Welcome 192TB to the Ootbi Family | Learn more here >>

Technical

| 10 min to read

Object First’s Secure Repository for Veeam: Ootbi and IT Security

In this article, we’ll look at IT security in backup architecture as a continuous process that needs to be constantly revisited. 

| 8 min to read

Unlocking the Secrets of the Veeam Hardened Repository Part 2

In my previous blog, I discussed the Veeam Hardened Repository, why we need it, its uses, and its limitations. Today, I want to discuss this subject in more detail while providing links to build instructions with commentary. There are numerous ways to build a Veeam Hardened Repository, and one must choose carefully which method to use, as any errors or miscalculations will be very difficult to solve further down the road. 

| 7 min to read

Veeam Backup & Replication 12.1.2: Everything You Need to Know

Veeam has just released Veeam Backup & Replication 12.1.2, which brings a host of new features, security updates, and performance enhancements. Explore the significant changes and improvements to stay updated, enhance data security, and optimize your backup processes. 

| 4 min to read

The 192TB Ootbi: A New Era of Backup Storage

It's been a wild ride since Object First Ootbi launched on February 14th, 2023. 
Over the last year, we've added many new customers and grown tremendously as a company, more than doubling in size, securing Veeam backup data from ransomware. 
Here's a quick look back at how far we've come and what's new with Ootbi.
 

| 8 min to read

Not Zero Trust Backup Architectures

In blog #2 of this series, we delved into the central principles of the Zero Trust Data Resilience (ZTDR) model: segmentation, multiple data resilience zones, and immutable backup storage. This model and architecture, a collaborative effort between Veeam and Numberline Security, extends CISA’s Zero Trust principles and Maturity Model to the enterprise data backup and recovery use case. 

| 7 min to read

3 Zero Trust Principles for Data Backup

In blog #1 of this series, we have outlined Zero Trust principles and introduced the new Zero Trust Data Resilience (ZTDR) model. The ZTDR model and architecture have been developed in collaboration between Veeam and Numberline Security. It extends the tenets of CISA’s Zero Trust Maturity Model with the following principles that cover enterprise data backup and recovery.

| 7 min to read

Zero Trust and Enterprise Data Backup and Recovery

The Zero Trust model represents the current best practice for organizations seeking to protect and secure their data and business. However, this model has not been substantively applied to data backup and recovery. Zero Trust advisory firm Numberline Security and Veeam recently collaborated on research to fill this gap and reduce risk for organizations seeking to evolve beyond perimeter security. 
 

| 5 min to read

Unlocking the Secrets of Veeam Hardened Linux Repository Part 1

Veeam Hardened Repository (VHR) is an option for secure, immutable backup storage and is a popular choice among Veeam enterprise customers. However, IT security and Linux expertise are required to deploy and manage VHR properly over time, and as such, it is not a suitable option for environments lacking in-house IT security skills. This blog post series is intended to provide an overview of the pros and cons as well as technical and operational considerations while choosing VHR for your environment.

| 6 min to read

Why Object Storage Is Best for Backup and Recovery

2024 Cybereason's study reveals that 78% of organizations targeted by ransomware faced a second attack, often with higher ransom demands. For businesses, falling victim not only means financial loss but also significant disruptions to operations and a drop in customer trust. 
Object storage is a critical line of defense against escalating ransomware attacks, ready to redefine how you protect your most precious digital assets.

| 7 min to read

Mastering the Ransomware Phases: From Infiltration to Extortion

The financial cost of cybercrime is predicted to reach USD 10.5 trillion annually by 2025, emphasizing the urgent need to strengthen your ransomware defenses. The key to turning the tide in this cyber battle lies in mastering the art of knowing your enemy.

Delve into the anatomy of a ransomware attack to arm yourself with the wisdom to craft an impenetrable shield for your business and be ready to outmaneuver those lurking in the shadows.