Truth in IT
    • Sign In
    • Register
        • Videos
        • Channels
        • Pages
        • Galleries
        • News
        • Events
        • All
Truth in IT Truth in IT
  • Data Management ▼
    • Converged Infrastructure
    • DevOps
    • Networking
    • Storage
    • Virtualization
  • Cybersecurity ▼
    • Application Security
    • Backup & Recovery
    • Data Security
    • Identity & Access Management (IAM)
    • Zero Trust
    • Compliance & GRC
    • Endpoint Security
  • Cloud ▼
    • Hybrid Cloud
    • Private Cloud
    • Public Cloud
  • Webinar Library
  • TiPs

Threat Detection & Protection in Veeam Data Platform 12.3

Veeam
03/12/2026
24
0 (0%)
Share
  • Comments
  • Download
  • Transcript
Report Like Favorite
  • Share/Embed
  • Email
Link
Embed

Transcript


TL;DR

  • Veeam 12.3 introduces Coveware Recon Scanner, a proactive threat detection tool that identifies indicators of compromise before malicious code activates, reducing dwell time and enabling early intervention against ransomware attacks.
  • The platform provides multi-layered security across pre-backup, during-backup, and post-backup phases, including AI-powered entropy analysis, Indicator of Compromise scanning, YARA rule scanning, and secure restore capabilities.
  • Extensive integrations with Palo Alto Networks Cortex XSIAM, Splunk, and ServiceNow allow security teams to consolidate Veeam security events into existing SIEM and SOAR workflows for unified threat visibility.
  • Veeam emphasizes that 27% of ransomware victims who paid ransoms still couldn't recover data, reinforcing the importance of verified backup integrity and proactive threat detection over ransom payment strategies.
  • Recon Scanner is included with Veeam Premium edition at no additional charge, while Advanced edition provides Indicator of Compromise scanning and Threat Center analytics, and Foundation edition includes AI-powered malware detection.

Ransomware Threat Landscape and Data Resilience Challenges

The webinar opens by establishing the critical context for data protection in today's threat environment. Organizations face two primary challenges: vendor lock-in that limits data portability and budget flexibility, and the escalating sophistication of ransomware attacks. Veeam highlights that 75% of organizations have experienced at least one ransomware attack, with most reporting multiple incidents. Perhaps most concerning is that 27% of organizations who paid ransoms still could not recover their data, underscoring the importance of proactive threat detection and verified backup integrity rather than relying on ransom payment as a recovery strategy.

Coveware Recon Scanner for Proactive Threat Detection

A major focus of the presentation is Recon Scanner, a tool developed by Coveware (a Veeam division specializing in cyber extortion incident response). Originally designed for post-attack forensics, Recon Scanner has evolved into a proactive assessment tool that runs as a lightweight agent on Veeam servers. The scanner collects encrypted data and sends it to Coveware for analysis, then presents findings through a comprehensive dashboard that classifies threats by severity (critical, high, medium, low) aligned with the MITRE ATT&CK framework. The tool excels at reducing dwell time by identifying indicators of compromise before malicious code activates, providing timeline views of suspicious events, and offering detailed forensic information including specific log files and attack techniques. This proactive approach allows organizations to detect threats that may sit dormant in environments for days, weeks, or months before activation.

Multi-Layered Malware Detection and Security Integrations

Veeam 12.3 introduces a comprehensive security stack spanning pre-backup, during-backup, and post-backup phases. Pre-backup capabilities include Recon Scanner, the Security and Compliance Analyzer, and the Veeam Incident API. During backup, the platform offers Indicator of Compromise scanning, AI-powered inline entropy analysis, and file system activity monitoring. Post-backup features include signature-based malware scanning, YARA rule scanning (introduced in 12.1), and secure restore capabilities that verify backup cleanliness before recovery. The presentation demonstrates extensive integrations with security platforms including Palo Alto Networks (Cortex XSIAM), Splunk, and ServiceNow, allowing security teams to consolidate Veeam security events into existing SIEM and SOAR workflows. These integrations provide unified dashboards showing backup job status, security events, configuration backup health, and malware detection alerts.

Veeam Threat Center and Edition-Based Feature Distribution

The Veeam Threat Center within Veeam ONE provides a centralized dashboard for monitoring security posture, SLA compliance, anomalies, and infected restore points across the entire backup infrastructure. The presentation clarifies feature distribution across Veeam editions: Foundation edition includes full backup/recovery with AI-powered malware detection; Advanced edition adds Indicator of Compromise scanning, security integrations, and Veeam Threat Center analytics; Premium edition includes Recovery Orchestrator and Recon Scanner at no additional charge. The webinar emphasizes that immutability combined with single-use credentials remains a foundational security practice, ensuring that even if production environments are compromised, verified clean backups remain available for recovery.

Chapters

0:00 - Introduction and Webinar Overview
1:06 - Data Resilience Challenges and Threat Landscape
2:51 - Veeam Security Capabilities Overview
6:27 - Coveware Recon Scanner Introduction
8:05 - Recon Scanner Dashboard and Timeline Demo
32:48 - Splunk Integration Demo
48:34 - Veeam Threat Center Overview
50:00 - Edition Comparison and Feature Distribution
51:30 - Closing Remarks

Key Quotes

1:45 "... 27% of organizations who paid a ransom at the end of the day still could not recover their data."
2:18 "... 75% of organizations suffered at least one ransomware attack, most of them reporting getting hit more than once."
3:38 "You don't always want to wait to find something in one of your backups, because if you find it in your backup, that means it's already in your environment."
7:54 "Recon Scanner was just used as a tool to scan after an attack. And it was kind of used to identify, you know, what type of attack got in. How long was it there? What was it doing? But now we can kind of implement that as a proactive assessment approach."
12:58 "The best part about this is really it's going to cut down on that dwell time."
13:12 "A bad actor or a threat actor were to gain access to your environment, maybe, you know, drop a file or a little script, something that shouldn't be there. That's not always activated right away. That could sit in your environment for maybe a couple of days, a couple of weeks, even a couple months."
Categories:
  • » Data Protection » Backup & Recovery
  • » Data Protection
  • » Cybersecurity » Compliance & GRC
Channels:
News:
Events:
Tags:
  • Data Protection
  • Threat Intelligence
  • Security Operations
  • Demo
  • Technical Deep Dive
  • Ransomware Detection
  • Backup Security
  • Incident Response
  • SIEM Integration
  • Malware Scanning
  • Proactive Threat Hunting
  • MITRE ATT&CK Framework
Show more Show less

Browse videos

  • Related
  • Featured
  • By date
  • Most viewed
  • Top rated
  •  

              Video's comments: Threat Detection & Protection in Veeam Data Platform 12.3

              Upcoming Webinar Calendar

              • 04/29/2026
                12:00 PM
                04/29/2026
                Strategies for Safeguarding AI in Applications, Agents, and APIs
                https://www.truthinit.com/index.php/channel/1893/strategies-for-safeguarding-ai-in-applications-agents-and-apis/
              • 04/30/2026
                10:00 AM
                04/30/2026
                Insights from the 2026 Keepit Annual Data Report on SaaS Data Protection
                https://www.truthinit.com/index.php/channel/1868/insights-from-the-2026-keepit-annual-data-report-on-saas-data-protection/
              • 04/30/2026
                01:00 PM
                04/30/2026
                The New Economics of a VMware Exit
                https://www.truthinit.com/index.php/channel/1880/the-new-economics-of-vmware-exit/
              • 05/06/2026
                02:00 AM
                05/06/2026
                Transforming AI's Potential: Proactively Identifying Attacks Before Breaches Occur
                https://www.truthinit.com/index.php/channel/1886/transforming-ais-potential-proactively-identifying-attacks-before-breaches-occur/
              • 05/06/2026
                10:00 PM
                05/06/2026
                World Password Day: Strategies for Managing Your Passwords Effectively
                https://www.truthinit.com/index.php/channel/1913/world-password-day-strategies-for-managing-your-passwords-effectively/
              • 05/07/2026
                05:00 AM
                05/07/2026
                World Password Day: Strategies for Managing Your Passwords Effectively
                https://www.truthinit.com/index.php/channel/1914/world-password-day-strategies-for-managing-your-passwords-effectively/
              • 05/07/2026
                01:00 PM
                05/07/2026
                World Password Day: Strategies for Managing Your Passwords Effectively
                https://www.truthinit.com/index.php/channel/1915/world-password-day-strategies-for-managing-your-passwords-effectively/
              • 05/12/2026
                01:00 PM
                05/12/2026
                Transforming Black Box to Glass Box: Revealing Hidden Threats and AI Risks through Data Lineage
                https://www.truthinit.com/index.php/channel/1895/transforming-black-box-to-glass-box-revealing-hidden-threats-and-ai-risks-through-data-lineage/
              • 05/12/2026
                11:30 PM
                05/12/2026
                Effective Strategies for Safeguarding Active Directory and Minimizing Data Exposure
                https://www.truthinit.com/index.php/channel/1888/effective-strategies-for-safeguarding-active-directory-and-minimizing-data-exposure/
              • 05/13/2026
                01:00 AM
                05/13/2026
                Transforming the Black Box: Revealing AI Risks and Hidden Threats through Data Lineage
                https://www.truthinit.com/index.php/channel/1890/transforming-the-black-box-revealing-ai-risks-and-hidden-threats-through-data-lineage/
              • 05/13/2026
                05:00 AM
                05/13/2026
                Transforming Black Box to Glass Box: Revealing AI Risks and Hidden Threats through Data Lineage
                https://www.truthinit.com/index.php/channel/1894/transforming-black-box-to-glass-box-revealing-ai-risks-and-hidden-threats-through-data-lineage/
              • 05/21/2026
                11:00 AM
                05/21/2026
                The Autonomous Era: Orchestrating a Resilient Enterprise
                https://www.truthinit.com/index.php/channel/1372/the-autonomous-era-orchestrating-a-resilient-enterprise/

              Upcoming Events

              • Apr
                29

                Strategies for Safeguarding AI in Applications, Agents, and APIs

                04/29/202612:00 PM ET
                • Apr
                  30

                  Insights from the 2026 Keepit Annual Data Report on SaaS Data Protection

                  04/30/202610:00 AM ET
                  • Apr
                    30

                    The New Economics of a VMware Exit

                    04/30/202601:00 PM ET
                    • May
                      06

                      Transforming AI's Potential: Proactively Identifying Attacks Before Breaches Occur

                      05/06/202602:00 AM ET
                      • May
                        06

                        World Password Day: Strategies for Managing Your Passwords Effectively

                        05/06/202610:00 PM ET
                        More events
                        Truth in IT
                        • Sponsor
                        • About Us
                        • Terms of Service
                        • Privacy Policy
                        • Contact Us
                        • Preference Management
                        Desktop version
                        Standard version