Webinar
September 17, 2020
Duration: 00:58

How to build Secure Linux Repositories

Register to watch

By registering, you are agreeing to have your personal information managed in accordance with the terms of Veeam's Privacy Notice.
By registering, you are agreeing to receive information about Veeam products and events and to have your personal information managed in accordance with the terms of Veeam's Privacy Notice.
Verify your email to continue your product download
We've sent a verification code to:
  • Incorrect verification code. Please try again.
An email with a verification code was just sent to
Didn't receive the code? Click to resend in sec
Didn't receive the code? Click to resend

ty icon

Thank you!

We have received your request and our team will reach out to you shortly.

OK

error icon

Oops! Something went wrong.

Please try again later.

 video

Please register to get access to watch the webinar

With ransomware and other persistent threats continuing to increase, data protection is no longer just about the ability to restore missing files or systems from an accidental deletion or technical malfunction, but also from malicious attacks that, in many cases, also target backups.
Because of this new threat landscape,building a secure repository with layers of protection has become increasingly important, and Linux has all the tools necessary to provide an excellent platform for securing your Veeam® backups even from threats against the backup infrastructure itself.

Key takeaways for this webinar include:

  • An overview of the modern threat landscape
  • Why traditional techniques are useful but not good enough
  • The components used to build a truly secure Linux repository
  • A detailed example of building a highly secure Linux repository

Speaker(s)

Tom Sightler
Principal Solutions Architect, Veeam Software
Tom Sightler joined Veeam in 2011 and is currently a principal architect with a strong focus on enterprise clients. Prior to joining Veeam, he spent more than 20 years in various IT roles, from system administration and DBA tasks to network, storage and virtualization engineering, as well as other roles involving infrastructure architecture. He is also a passionate supporter of automation and OSS technologies.
Show less Show more