Welcome 192TB to the Ootbi Family | Learn more here >>

Technical

| 4 min to read

The 192TB Ootbi: A New Era of Backup Storage

It's been a wild ride since Object First Ootbi launched on February 14th, 2023. 
Over the last year, we've added many new customers and grown tremendously as a company, more than doubling in size, securing Veeam backup data from ransomware. 
Here's a quick look back at how far we've come and what's new with Ootbi.
 

| 8 min to read

Not Zero Trust Backup Architectures

In blog #2 of this series, we delved into the central principles of the Zero Trust Data Resilience (ZTDR) model: segmentation, multiple data resilience zones, and immutable backup storage. This model and architecture, a collaborative effort between Veeam and Numberline Security, extends CISA’s Zero Trust principles and Maturity Model to the enterprise data backup and recovery use case. 

| 7 min to read

3 Zero Trust Principles for Data Backup

In blog #1 of this series, we have outlined Zero Trust principles and introduced the new Zero Trust Data Resilience (ZTDR) model. The ZTDR model and architecture have been developed in collaboration between Veeam and Numberline Security. It extends the tenets of CISA’s Zero Trust Maturity Model with the following principles that cover enterprise data backup and recovery.

| 7 min to read

Zero Trust and Enterprise Data Backup and Recovery

The Zero Trust model represents the current best practice for organizations seeking to protect and secure their data and business. However, this model has not been substantively applied to data backup and recovery. Zero Trust advisory firm Numberline Security and Veeam recently collaborated on research to fill this gap and reduce risk for organizations seeking to evolve beyond perimeter security. 
 

| 5 min to read

Unlocking the Secrets of Veeam Hardened Linux Repository

Veeam Hardened Repository (VHR) is an option for secure, immutable backup storage and is a popular choice among Veeam enterprise customers. However, IT security and Linux expertise are required to deploy and manage VHR properly over time, and as such, it is not a suitable option for environments lacking in-house IT security skills. This blog post series is intended to provide an overview of the pros and cons as well as technical and operational considerations while choosing VHR for your environment.

| 6 min to read

Why Object Storage Is Best for Backup and Recovery

2024 Cybereason's study reveals that 78% of organizations targeted by ransomware faced a second attack, often with higher ransom demands. For businesses, falling victim not only means financial loss but also significant disruptions to operations and a drop in customer trust. 
Object storage is a critical line of defense against escalating ransomware attacks, ready to redefine how you protect your most precious digital assets.

| 7 min to read

Mastering the Ransomware Phases: From Infiltration to Extortion

The financial cost of cybercrime is predicted to reach USD 10.5 trillion annually by 2025, emphasizing the urgent need to strengthen your ransomware defenses. The key to turning the tide in this cyber battle lies in mastering the art of knowing your enemy.

Delve into the anatomy of a ransomware attack to arm yourself with the wisdom to craft an impenetrable shield for your business and be ready to outmaneuver those lurking in the shadows.

| 4 min to read

Are Immutable Backups Your Best Bet Against Ransomware Attacks?

The financial impact of ransomware is projected to soar to an astounding $265 billion annually by 2031, with cybercriminals launching attacks every two seconds, escalating their tactics in sophistication and frequency.

Despite numerous ransomware defense strategies, the stark reality remains that no system is entirely invulnerable to these threats, transforming the question of 'if' into 'when' an organization will face such an attack.

Mastering Repository Planning with Veeam and Object First

Veeam stands at the forefront of comprehensive backup solutions in the dynamic realm of data protection. A pivotal element in bolstering data security is the integration of object storage repositories with immutability. This feature guarantees the unalterability of backups, shielding them from ransomware, accidental erasures, or other forms of data corruption. To fully harness Veeam’s…

| 10 min to read

Recovering From Ransomware: What to Do After an Attack

In 2023, a global ransomware trend report revealed a sharp increase in attacks, affecting 85% of companies. These incidents seriously endanger businesses by compromising their most vital asset: data. A composed and well-planned recovery plan is crucial to prevent data loss effectively.
Whether you’re a backup admin, an IT Leader, or a Security Architect, find a comprehensive roadmap to navigate the aftermath of any ransomware incident, ensuring readiness and confidence in the face of cyber adversity.