Browsing Posts in vDesign

Reading Time: 9 minutesVeeam Backup & Replication 12 supports different malware detection methods that works in different way and can be used together to reach different scopes. Note: new features have been added in version 12.3! The first main diffecence is that some works inline (during the backup process on the source data) and other works with a post-processing directly on restore points saved on the repositories. For this reason also the load of those malware detection activities can be on different Veeam components, basically on the proxy servers for inline methods and the mount servers for the post-processing methods.

Reading Time: 2 minutesLike every hardware and software components, before apply a VMware vSphere upgrade or update you have to check all compatibility aspects. One is related to the backup software that can be critical because you may loose the capability to perform backup and/or restore. For Veeam Backup & Replication there is a specific Veeam KB (KB 2443) that provides information about compatibility between VMware vSphere and Veeam Backup & Replication.

Reading Time: 3 minutesVeeam Backup Catalog is a feature of Veeam Backup & Replication that stands for VM guest OS file indexing. Veeam Guest Catalog service on backup server works as a local catalog service. It collects index data for backup jobs on this specific backup server and stores this data locally in the Veeam Backup Catalog folder. By default, the indexing data is stored in the VBRCatalog folder on the backup server. Veeam Backup & Replication creates the folder on a volume with the maximum amount of free space, for example, C:\VBRCatalog.

Reading Time: 4 minutesWhat is the four-eyes principle? The “four-eyes principle” (also know as the two-person rule) means that a certain crucial and critical activity (prone to human errors) must be approved by at least two people. This controlling mechanism is used to facilitate delegation of authority and increase transparency but also minimize errors or security attacks. In Veeam Backup & Replication, starting with v12, is possible enable the Four-Eyes Authorization feature to protect some crucial operations.

Reading Time: 5 minutesLot of storage, cloud and backup solutions are promising some kind of data immutability. Of course, immutability is an important key capability, but it does not imply automatically that your solution is secure (or more secure). It can give a false sense of security if not implemented properly. When misconfigured, it is possible to delete supposedly immutable data, for example, by manipulating time/date settings on the storage device to bypass retention enforcement mechanisms.

Reading Time: 2 minutesDiffent products are implementing a security model called “four-eyes principle“, also know as the two-person rule or also multi-user authorization (MUA). In the backup and data protection are, for example, Veeam Backup & Replication (starting with v12) has the Four-Eyes Authorization feature to protect some crucial operations. But what is the four-eyes (4-eyes) principle and how does it work? First to all is nothing related to software or security but instead a way to minimize the human errors and can be appliable also to non IT activities.

Reading Time: 4 minutesKeepit provides data protection for all your key SaaS applications in one single, vendor-independent platform. I’ve met this company in the last A3 Communications Technology Live! in Paris and London and their solution is very interesting and unique.

© 2025-2011 vInfrastructure Blog | Disclaimer & Copyright