1-800-691-1991 | 9am - 8pm ET
EN
Whitepaper
July 4, 2018

Veeam Backup & Replication 9.5 Update 3 — Infrastructure Hardening

Register to Read

By registering, you are agreeing to have your personal information managed in accordance with the terms of Veeam's Privacy Policy.
By registering, you are agreeing to receive information about Veeam products and events and to have your personal information managed in accordance with the terms of Veeam's Privacy Policy.
Thank you for your interest in Veeam products!
We've sent a verification code to:
  • Incorrect verification code. Please try again.
An email with a verification code was just sent to
Didn't receive the code? Click to resend in sec
Didn't receive the code? Click to resend

ty icon

Thank you!

We have received your request and our team will reach out to you shortly.

OK

error icon

Oops! Something went wrong.

Please try again later.

Running your Veeam® Backup & ReplicationTM infrastructure in a secure configuration is a daunting task, even for security professionals. This white paper provides practical advice to help administrators, architects and security professionals learn how to harden their infrastructures by following security best practices so they can confidently deploy their Veeam services and lower their chances of being compromised. Security is a state of mind and needs to be looked after every single day. If you think you are secure because you followed all best practices, you may have a false sense of protection! Look at your company’s needs and then choose the best fit for your organization — taking budget, risks and all possible outcomes into consideration. While there is no silver bullet that will solve all your security needs at once, there are numerous ways to achieve your goal.

The Veeam Backup & Replication 9.5 Update 3 – Infrastructure Hardening white paper discusses several options on how to harden your infrastructure where Veeam Backup & Replication is part of.

In this white paper, you will learn how to:

  • Create a secure design right from the start
  • Segmenting your infrastructure by using zones
  • Choosing and deploying the right countermeasures
  • And much more! 

About the Author(s)

Edwin Weijdema
Global Technologist, Product Strategy, Veeam Software
Edwin Weijdema is a Global Technologist for Veeam Software based in The Netherlands, covering a global role within the Product Strategy team and part of the Office of the CTO. He serves as a partner and trusted adviser to customers and partners worldwide, bridging business and technology. He has over 29 years of industry experience with a key focus on data management and cybersecurity. He is a veteran vExpert, Cisco Champion and holds several other certifications. He is also a crew member and blogger at www.vmguru.com. Follow Edwin on Twitter @Viperian, on LinkedIn at https://www.linkedin.com/in/eweijdema or @Veeam.
Show less Show more