Truth in IT
    • Sign In
    • Register
        • Videos
        • Channels
        • Pages
        • Galleries
        • News
        • Events
        • All
Truth in IT Truth in IT
  • Data Management ▼
    • Converged Infrastructure
    • DevOps
    • Networking
    • Storage
    • Virtualization
  • Cybersecurity ▼
    • Application Security
    • Backup & Recovery
    • Data Security
    • Identity & Access Management (IAM)
    • Zero Trust
  • Cloud ▼
    • Hybrid Cloud
    • Private Cloud
    • Public Cloud
  • Webinar Library
  • TiPs

Veeam Vault: Secure Cloud Backup & Ransomware Defense

Veeam
02/28/2026
2
0 (0%)
Share
  • Comments
  • Download
  • Transcript
Report Like Favorite
  • Share/Embed
  • Email
Link
Embed

Transcript


TL;DR

  • Veeam Cloud Vault is a fully managed, immutable cloud storage solution with predictable all-inclusive pricing (starting at $14/TB/month for Foundation edition), eliminating unpredictable egress fees and API charges that plague traditional cloud storage.
  • The service implements Veeam's 3-2-1-1-0 rule with built-in WORM immutability, AES-256 encryption, logical air-gapping, and up to 12 nines durability (Advanced edition), providing ransomware-resistant offsite backup without infrastructure management overhead.
  • Organizations can eliminate expensive hot sites by storing backups in Vault and using direct restore to Azure, paying for disaster recovery infrastructure only during actual outages rather than maintaining idle standby environments year-round.
  • Kasten by Veeam natively integrates with Vault to protect Kubernetes stateful data, enabling application mobility, disaster recovery, and ransomware defense for containerized workloads across hybrid and multi-cloud environments.
  • Four migration paths support adoption: new deployments, secondary backup targets, migration from existing object storage, and integration with scale-out repositories—all designed for seamless transition without disrupting existing backup workflows.

Veeam Vault: Managed Cloud Backup for Ransomware Defense

This technical presentation introduces Veeam Cloud Vault, a fully managed, secure cloud storage solution designed to address the escalating challenges of data growth, ransomware attacks, and unpredictable cloud costs. Senior Systems Engineer Yasuda explains how 89% of ransomware attacks now explicitly target backups, making immutable, air-gapped offsite storage critical for business continuity. Veeam Vault eliminates the complexity of architecting secure cloud repositories by providing pre-configured immutability (WORM), AES-256 encryption, logical air-gapping, and multi-zone resilience—all with predictable, all-inclusive pricing that covers storage, API calls, egress, and data retrieval. The session positions Vault as the cornerstone of Veeam's 3-2-1-1-0 rule, which extends the traditional 3-2-1 backup strategy by adding one immutable offsite copy and zero errors through backup verification.

Deployment Scenarios and Hot Site Elimination

The presentation details four migration paths to Veeam Vault: new deployments, secondary backup targets, migration from existing object storage, and integration with scale-out backup repositories. A key use case highlighted is disaster recovery without maintaining an expensive hot site—traditionally a fully operational backup facility with hardware, software, and real-time replication. By storing backups in Vault and leveraging Veeam's direct restore to Azure, organizations can spin up recovery environments on-demand, paying only for compute resources during actual DR events rather than maintaining idle infrastructure year-round. This approach delivers hot site benefits (minimal downtime, geographic separation, near-zero RPO) without the continuous capital and operational expenses.

Kubernetes Data Protection with Kasten Integration

The latter half of the session focuses on protecting Kubernetes stateful workloads using Kasten by Veeam, which natively integrates with Vault as an export target. Kasten captures persistent volume data, encrypts it, creates local snapshots, and exports immutable backups to Vault—enabling application mobility across on-premises and cloud environments, disaster recovery for containerized workloads, and ransomware resilience through clean-room cluster restoration. The live demonstration shows the end-to-end workflow: registering a Vault storage account in Kasten, creating a location profile, configuring backup policies, and executing a backup of a sample application (Pac-Man) to Vault. This integration extends Veeam's data protection capabilities into cloud-native environments, addressing the growing need for Kubernetes backup solutions that support hybrid and multi-cloud strategies.

Chapters

0:00 - Opening & Speaker Introduction
0:32 - Data Growth & Cloud Adoption Trends
2:24 - Ransomware Threat & Backup Criticality
3:23 - Veeam's 3-2-1-1-0 Rule Explained
4:24 - Cloud Storage Cost Challenges
6:49 - Veeam Cloud Vault Service Overview
9:11 - Pricing Model & Predictable Costs
12:30 - Foundation vs Advanced Editions
14:24 - Four Vault Migration Scenarios
18:11 - Disaster Recovery Without Hot Sites
22:51 - Kubernetes Protection with Kasten
29:22 - Ransomware Defense Use Cases
30:21 - Kasten Integration Demo
36:00 - Closing Summary

Key Quotes

2:23 "... ランサムウェア攻撃の89パーセントがバックアップを明確に標的としています ..."
4:37 "... 84%の組織がクラウド費用の管理を ビジネス上の最大の課題としています ..."
7:00 "... インフラストラクチャー管理や予測不可能なクラウドコストモデルの煩わしさを解消します ..."
8:30 "... ビームボルトは常に普遍機能を持つストレージになっています デフォルトワーム読み取り専用になっています ..."
11:35 "... ボルトは包括的な価格モデルを採用しています これにはストレージはもちろん 書き込みと読み取りのAPI呼び出し データ取得と送信の料金など 先ほど最も重要な点として挙げた 全ての費用が含まれています ..."
19:54 "... 大きなメリットに対して高額な費用がかかります そこでボルトを活用することで 高額な費用をかけて活用されていないホットサイトに 費用をかけることなくメリットを享受いたします ..."
Categories:
  • » Data Protection » Backup & Recovery
  • » Data Management » DevOps
  • » Data Protection
Channels:
News:
Events:
Tags:
  • Data Protection
  • Cloud Security
  • Backup & Recovery
  • Technical Deep Dive
  • Demo
  • Kubernetes
  • Disaster Recovery
  • Cloud Backup
  • Ransomware Defense
  • Immutable Storage
  • Kubernetes Data Protection
  • Hybrid Cloud Strategy
  • Cost Optimization
  • Business Continuity
Show more Show less

Browse videos

  • Related
  • Featured
  • By date
  • Most viewed
  • Top rated
  •  

              Video's comments: Veeam Vault: Secure Cloud Backup & Ransomware Defense

              Upcoming Webinar Calendar

              • 03/11/2026
                01:00 PM
                03/11/2026
                AI-Driven Endpoint Management: Scale IT Operations with Fewer Tools, Faster Tickets
                https://www.truthinit.com/index.php/channel/1838/ai-driven-endpoint-management-scale-it-operations-with-fewer-tools-faster-tickets/
              • 03/11/2026
                01:00 PM
                03/11/2026
                Introducing the Netskope AI Launch for the Americas
                https://www.truthinit.com/index.php/channel/1850/introducing-the-netskope-ai-launch-for-the-americas/
              • 03/12/2026
                12:00 AM
                03/12/2026
                Unveiling the Netskope AI Initiative in the APAC Region
                https://www.truthinit.com/index.php/channel/1849/unveiling-the-netskope-ai-initiative-in-the-apac-region/
              • 03/12/2026
                06:00 AM
                03/12/2026
                Introducing the Netskope AI Revolution in EMEA
                https://www.truthinit.com/index.php/channel/1848/introducing-the-netskope-ai-revolution-in-emea/
              • 03/17/2026
                06:00 AM
                03/17/2026
                L'importance cruciale de l'ITDR pour 2026 et au-delà
                https://www.truthinit.com/index.php/channel/1856/limportance-cruciale-de-litdr-pour-2026-et-au-delà/
              • 03/18/2026
                01:00 PM
                03/18/2026
                Beyond Chatbots: Agentic AI That Actually Fixes Identity Risk
                https://www.truthinit.com/index.php/channel/1847/beyond-chatbots-agentic-ai-that-actually-fixes-identity-risk/
              • 03/19/2026
                11:00 AM
                03/19/2026
                Risk in Real Time: Stopping Exploits Before the CVE Even Exists
                https://www.truthinit.com/index.php/channel/1372/unlocking-network-intelligence-for-smarter-risk-decisions/
              • 03/19/2026
                01:00 PM
                03/19/2026
                Cyber CSI 2.0: Phishing Forensics in the Age of AI and Deepfakes
                https://www.truthinit.com/index.php/channel/1842/cyber-csi-2-0-phishing-forensics-in-the-age-of-ai-and-deepfakes/
              • 03/26/2026
                01:00 AM
                03/26/2026
                Reclaim Network Clarity and Accountability with Netskope DEM
                https://www.truthinit.com/index.php/channel/1846/reclaim-network-clarity-and-accountability-with-netskope-dem/
              • 03/26/2026
                05:00 AM
                03/26/2026
                ITDR as an Integral Component of Critical Security Architecture
                https://www.truthinit.com/index.php/channel/1863/itdr-as-an-integral-component-of-critical-security-architecture/
              • 03/26/2026
                01:00 PM
                03/26/2026
                HUMAN Dialogue: Transforming City-Scale Cyber Resilience through AI Innovations
                https://www.truthinit.com/index.php/channel/1835/human-dialogue-transforming-city-scale-cyber-resilience-through-ai-innovations/
              • 03/26/2026
                01:00 PM
                03/26/2026
                Making GPUs Available On Demand (Without Breaking the Budget)
                https://www.truthinit.com/index.php/channel/1858/making-gpus-available-on-demand-without-breaking-the-budget/
              • 04/08/2026
                01:00 PM
                04/08/2026
                Managing Configuration at Scale Across Group Policy and Intune
                https://www.truthinit.com/index.php/channel/1865/managing-configuration-at-scale-across-group-policy-and-intune/

              Upcoming Spotlight Events

              • Mar
                11

                AI-Driven Endpoint Management: Scale IT Operations with Fewer Tools, Faster Tickets

                03/11/202601:00 PM ET
                • Mar
                  18

                  Beyond Chatbots: Agentic AI That Actually Fixes Identity Risk

                  03/18/202601:00 PM ET
                  • Mar
                    19

                    Cyber CSI 2.0: Phishing Forensics in the Age of AI and Deepfakes

                    03/19/202601:00 PM ET
                    • Mar
                      26

                      Making GPUs Available On Demand (Without Breaking the Budget)

                      03/26/202601:00 PM ET
                      • Apr
                        08

                        Managing Configuration at Scale Across Group Policy and Intune

                        04/08/202601:00 PM ET
                        More events

                        Upcoming Industry Events

                        • Mar
                          11

                          Introducing the Netskope AI Launch for the Americas

                          03/11/202601:00 PM ET
                          • Mar
                            12

                            Unveiling the Netskope AI Initiative in the APAC Region

                            03/12/202612:00 AM ET
                            • Mar
                              12

                              Introducing the Netskope AI Revolution in EMEA

                              03/12/202606:00 AM ET
                              More events
                              Truth in IT
                              • Sponsor
                              • About Us
                              • Terms of Service
                              • Privacy Policy
                              • Contact Us
                              • Preference Management
                              Desktop version
                              Standard version