Browsing Posts in vSecurity

Reading Time: 8 minutesThe Veeam Managed Hardened Repository is a bootable ISO based on Rocky Linux 9.2 (Blue Onyx) distribution preconfigured by Veeam. The idea is to dramatically simplify the provisioning experience and improve the security of the hardened repository, with a solutionpre-hardened out of the box with all advanced security settings already applied. This because immutability may be not enough if you configure your repository in a wrong way!

Reading Time: 5 minutesThe Veeam Hardened Repository ISO (VHRISO) is a Managed Hardened Repository delivered as bootable ISO with a Rocky Linux distribution preconfigured by Veeam. The idea is to dramatically simplify the provisioning experience while eliminating (or at least reducing) the need for any Linux expertise. But also have an OS pre-hardened out of the box with all advanced security settings already applied. This because immutability may be not enough if you configure your repository in a wrong way! Recommendations are based on Security Technical Implementation Guides (STIGs) created and maintained by the Defense Information Systems Agency […]

Reading Time: 3 minutesVeeam Threat Hunter is a new feature introduced in Veeam Backup & Replication 12.3  that provides the speed of YARA scans and the breadth of malware detection of a classic antivirus. Note: this function is able to scan backups only for VMs with Windows guest OS and without any file or volume encryption at guest level (like Bitlocker). But how fast it is? In the Veeam Community somebody declares 3x-6x faster in testing depending on the contents being scanned when testing against Windows Defender.

Reading Time: 3 minutesMany customers are using backup tools to identify potential dormant threats in their environment and Veeam Backup & Replication adds a lot of malware detection methods starting with v 12. Whether through periodic manual spot-checks, continuous scheduled backup scans (for example with SureBackup), or alert-driven scans, risks can be uncovered without adding overhead to production environments while allowing for a fast response from security teams. However, one of the challenges with searching for threats is knowing what to look for.

Logo Commvault

Reading Time: 7 minutesAt next AWS re:Invent, Commvault will show the new cloud cyber resilience features available on Amazon Web Services (AWS). The Commvault Cloud platform, including its widely deployed SaaS offerings (formerly known as Metallic), will provide AWS customers with cutting-edge solutions for automating data protection, advancing cyber recovery, and simplifying the cloud application rebuild process following a cyber-attack.

Reading Time: 5 minutesDuring the last IT Press Tour #57, I’ve got the opportunity to learn more about an interesting swiss company: Cleondris presented by Christian Plattner (CEO and founder). They have a single product (Cleondris ONE) designed to bring Cyber Resilience for one storage product (NetApp ONTAP). So a very specific solution. Cleondris ONE gives you complete control and flexibility over your NetApp ONTAP data on-premises and in the cloud. Benefit from AI-powered threat detection, advanced ransomware protection, and robust data security. With Cleondris ONE, your data is secure and resilient, enabling your organization to quickly respond to, mitigate, […]

Reading Time: 3 minutesDuring the VMware Explore 2024 in Las Vegas, VMware has introduced the new VMware Cloud Foundation 9 and described some of its features. One of them was Confidential Computing with TDX: a way to provide advanced security by isolating and encrypting workloads, ensuring data integrity and privacy at the hypervisor level. But what is TDX?

© 2025-2011 vInfrastructure Blog | Disclaimer & Copyright