Truth in IT
    • Sign In
    • Register
        • Videos
        • Channels
        • Pages
        • Galleries
        • News
        • Events
        • All
Truth in IT Truth in IT
  • Data Management ▼
    • Converged Infrastructure
    • DevOps
    • Networking
    • Storage
    • Virtualization
  • Cybersecurity ▼
    • Application Security
    • Backup & Recovery
    • Data Security
    • Identity & Access Management (IAM)
    • Zero Trust
  • Cloud ▼
    • Hybrid Cloud
    • Private Cloud
    • Public Cloud
  • Webinar Library
  • TiPs

Veeam Data Platform v13 Overview & Linux Deployment

Veeam
03/12/2026
0
0 (0%)
Share
  • Comments
  • Download
  • Transcript
Report Like Favorite
  • Share/Embed
  • Email
Link
Embed

Transcript


TL;DR

  • Veeam Backup & Replication v13 introduces native Linux deployment via a Rocky Linux-based software appliance with hardened security, four-eyes authentication, and high availability capabilities
  • New granular role-based access control allows delegation of backup and restore permissions down to individual jobs and restore scopes, implementing least-privilege security across both Linux and Windows editions
  • Veeam Recovery Orchestrator adds Nutanix AHV support for cross-platform recovery and migration, enabling VMware-to-AHV and AHV-to-AHV disaster recovery scenarios
  • Platform modernization includes a new web UI for Backup & Replication, refreshed Veeam ONE interface with Postgres data warehousing, and expanded Recon Scanner coverage of Veeam infrastructure components
  • Future roadmap focuses on broader cloud platform support, advanced malware detection expansion, and continued integration growth beyond traditional virtualization environments

Linux Deployment and Security Enhancements

The session introduces Veeam Backup & Replication running natively on Linux through a modern software appliance built on Rocky Linux. This ISO-based deployment model brings the hardened security profile previously available only in Veeam Hardened Repository to the core backup server, offering secure-by-default configuration with minimal OS complexity. The Linux version includes four-eyes authentication requiring security administrator approval for critical operations, active-passive high availability for large distributed environments, and granular role-based access control that extends down to individual backup jobs and restore scopes. These security capabilities align with the principle of least privilege and will be available in both Linux and Windows editions of version 13.

Platform Modernization and Cross-Platform Recovery

Veeam Data Platform v13 delivers significant modernization across the product portfolio, including a new web-based user interface for Veeam Backup & Replication that will coexist with the traditional Windows client during the transition to full feature parity. Veeam ONE receives a refreshed user experience with Postgres-based data warehousing for faster custom reporting and integrated alarm management directly in the web interface. Veeam Recovery Orchestrator expands cross-platform capabilities to support Nutanix AHV as both a recovery target and source, enabling VMware-to-AHV migrations and AHV-to-AHV disaster recovery scenarios. The Recon Scanner from the Coveware acquisition now supports scanning Veeam infrastructure components including backup servers, proxies, repositories, and gateways, with Linux support coming soon.

Roadmap and Ecosystem Expansion

Looking beyond the immediate v13 release, Veeam outlined continued expansion of platform support across cloud environments, advanced malware detection capabilities for additional platforms, and broader integration coverage beyond traditional virtualization. The company emphasized its evolution from VMware-only origins in 2006 to comprehensive protection spanning virtual machines, cloud workloads, physical servers, applications, and SaaS platforms like Salesforce and Microsoft 365. Customers are encouraged to engage through the Veeam community forums and R&D feedback channels to influence future development priorities. The session noted that some legacy features including reversed incremental backup mode will be deprecated in v12, and customers should review the deprecation list before upgrading.

Chapters

0:00 - Introduction and Agenda
1:33 - Veeam Data Platform Overview
4:24 - Veeam History and Evolution
5:51 - Linux Deployment Introduction
8:36 - Granular Role-Based Access Control
10:22 - Four-Eyes Authentication and HA
11:46 - Web UI and Windows Features
12:52 - Veeam ONE Updates
16:11 - Recovery Orchestrator Enhancements
18:09 - Recon Scanner Capabilities
20:36 - Future Roadmap and Community
23:04 - Deprecations and Next Steps

Key Quotes

6:02 "We actually introduced an ISO-based deployment for it for Linux. So it's ultimately designed for, you know, simplified, standardized installation for Linux proxies, as well as the hardened repositories."
7:29 "The hardened repository had one thing that we all really liked, and that was a really strong built-in security profile. And tell me how we're taking that to the modern software appliance."
9:22 "This level of control really helps align with the principle of least privileges. And we can also limit the restore scope too, meaning that users can be allowed to restore only data from specific locations, backup jobs, or even define backup sources."
10:35 "To further enhance security and accountability, we now have or implemented four eyes authentication model with the high availability model. So this means whenever a critical event is generated, like a sensitive restore or a configuration change, it's going to require a second set of eyes."
16:28 "With this new release, Veeam introduced a powerful cross-platform capability. So now it not only supports VMware, but it also supports Nutanix AHV, where now you can actually take and restore a VMware backup to AHV location, making it easier for migration."
18:42 "Veeam Cybersecure is a packaging of Veeam Data Platform Premium, including the Coveware software stack and a retainer of their expertise for incident response."
Categories:
  • » Data Protection » Backup & Recovery
  • » Data Protection
Channels:
News:
Events:
Tags:
  • Data Protection
  • Backup & Recovery
  • Technical Deep Dive
  • Demo
  • Cloud Security
  • Compliance & Governance
  • Linux deployment
  • backup security
  • role-based access control
  • cross-platform recovery
  • disaster recovery orchestration
  • ransomware detection
  • web-based management
Show more Show less

Browse videos

  • Related
  • Featured
  • By date
  • Most viewed
  • Top rated
  •  

              Video's comments: Veeam Data Platform v13 Overview & Linux Deployment

              Upcoming Webinar Calendar

              • 03/17/2026
                06:00 AM
                03/17/2026
                L'importance cruciale de l'ITDR pour 2026 et au-delà
                https://www.truthinit.com/index.php/channel/1856/limportance-cruciale-de-litdr-pour-2026-et-au-delà/
              • 03/18/2026
                01:00 PM
                03/18/2026
                Beyond Chatbots: Agentic AI That Actually Fixes Identity Risk
                https://www.truthinit.com/index.php/channel/1847/beyond-chatbots-agentic-ai-that-actually-fixes-identity-risk/
              • 03/19/2026
                11:00 AM
                03/19/2026
                Risk in Real Time: Stopping Exploits Before the CVE Even Exists
                https://www.truthinit.com/index.php/channel/1372/unlocking-network-intelligence-for-smarter-risk-decisions/
              • 03/19/2026
                01:00 PM
                03/19/2026
                Cyber CSI 2.0: Phishing Forensics in the Age of AI and Deepfakes
                https://www.truthinit.com/index.php/channel/1842/cyber-csi-2-0-phishing-forensics-in-the-age-of-ai-and-deepfakes/
              • 03/26/2026
                01:00 AM
                03/26/2026
                Reclaim Network Clarity and Accountability with Netskope DEM
                https://www.truthinit.com/index.php/channel/1846/reclaim-network-clarity-and-accountability-with-netskope-dem/
              • 03/26/2026
                05:00 AM
                03/26/2026
                ITDR as an Integral Component of Critical Security Architecture
                https://www.truthinit.com/index.php/channel/1863/itdr-as-an-integral-component-of-critical-security-architecture/
              • 03/26/2026
                01:00 PM
                03/26/2026
                HUMAN Dialogue: Transforming City-Scale Cyber Resilience through AI Innovations
                https://www.truthinit.com/index.php/channel/1835/human-dialogue-transforming-city-scale-cyber-resilience-through-ai-innovations/
              • 03/26/2026
                01:00 PM
                03/26/2026
                Making GPUs Available On Demand (Without Breaking the Budget)
                https://www.truthinit.com/index.php/channel/1858/making-gpus-available-on-demand-without-breaking-the-budget/
              • 04/08/2026
                01:00 PM
                04/08/2026
                Managing Configuration at Scale Across Group Policy and Intune
                https://www.truthinit.com/index.php/channel/1865/managing-configuration-at-scale-across-group-policy-and-intune/

              Upcoming Events

              • Apr
                08

                Managing Configuration at Scale Across Group Policy and Intune

                04/08/202601:00 PM ET
                • Mar
                  26

                  HUMAN Dialogue: Transforming City-Scale Cyber Resilience through AI Innovations

                  03/26/202601:00 PM ET
                  • Mar
                    26

                    Making GPUs Available On Demand (Without Breaking the Budget)

                    03/26/202601:00 PM ET
                    • Mar
                      26

                      ITDR as an Integral Component of Critical Security Architecture

                      03/26/202605:00 AM ET
                      • Mar
                        26

                        Reclaim Network Clarity and Accountability with Netskope DEM

                        03/26/202601:00 AM ET
                        More events
                        Truth in IT
                        • Sponsor
                        • About Us
                        • Terms of Service
                        • Privacy Policy
                        • Contact Us
                        • Preference Management
                        Desktop version
                        Standard version