Something BIG is Coming! Find Out >>

Blog

May 16, 2024 | 8 min to read

Not Zero Trust Backup Architectures

In blog #2 of this series, we delved into the central principles of the Zero Trust Data Resilience (ZTDR) model: segmentation, multiple data resilience zones, and immutable backup storage. This model and architecture, a collaborative effort between Veeam and Numberline Security, extends CISA’s Zero Trust principles and Maturity Model to the enterprise data backup and recovery use case. 

May 09, 2024 | 7 min to read

3 Zero Trust Principles for Data Backup

In blog #1 of this series, we have outlined Zero Trust principles and introduced the new Zero Trust Data Resilience (ZTDR) model. The ZTDR model and architecture have been developed in collaboration between Veeam and Numberline Security. It extends the tenets of CISA’s Zero Trust Maturity Model with the following principles that cover enterprise data backup and recovery.

April 18, 2024 | 7 min to read

Zero Trust and Enterprise Data Backup and Recovery

The Zero Trust model represents the current best practice for organizations seeking to protect and secure their data and business. However, this model has not been substantively applied to data backup and recovery. Zero Trust advisory firm Numberline Security and Veeam recently collaborated on research to fill this gap and reduce risk for organizations seeking to evolve beyond perimeter security. 
 

March 26, 2024 | 5 min to read

Unlocking the Secrets of Veeam Hardened Linux Repository

Veeam Hardened Repository (VHR) is an option for secure, immutable backup storage and is a popular choice among Veeam enterprise customers. However, IT security and Linux expertise are required to deploy and manage VHR properly over time, and as such, it is not a suitable option for environments lacking in-house IT security skills. This blog post series is intended to provide an overview of the pros and cons as well as technical and operational considerations while choosing VHR for your environment.

March 21, 2024 | 6 min to read

Why Object Storage Is Best for Backup and Recovery

2024 Cybereason's study reveals that 78% of organizations targeted by ransomware faced a second attack, often with higher ransom demands. For businesses, falling victim not only means financial loss but also significant disruptions to operations and a drop in customer trust. 
Object storage is a critical line of defense against escalating ransomware attacks, ready to redefine how you protect your most precious digital assets.

March 07, 2024 | 7 min to read

Mastering the Ransomware Phases: From Infiltration to Extortion

The financial cost of cybercrime is predicted to reach USD 10.5 trillion annually by 2025, emphasizing the urgent need to strengthen your ransomware defenses. The key to turning the tide in this cyber battle lies in mastering the art of knowing your enemy.

Delve into the anatomy of a ransomware attack to arm yourself with the wisdom to craft an impenetrable shield for your business and be ready to outmaneuver those lurking in the shadows.

February 22, 2024 | 4 min to read

Are Immutable Backups Your Best Bet Against Ransomware Attacks?

The financial impact of ransomware is projected to soar to an astounding $265 billion annually by 2031, with cybercriminals launching attacks every two seconds, escalating their tactics in sophistication and frequency.

Despite numerous ransomware defense strategies, the stark reality remains that no system is entirely invulnerable to these threats, transforming the question of 'if' into 'when' an organization will face such an attack.

December 27, 2023

Mastering Repository Planning with Veeam and Object First

Veeam stands at the forefront of comprehensive backup solutions in the dynamic realm of data protection. A pivotal element in bolstering data security is the integration of object storage repositories with immutability. This feature guarantees the unalterability of backups, shielding them from ransomware, accidental erasures, or other forms of data corruption. To fully harness Veeam’s…

December 20, 2023 | 10 min to read

Recovering From Ransomware: What to Do After an Attack

In 2023, a global ransomware trend report revealed a sharp increase in attacks, affecting 85% of companies. These incidents seriously endanger businesses by compromising their most vital asset: data. A composed and well-planned recovery plan is crucial to prevent data loss effectively.
Whether you’re a backup admin, an IT Leader, or a Security Architect, find a comprehensive roadmap to navigate the aftermath of any ransomware incident, ensuring readiness and confidence in the face of cyber adversity.

December 08, 2023 | 6 min to read

New Veeam Smart Object Storage API (SOSAPI) for Efficient Data Management

In the ever-evolving data management landscape, businesses constantly seek innovative solutions to enhance their backup and recovery processes.  One solution that has gained prominence is the Veeam Smart Object Storage API. This powerful tool offers a gateway to improved efficiency, scalability, and flexibility in handling data backups.  Understanding the Veeam Smart Object Storage API’s features…

September 18, 2023 | 3 min to read

Decoding the Synergy: Acoustic Infiltrations and Ransomware Implications

In the cybersecurity ecosystem, some threats emerge in the limelight while others lurk in the shadows. Acoustic side-channel attacks, fueled by deep learning and ever-present microphones in almost everything we own, have recently emerged from obscurity. Parallelly, the persistent onslaught of ransomware attacks serves as a reminder that both the overt and covert cyber threats demand equal attention. Both underline a singular message: our data, more than ever, is in the crosshairs.

November 02, 2022 | 6 min to read

Zeroing in on the ultimate data recoverability. Part 2

In the first installment, we learned about the 3-2-1 strategy, with an extra 1 — signifying the importance of having an air-gapped copy of your backup data. With a comprehensive roadmap of where and how to store your critical backup data, let’s not forget where we left off with the all important 0. What about the zero?

October 18, 2022 | 7 min to read

Ultimate data recoverability. Part 1

Ransomware attacks are increasing at staggering rates. Ransomware impacted over 90% of organizations in the past 12 months, up from 72.5% last year. Despite continuous investments in cybersecurity and data protection, ransomware continues to put your data at risk. You can read more about these shocking statistics at VentureBeat.

September 29, 2022 | 3 min to read

Let’s talk about cloud storage

Firstly, if you read our most recent blog series about various storage platforms, thank you. If you haven’t, I recommend checking out the third and final piece covering object storage and how it mainly benefits cloud users today (and very soon Object First’s on-premises customers as well!).

September 07, 2022 | 2 min to read

What is block storage?

Block storage is a storage format that treats each volume as a separate hard drive. Its configuration is the responsibility of the storage admin. That is why it is called “block”: it organizes and structures the data as blocks with a fixed size.