Truth in IT
    • Sign In
    • Register
        • Videos
        • Channels
        • Pages
        • Galleries
        • News
        • Events
        • All
Truth in IT Truth in IT
  • Data Management ▼
    • Converged Infrastructure
    • DevOps
    • Networking
    • Storage
    • Virtualization
  • Cybersecurity ▼
    • Application Security
    • Backup & Recovery
    • Data Security
    • Identity & Access Management (IAM)
    • Zero Trust
  • Cloud ▼
    • Hybrid Cloud
    • Private Cloud
    • Public Cloud
  • Webinar Library
  • TiPs

Threat Detection & Protection in Veeam Data Platform 12.3

Veeam
03/12/2026
0
0 (0%)
Share
  • Comments
  • Download
  • Transcript
Report Like Favorite
  • Share/Embed
  • Email
Link
Embed

Transcript


TL;DR

  • Veeam 12.3 introduces Coveware Recon Scanner, a proactive threat detection tool that identifies indicators of compromise before malicious code activates, reducing dwell time and enabling early intervention against ransomware attacks.
  • The platform provides multi-layered security across pre-backup, during-backup, and post-backup phases, including AI-powered entropy analysis, Indicator of Compromise scanning, YARA rule scanning, and secure restore capabilities.
  • Extensive integrations with Palo Alto Networks Cortex XSIAM, Splunk, and ServiceNow allow security teams to consolidate Veeam security events into existing SIEM and SOAR workflows for unified threat visibility.
  • Veeam emphasizes that 27% of ransomware victims who paid ransoms still couldn't recover data, reinforcing the importance of verified backup integrity and proactive threat detection over ransom payment strategies.
  • Recon Scanner is included with Veeam Premium edition at no additional charge, while Advanced edition provides Indicator of Compromise scanning and Threat Center analytics, and Foundation edition includes AI-powered malware detection.

Ransomware Threat Landscape and Data Resilience Challenges

The webinar opens by establishing the critical context for data protection in today's threat environment. Organizations face two primary challenges: vendor lock-in that limits data portability and budget flexibility, and the escalating sophistication of ransomware attacks. Veeam highlights that 75% of organizations have experienced at least one ransomware attack, with most reporting multiple incidents. Perhaps most concerning is that 27% of organizations who paid ransoms still could not recover their data, underscoring the importance of proactive threat detection and verified backup integrity rather than relying on ransom payment as a recovery strategy.

Coveware Recon Scanner for Proactive Threat Detection

A major focus of the presentation is Recon Scanner, a tool developed by Coveware (a Veeam division specializing in cyber extortion incident response). Originally designed for post-attack forensics, Recon Scanner has evolved into a proactive assessment tool that runs as a lightweight agent on Veeam servers. The scanner collects encrypted data and sends it to Coveware for analysis, then presents findings through a comprehensive dashboard that classifies threats by severity (critical, high, medium, low) aligned with the MITRE ATT&CK framework. The tool excels at reducing dwell time by identifying indicators of compromise before malicious code activates, providing timeline views of suspicious events, and offering detailed forensic information including specific log files and attack techniques. This proactive approach allows organizations to detect threats that may sit dormant in environments for days, weeks, or months before activation.

Multi-Layered Malware Detection and Security Integrations

Veeam 12.3 introduces a comprehensive security stack spanning pre-backup, during-backup, and post-backup phases. Pre-backup capabilities include Recon Scanner, the Security and Compliance Analyzer, and the Veeam Incident API. During backup, the platform offers Indicator of Compromise scanning, AI-powered inline entropy analysis, and file system activity monitoring. Post-backup features include signature-based malware scanning, YARA rule scanning (introduced in 12.1), and secure restore capabilities that verify backup cleanliness before recovery. The presentation demonstrates extensive integrations with security platforms including Palo Alto Networks (Cortex XSIAM), Splunk, and ServiceNow, allowing security teams to consolidate Veeam security events into existing SIEM and SOAR workflows. These integrations provide unified dashboards showing backup job status, security events, configuration backup health, and malware detection alerts.

Veeam Threat Center and Edition-Based Feature Distribution

The Veeam Threat Center within Veeam ONE provides a centralized dashboard for monitoring security posture, SLA compliance, anomalies, and infected restore points across the entire backup infrastructure. The presentation clarifies feature distribution across Veeam editions: Foundation edition includes full backup/recovery with AI-powered malware detection; Advanced edition adds Indicator of Compromise scanning, security integrations, and Veeam Threat Center analytics; Premium edition includes Recovery Orchestrator and Recon Scanner at no additional charge. The webinar emphasizes that immutability combined with single-use credentials remains a foundational security practice, ensuring that even if production environments are compromised, verified clean backups remain available for recovery.

Chapters

0:00 - Introduction and Webinar Overview
1:06 - Data Resilience Challenges and Threat Landscape
2:51 - Veeam Security Capabilities Overview
6:27 - Coveware Recon Scanner Introduction
8:05 - Recon Scanner Dashboard and Timeline Demo
32:48 - Splunk Integration Demo
48:34 - Veeam Threat Center Overview
50:00 - Edition Comparison and Feature Distribution
51:30 - Closing Remarks

Key Quotes

1:45 "... 27% of organizations who paid a ransom at the end of the day still could not recover their data."
2:18 "... 75% of organizations suffered at least one ransomware attack, most of them reporting getting hit more than once."
3:38 "You don't always want to wait to find something in one of your backups, because if you find it in your backup, that means it's already in your environment."
7:54 "Recon Scanner was just used as a tool to scan after an attack. And it was kind of used to identify, you know, what type of attack got in. How long was it there? What was it doing? But now we can kind of implement that as a proactive assessment approach."
12:58 "The best part about this is really it's going to cut down on that dwell time."
13:12 "A bad actor or a threat actor were to gain access to your environment, maybe, you know, drop a file or a little script, something that shouldn't be there. That's not always activated right away. That could sit in your environment for maybe a couple of days, a couple of weeks, even a couple months."
Categories:
  • » Data Protection » Backup & Recovery
  • » Data Protection
Channels:
News:
Events:
Tags:
  • Data Protection
  • Threat Intelligence
  • Security Operations
  • Demo
  • Technical Deep Dive
  • Ransomware Detection
  • Backup Security
  • Incident Response
  • SIEM Integration
  • Malware Scanning
  • Proactive Threat Hunting
  • MITRE ATT&CK Framework
Show more Show less

Browse videos

  • Related
  • Featured
  • By date
  • Most viewed
  • Top rated
  •  

              Video's comments: Threat Detection & Protection in Veeam Data Platform 12.3

              Upcoming Webinar Calendar

              • 03/17/2026
                06:00 AM
                03/17/2026
                L'importance cruciale de l'ITDR pour 2026 et au-delà
                https://www.truthinit.com/index.php/channel/1856/limportance-cruciale-de-litdr-pour-2026-et-au-delà/
              • 03/18/2026
                01:00 PM
                03/18/2026
                Beyond Chatbots: Agentic AI That Actually Fixes Identity Risk
                https://www.truthinit.com/index.php/channel/1847/beyond-chatbots-agentic-ai-that-actually-fixes-identity-risk/
              • 03/19/2026
                11:00 AM
                03/19/2026
                Risk in Real Time: Stopping Exploits Before the CVE Even Exists
                https://www.truthinit.com/index.php/channel/1372/unlocking-network-intelligence-for-smarter-risk-decisions/
              • 03/19/2026
                01:00 PM
                03/19/2026
                Cyber CSI 2.0: Phishing Forensics in the Age of AI and Deepfakes
                https://www.truthinit.com/index.php/channel/1842/cyber-csi-2-0-phishing-forensics-in-the-age-of-ai-and-deepfakes/
              • 03/26/2026
                01:00 AM
                03/26/2026
                Reclaim Network Clarity and Accountability with Netskope DEM
                https://www.truthinit.com/index.php/channel/1846/reclaim-network-clarity-and-accountability-with-netskope-dem/
              • 03/26/2026
                05:00 AM
                03/26/2026
                ITDR as an Integral Component of Critical Security Architecture
                https://www.truthinit.com/index.php/channel/1863/itdr-as-an-integral-component-of-critical-security-architecture/
              • 03/26/2026
                01:00 PM
                03/26/2026
                HUMAN Dialogue: Transforming City-Scale Cyber Resilience through AI Innovations
                https://www.truthinit.com/index.php/channel/1835/human-dialogue-transforming-city-scale-cyber-resilience-through-ai-innovations/
              • 03/26/2026
                01:00 PM
                03/26/2026
                Making GPUs Available On Demand (Without Breaking the Budget)
                https://www.truthinit.com/index.php/channel/1858/making-gpus-available-on-demand-without-breaking-the-budget/
              • 04/08/2026
                01:00 PM
                04/08/2026
                Managing Configuration at Scale Across Group Policy and Intune
                https://www.truthinit.com/index.php/channel/1865/managing-configuration-at-scale-across-group-policy-and-intune/

              Upcoming Events

              • Apr
                08

                Managing Configuration at Scale Across Group Policy and Intune

                04/08/202601:00 PM ET
                • Mar
                  26

                  HUMAN Dialogue: Transforming City-Scale Cyber Resilience through AI Innovations

                  03/26/202601:00 PM ET
                  • Mar
                    26

                    Making GPUs Available On Demand (Without Breaking the Budget)

                    03/26/202601:00 PM ET
                    • Mar
                      26

                      ITDR as an Integral Component of Critical Security Architecture

                      03/26/202605:00 AM ET
                      • Mar
                        26

                        Reclaim Network Clarity and Accountability with Netskope DEM

                        03/26/202601:00 AM ET
                        More events
                        Truth in IT
                        • Sponsor
                        • About Us
                        • Terms of Service
                        • Privacy Policy
                        • Contact Us
                        • Preference Management
                        Desktop version
                        Standard version