Cybersecurity integrated with data protection

January 2024 News & Events, Infrastructure


Ian Engelbrecht.

Last year's VeeamOn Tour conference in South Africa was a smaller version of the annual global Veeam conference aimed at the company's regional partners and customers. Ian Engelbrecht, System Engineering Manager at Veeam Software, says that the conference is a chance for Veeam's customers and partners to learn about the company's latest product announcements from the company and best practices for securing their data.

Given the scope of Veeam's product portfolio, the conference covered data protection and security trends, and 2023 included a more significant focus on cloud services and solutions. Security was also prominent as Veeam launched version 12.1 in 2023, which included more security elements than ever. Engelbrecht notes that the cybersecurity threats companies face today (such as ransomware) make security a core data protection component.

Security has always been part of Veeam's products, such as its immutable data backup. Still, the company is expanding this element of its solutions to aid customers in their fight against cybercrime. It is also integrated with more cybersecurity solutions (SIEM platforms) to cater to a better all-round data security posture.

Tools available to customers include scanning backup data to ensure it is recoverable so that the risk of restoring compromised data in the event of a cyberattack is reduced. Its malware scanner is not simply another antivirus product, but regularly runs to ensure backed-up data is not infected and a clean restore point is available. The security team is alerted with the relevant information if data is changed or anomalies are detected.

Engelbrecht points out that Veeam's malware detection tools are not a full cybersecurity suite, hence its collaboration with other cyber service providers to provide customers with quick and reliable protection when something does go wrong (see www.securitysa.com/21093r).

Another benefit is that customers can back up from, and restore to, multiple platforms; they do not need precisely the same hardware to restore to in an emergency. For example, an on-premises system, backed up onsite, can be restored to a cloud platform so that the company can resume operations quickly while repairing the original system.

Not missing the AI chat boat, Veeam also offers its own AI chatbot to assist with product queries, again in real time. The company's AI is also put to use in its regular scanning of data to detect anomalies.

Veeam works through the channel in Africa and has partners that sell and support the company's onsite and cloud solutions. Veeam South Africa does not host its services but uses partners to make onsite or cloud solutions available to the local market, depending on customer requirements. Besides supporting its channel partners from the local office, global support is also available if required. As expected, it also offers a complete online training portfolio of recorded and instructor-led training, with hands-on labs to provide a real-life scenario for students (such as how a ransomware attack happens).

Find out more at www.veeam.com


Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

From the editor's desk: It’s all about data
Technews Publishing News & Events
      Welcome to the SMART Access and Identity Handbook 2026. We have slightly changed the handbook this year, specifically the selection guides, but there is still a lot of industry information inside, and ...

Read more...
Access trends for 2026
Technews Publishing SMART Security Solutions RR Electronic Security Solutions Enkulu Technologies IDEMIA neaMetrics Editor's Choice Access Control & Identity Management Infrastructure
The access control and identity management industry has been the cornerstone of organisations of all sizes for decades. SMART Security Solutions asked local integrators and distributors about the primary trends in the access and identity market for 2026.

Read more...
Beyond the fence
Technews Publishing Fang Fences & Guards SMART Security Solutions Perimeter Security, Alarms & Intruder Detection Access Control & Identity Management
In a threat landscape characterised by sophisticated syndicates, harsh environmental conditions, and unstable power grids, a static barrier is no longer a defence; it is merely a brief delay.

Read more...
Zero Trust access control
Technews Publishing SMART Security Solutions CASA Software NEC XON Editor's Choice Access Control & Identity Management Information Security
Zero Trust Architecture enforces the rule of ‘never trust, always verify’. It changes an organisation’s security posture by assuming that threats exist both inside and outside the perimeter, and it applies to information and physical security.

Read more...
Holding all the cards
neaMetrics Suprema SMART Security Solutions Technews Publishing Access Control & Identity Management
After so many years of offering alternatives to card technology for access control, one could be forgiven for assuming we are all using biometrics or mobile credentials for all our physical and digital access requirements.

Read more...
Reshaping South Africa’s built environment
Securex South Africa Facilities & Building Management News & Events Commercial (Industry)
FM teams are responsible for the overall operational environment of a building, while security teams focus on protection, control, and incident response. Increasingly, both rely on the same data streams, infrastructure, and digital tools.

Read more...
Banking’s AI reckoning
Financial (Industry) News & Events AI & Data Analytics
From agentic commerce disputes to quantum-powered risk modelling, SAS experts offer a ‘banker’s dozen,’ 13 industry-defining predictions that will separate institutions that master intelligent banking from those still struggling with the basics.

Read more...
Axis signs CISA Secure by Design pledge
Axis Communications SA News & Events Surveillance Information Security
Axis Communications has signed the United States Cybersecurity & Infrastructure Security Agency’s (CISA) Secure by Design pledge, signalling the company’s commitment to upholding and transparently communicating the cybersecurity posture of its products.

Read more...
Five key technology trends for the security sector in 2026
Axis Communications SA News & Events Surveillance
Axis Communications examines trends it considers important for 2026, as technology and customer requirements continue to evolve, but the basic security needs of end users remain constant.

Read more...
DeepAlert appoints Howard Harrison as CEO
DeepAlert News & Events AI & Data Analytics
DeepAlert has appointed Howard Harrison as chief executive officer. DeepAlert’s founder and CEO of the past six years, Dr Jasper Horrell, will transition into a newly created role as chief innovation officer.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.