Zero Trust Working Group at the Cloud Security Alliance, and author of two books on Zero Trust. He joins us to share insights on information security and Zero Trust.

| 4 min to read

The 192TB Ootbi: A New Era of Backup Storage

It's been a wild ride since Object First Ootbi launched on February 14th, 2023. 
Over the last year, we've added many new customers and grown tremendously as a company, more than doubling in size, securing Veeam backup data from ransomware. 
Here's a quick look back at how far we've come and what's new with Ootbi.

| 8 min to read

Not Zero Trust Backup Architectures

In blog #2 of this series, we delved into the central principles of the Zero Trust Data Resilience (ZTDR) model: segmentation, multiple data resilience zones, and immutable backup storage. This model and architecture, a collaborative effort between Veeam and Numberline Security, extends CISA’s Zero Trust principles and Maturity Model to the enterprise data backup and recovery use case. 

| 7 min to read

3 Zero Trust Principles for Data Backup

In blog #1 of this series, we have outlined Zero Trust principles and introduced the new Zero Trust Data Resilience (ZTDR) model. The ZTDR model and architecture have been developed in collaboration between Veeam and Numberline Security. It extends the tenets of CISA’s Zero Trust Maturity Model with the following principles that cover enterprise data backup and recovery.

| 5 min to read

Time to update your passwords again, it's world password day

Let’s be real here: passwords are dying. In the olden days, you could get by with 2-3 memorable passwords and brute-force your brain to figure out how to get into your MySpace account without fear of being locked out, and that was still pretty secure. 

| 5 min to read

Aces Community Blog April

Welcome back to the Object First Aces Blog for April. It’s an exciting time for us, as we are now one month into the Object First Aces program! If you missed our previous announcement and blog about the Object First Aces, be sure to give it a read.

| 7 min to read

Zero Trust and Enterprise Data Backup and Recovery

The Zero Trust model represents the current best practice for organizations seeking to protect and secure their data and business. However, this model has not been substantively applied to data backup and recovery. Zero Trust advisory firm Numberline Security and Veeam recently collaborated on research to fill this gap and reduce risk for organizations seeking to evolve beyond perimeter security. 

| 3 min to read

Implementing The Airport Security Model for Data Protection

In today's digital age, safeguarding critical data is paramount. We've all experienced the tightened security measures at airports, where protecting passengers and assets is non-negotiable. Likewise, the principles of secure data storage reflect the rigorous security protocols observed in airport terminals. The parallels between airport security and data security are abundant because we have realized that we must protect the things that keep us moving – air travel and data. 

| 7 min to read

Top Seven Cybersecurity Threats in 2024

As cybercrime is projected to take a toll of $9.22 trillion on global internet users in 2024, the urgency to understand and interact with diverse cyber threats has never been more critical. These looming dangers pose significant risks to business operations, financial stability, and reputation, underscoring the need for robust defensive strategies. Discover insights into navigating these challenges and implementing effective countermeasures to safeguard your enterprise.