娇色导航

Our Network

Veeam Data Platform protects, secures and recovers data during disruptions

Overview

Allowing security and IT operations teams to collaborate more quickly, the Veeam Data Platform Premium goes beyond backup and recovery, adding data protection and data management to reduce downtime after disruptions or security events. Emilee Tellez, a field CTO with Veeam Software, joins the show to discuss key features of the Veeam Data Platform Premium.

This episode is sponsored by Veeam Software, the #1 global leader in data resilience. .

Website:

Register Now

Transcript

Hi, everybody! Welcome to DEMO, the show where companies come in and showcase their latest products and platforms. Today, I'm joined by Emilee Tellez, a Field CTO at Veeam Software. Welcome to the show, Emilee. Thank you, Keith.

I'm happy to be here. Congratulations!

You're our first virtual demo. That's awesome.

So, what are you showing us today?

Today, we're going to be discussing everything that's part of the Veeam Data Platform Premium.

Who is this designed for? Usually, within an enterprise, it's fair to say everybody, but more specifically, is there a role within a company that benefits the most from this product? Sure!

I'll say it is for everybody, but when we start thinking about specific cyber threats that companies face, CISOs and security analysts are going to love Veeam Data Platform Premium because it helps them with defense and response capabilities.

For CIOs and IT operations teams, it highlights gaps in their recovery process.

The idea is that you're merging the worlds of security teams and IT operations, right? It still feels like, in many companies, those are separate groups that don’t communicate much. There are things that just get "thrown over the wall," so to speak. Yep.

We want to bring those two teams together so they can coordinate a better response to any type of incident or threat.

What are the main problems you're solving with this? Why should companies adopt this platform? Does it improve their current security and recovery processes? What would they be doing without it? Sure.

Generally speaking, when you think about Veeam or your recovery process after a cyber event, recovery becomes your number one priority. Everyone should be backing up their data—that’s table stakes.

But having a breadth and depth of recovery features and functionality, so you can restore your data where and when you need it, is critical. That’s where our platform helps organizations increase their cyber resilience, ensuring they have full flexibility and access to their data.

Let's jump into the demo. Show me some of the key features of the Veeam Data Platform. Perfect.

First, let’s talk about the Veeam difference. Take, for example, an attack from a ransomware group like Akira. If we look at a company without Veeam, a threat actor might gain access to the environment unnoticed. There’s no notification, and no way to determine how they got in.

With Veeam, companies can detect brute force login attempts within vSphere and monitor unusual behavior on specific VMDKs. Our Veeam ONE analytics and monitoring platform provides robust, built-in alarms. These alarms monitor vSphere, Hyper-V, backup and replication environments, and even protect items within Microsoft 365.

One key feature we showcase is possible ransomware activity detection. This runs on the actual virtual machine in production—not just before backup occurs, but as the virtual machines are active. We have predefined rules and logic that can trigger alerts when suspicious or anomalous behavior is detected.

We can assign these rules to specific workloads and notify security administrators for further investigation. Additionally, we can take automated actions, such as isolating a compromised virtual machine from the network, either automatically or with approval settings.

Are these settings designed to prevent security teams from experiencing alarm fatigue or dealing with too many false positives? Yes, exactly.

The system is configured to reduce unnecessary alerts while ensuring critical threats are flagged appropriately. Let's take a look at another feature. When a threat actor gains access and moves laterally within an environment, how does Veeam notify organizations of this potential intrusion?

With Veeam, not only can we detect anomalies on production machines, but we also recognize that cybercriminals often target backup servers first. They aim to corrupt or delete backups to ensure they get paid in a ransomware attack. Veeam can scan endpoints and backup servers to detect unusual activity.

For example, we can identify brute force login attempts on backup servers or flag malware detection events within our software. We can also detect encryption attempts, unauthorized tools for data exfiltration, and suspicious file types. Wow!

I didn’t even realize attackers often target backup servers first. Their strategy makes sense—if companies have backups, the attackers try to compromise them before stealing data. Is that what you’re seeing? Absolutely.

In our annual Ransomware Trends Report, 1,200 organizations affected by ransomware reported that 96% of the time, threat actors targeted their backups first—trying to corrupt, delete, or encrypt them.

So, what happens next?

Let’s say a threat actor gains access and begins encrypting or exfiltrating data. Over the past two years, Veeam has enhanced its security scanning capabilities to help customers identify clean recovery points. For example, our malware detection system can identify: Encryption activity: Detecting mass changes in production data.

Suspicious files: Monitoring for onion links or unauthorized tools like Mimikatz. Signature detection: Identifying malware with polymorphic capabilities or leveraging existing antivirus solutions for scanning backups. We also allow customers to integrate Veeam with third-party security tools.

If a security tool detects an encryption attempt, it can trigger an out-of-band backup automatically.

At this point, if a company doesn’t have Veeam, is their data already compromised? If they do have Veeam, does this stop the attack, or does it just prevent things from getting worse?

With Veeam, they can begin stopping the attack. Our platform enables: Out-of-band backups: Capturing as much clean data as possible before it’s encrypted. Security alerts: Notifying security teams of active threats. Incident triage: Understanding what’s been compromised and preparing for recovery.

By proactively detecting attacks, we help organizations recover without reinfecting themselves.

I like that this isn’t just about preventing attacks but also helping companies respond effectively. Security isn’t 100% foolproof, so it’s crucial to have a plan for stopping and recovering from incidents quickly. Exactly.

Security professionals talk about defense in depth—having multiple layers to prevent intrusions. I like to think of it as defense in response—giving organizations multiple ways to respond and recover.

Before the show, we discussed your security integrations. That’s a big advantage since companies don’t want to replace their existing security tools. Instead, they can integrate Veeam with platforms like CrowdStrike and Palo Alto Networks, right? Absolutely.

You’ve shown us a lot of great features, Emilee. Where can people go for more information? Do you offer a free trial? Yes!

They can visit veeam.com to download a full trial and explore all the capabilities of the Veeam Data Platform.

Emilee Tellez from Veeam Software, thanks again for joining us and for the demo. Thank you!

That’s all the time we have for today’s episode. Don’t forget to like the video, subscribe to the channel, and share your thoughts in the comments. Join us every week for new episodes of DEMO. I’m Keith Shaw—thanks for watching!