10 Critical Alarms to Stop Ransomware and Protect Your Business Continuity

Ransomware attacks aggressively target virtual infrastructure like ESXi and vCenter, exploiting vulnerabilities to encrypt data and disrupt operations. Veeam’s advanced monitoring capabilities empower organizations to detect threats early and respond swiftly, safeguarding critical data before backups are compromised. By configuring precise alarms and integrating with SIEM tools such as CrowdStrike Falcon, Palo Alto XSIAM, Rapid7, Microsoft Sentinel, Splunk, etc., Veeam ensures comprehensive security visibility. Read more
Brad Linch
Brad Linch

Director of Technical Strategy

CrowdStrike & Veeam Deliver Data Resilience and Recovery for Windows Hosts

The CrowdStrike outage disrupted critical services for many organizations, highlighting how Microsoft Windows continues to be a critical infrastructure. This incident exposed a crucial lesson: no system is immune to failure. Comprehensive backup and recovery strategies are critical to mitigate the impact of such disruptions. Read more
Brad Linch
Brad Linch

Director of Technical Strategy

Veeam’s Anomaly Detection for Ransomware

Ransomware attacks have a greater chance of causing data loss than any other DR event. Without visibility into the backup repositories, it will be difficult, if not impossible, to find the last known good copy of your data. Learn how Veeam's three-tiered approach to identifying clean data can help you recover faster. Read more
Brad Linch
Brad Linch

Director of Technical Strategy

How to Recover Quickly From a Ransomware Attack

Ransomware attacks need to be viewed under the same category as power outages and natural disasters. The requirement to recover quickly is a necessity. Recently, I'm seeing many vendors in the data protection industry advertise immutability and ransomware detection features. Both of which should absolutely be part of a company's ransomware strategy, but an immutable copy coming from spinning disk or tape can result in too much downtime for the business. It's an easy decision for a CEO or CFO if an attacker's ransom is $100,000 and the cost of downtime for a day is $500,000. The only question at that point becomes how do we make a Coinbase account to transfer Bitcoin? Read more
Brad Linch
Brad Linch

Director of Technical Strategy