Comprehensive ransomware remediation
Automated backup verifications
Fast, reliable recovery
Veeam Platform is the only solution to help your business evolve how it manages data while ensuring its availability across any application or cloud infrastructure.
Secure and protect your data across your multi‑cloud environment
The control and protection required for your Microsoft 365 data
Protect your Microsoft 365 data, including OneDrive for Business and Teams, so that organizations can mitigate the risk of data loss.
Next‑generation application recovery engine
Accelerate the recovery of applications, databases and any data with Veeam Backup & Replication’s™ next generation recovery engine that offers instant recovery for virtual machines (VMs) as well as Oracle, SQL, Microsoft applications and much more.
#1 backup and availability for your virtual environments
Powerful NAS and physical server backup
Unleash the power within your data to unlock greater acceleration
Untap the potential within your data to extract key business insights. Data mining, data classification, security analysis, forensics,eDiscovery and much more.
Restore confidently from any disaster
Orchestration is critical for both data availability and agility. Automate disaster recovery (DR) plans, including creation, documentation and testing with Veeam Disaster Recovery Orchestrator (VRDO).
Visibility for proactive management
Gain unified AI-driven data management for your entire IT infrastructure. With Veeam ONE™, customers can leverage a powerful monitoring, reporting and capacity planning tool that provides visibility into their workload and is driven by proprietary machine learning and big data capabilities.
Veeam Backup & Replication is the engine that drives Veeam Platform
Centralize data protection for your cloud, virtual, physical, SaaS and Kubernetes workloads with solutions for the protection of any workload. Backup, replication and Continuous Data Protection (CDP) is where your journey starts. Veeam Backup & Replication, Veeam Backup for Microsoft 365, Kasten K10 for Kubernetes and much more.
The highest integration level across storage partners, management capabilities and third‑party data analytics
Integrate and interface with a broad ecosystem of solutions and partners. This includes data analytic and reporting tools, management platforms and hypervisor integration with VMware, Microsoft and Nutanix. This also includes cloud integrations like AWS, Azure, IBM Cloud and thousands of service providers and storage integration partners.
Availability for all your cloud, virtual and physical workloads — Quickly achieve fast, flexible, reliable backup, archival, recovery and replication.
Deliver true proactive management of your backup environment with visibility, reporting and analytics that help you detect issues before they become problems.
Automatically test, document and execute disaster recovery plans for any VM in as little as one-click, recovering everything from a single application to entire sites.
Eliminate the risk of losing access to your Office 365 data, including Exchange Online, SharePoint Online, OneDrive for Business and Microsoft Teams.
Veeam backup products are known for being simple, flexible and reliable — attributes that are key to your resiliency efforts. When it comes to a ransomware incident, resiliency is completely predicated on how you implement your Veeam backup infrastructure solution, the behavior of the threat and the course you take in remediating the threat.
To find implementation recommendations for ransomware resiliency, explore the following guidance: Protection of the Veeam Backup & Replication server and components Implementing Veeam capabilities for ransomware detection Ultra-resilient backup storage and the 3-2-1 Rule Multiple recovery techniques configuration Endpoint protection Network-Attached Storage (NAS) protection Veeam encryption of backup data Orchestrating recoveries of backups and replicas.
At Veeam, our approach to remediating ransomware is this:
Don’t pay the ransom. Restore the data — this is the only option. In spite of all of the education and implementation techniques that you may employ to stay resilient against ransomware, you should be prepared to defend against a ransomware incident if a threat is introduced. But what you may not have thought about is specifically what to do when a threat is discovered. Here are a few recommendations for remediation to have at your disposal should a ransomware incident happen:
There’s a special group within the Veeam Support organization that has specific operations to guide customers through restoring data in ransomware incidents. Since you don’t want to put your backups at risk, having this support is critical for your ability to recover.
In disasters of any type, communication becomes one of your first challenges. Have a plan for how to communicate out-of-band with the right individuals. This plan can include group text lists, phone numbers or other mechanisms that are commonly used for on-call but expanded for an entire IT operations group.
Have a list of security, incident response, identity management, etc. teams ready to contact if needed. They can be within the organization or external experts. If a Veeam service provider is used, there are additional value add-ons to their base offering that can be considered (such as Veeam Cloud Connect Insider Protection).
CHAIN OF DECISION
In recovering from any disaster, who makes the call to restore, to fail over and so on? Have discussions about this decision authority beforehand, so your chain of decision is ready to deploy should an incident arise.
READY TO RESTORE
When it’s appropriate to restore, implement additional safety checks before putting systems on the network again. Additional steps can include restoring with network access disabled for a final check.
Veeam Secure Restore will trigger an antivirus scan of the image before the restoration completes. Veeam Secure Restore uses the latest antivirus and malware definitions, with the option of an additional tool, to ensure a threat is not reintroduced.
FORCE PASSWORD RESETS
While it’s not always popular with users, implementing a sweeping forced change of passwords reduces the threat propagation surface area.