Truth in IT
    • Sign In
    • Register
        • Videos
        • Channels
        • Pages
        • Galleries
        • News
        • Events
        • All
Truth in IT Truth in IT
  • Data Management ▼
    • Converged Infrastructure
    • DevOps
    • Networking
    • Storage
    • Virtualization
  • Cybersecurity ▼
    • Application Security
    • Backup & Recovery
    • Data Security
    • Identity & Access Management (IAM)
    • Zero Trust
    • Compliance & GRC
    • Endpoint Security
  • Cloud ▼
    • Hybrid Cloud
    • Private Cloud
    • Public Cloud
  • Webinar Library
  • TiPs
  • AI & Machine Learning

Security Visibility with Veeam and CrowdStrike Integration

Veeam
03/20/2026
0
0 (0%)
Share
  • Comments
  • Download
  • Transcript
Report Like Favorite
  • Share/Embed
  • Email
Link
Embed

Transcript


TL;DR

  • Veeam and CrowdStrike have partnered to integrate backup security events into security operations workflows, addressing the critical gap where 89% of ransomware attacks target backup repositories but IT and security teams often operate in silos.
  • The integration forwards over 300 Veeam event types via syslog into CrowdStrike's LogScale platform, providing security teams with centralized visibility into backup infrastructure health, malware detection, and suspicious activity without leaving their SOC environment.
  • Veeam's security capabilities include AI-powered ransomware detection during backup operations, indicators of compromise scanning for hacker toolkits, YARA rule support, and the proprietary Threat Hunter engine—all operating locally on customer infrastructure.
  • The Veeam app for CrowdStrike is available free from the CrowdStrike Marketplace for organizations running Veeam Data Platform 12.1 or later with Advanced or Premium licensing, featuring pre-built dashboards and scheduled search capabilities.
  • The integration enables security teams to detect backup-related threats in real-time and incorporate backup integrity into incident response planning, helping organizations identify clean recovery points and build more effective ransomware recovery strategies.

The IT-Security Alignment Challenge

The webinar opens by addressing a critical gap in enterprise security: the disconnect between IT operations and security teams. Emily Cahill, CTO and Director of Product Strategy at Veeam, presents data from the 2025 Risk to Resilience Report showing that 69% of surveyed organizations experienced ransomware attacks resulting in encryption or data exfiltration, with 89% having their backup repositories specifically targeted. The fundamental problem is that security teams receive an average of 11,000 alerts daily, making it difficult to identify genuine threats, while backup infrastructure—critical for recovery—often operates in a silo without adequate security visibility. The session emphasizes that modern ransomware attacks specifically target backup systems because eliminating recovery options maximizes the attacker's leverage for ransom payment.

Veeam's Data Resilience Framework

Veeam positions itself not as a traditional backup vendor but as a data resilience platform built on five pillars: data backup, data recovery, data portability, data security, and data intelligence. The presentation details how Veeam has evolved beyond basic backup and restore to incorporate security-focused capabilities including AI-powered ransomware detection that scans data blocks during backup operations, indicators of compromise (IOC) detection that identifies known hacker toolkits, and file system activity analysis for malware extensions. Post-backup security includes signature-based malware scanning with bring-your-own-antivirus integration, YARA rule support for pattern-based threat detection, and Veeam's proprietary Threat Hunter engine. These capabilities operate locally on customer infrastructure rather than sending data to external cloud services, addressing data sovereignty and privacy concerns while providing real-time threat detection during backup operations.

CrowdStrike Integration Architecture

The core of the webinar focuses on the newly available Veeam app for CrowdStrike, which integrates Veeam's backup and security events into CrowdStrike's security operations platform via syslog. The integration forwards over 300 event types from Veeam Data Platform and Veeam One monitoring into CrowdStrike's LogScale for centralized visibility, correlation, and analysis. The demonstration shows how security teams can access pre-built dashboards displaying backup job status, malware detection events, suspicious activity alerts, and infrastructure health metrics within the CrowdStrike interface. This eliminates the need for security analysts to context-switch between platforms and enables them to incorporate backup infrastructure security into their broader threat hunting and incident response workflows. The integration supports scheduled searches, custom alerting, and drill-down investigation capabilities, allowing security teams to identify patterns such as unusual backup failures that might indicate an active attack.

Implementation and Availability

The Veeam app for CrowdStrike and the Veeam Data Connector are available for free download from the CrowdStrike Marketplace. Organizations must be running Veeam Data Platform version 12.1 or later with Advanced or Premium licensing to access the integration capabilities. The Foundation edition does not support this functionality. The webinar emphasizes that this integration represents the beginning of ongoing co-innovation between Veeam and CrowdStrike, with additional capabilities planned for future releases. The session concludes with practical guidance on deployment requirements and a Q&A addressing common concerns about alert fatigue, the value of post-compromise detection for recovery planning, and licensing considerations for organizations evaluating the integration.

Chapters

0:00 - Introduction and Webinar Overview
1:13 - The Cybersecurity Landscape
3:35 - 2025 Risk to Resilience Report Findings
7:28 - SecOps Team Challenges
10:04 - IT and Security Alignment Strategy
11:42 - Veeam's Data Resilience Pillars
16:14 - Data Security Capabilities
26:04 - AI Ransomware Detection
29:17 - Post-Backup Security Scanning
32:02 - Orchestrated Recovery at Scale
42:02 - CrowdStrike Integration Demo
44:01 - Integration Architecture and Availability
45:10 - Q&A Session

Key Quotes

11:47 "Do you now do threat detection as well or is Veeam now trying to get into the security game? Well, the main portion of this is, number one, Veeam, we look to power data resilience, right? We want to keep every business running regardless of the type of disaster."
3:56 "... 69% of them had been impacted by at least one ransomware attack that resulted in either encryption or data exfiltration."
5:00 "... 89% of organizations had their backup repositories targeted by the threat actor. That should come as no surprise, right? If their main goal is to get a payday, well, the first thing that they're going to go after is going to be your backup plan."
6:52 "... 11K is the average number of alerts that a SOC receives per day."
26:21 "We're not taking any of this data and processing it post-backup. We're not taking any of this data and sending it off to our own threat intelligence feeds that lives in the cloud or anything like that. No, this is all happening in-house locally on your servers and on your systems that are running."
28:09 "TeamViewer, not a bad tool, but now if all of a sudden we're seeing it deployed on a few machines, whether it be file servers or Active Directory, et cetera, then maybe we wanna start, you know, be having some good indicators or some alerts that are going to notify us that we're seeing some unusual malicious behavior being utilized with these tools."

Categories:
  • » Data Protection » Backup & Recovery
  • » Data Protection
Channels:
News:
Events:
Tags:
  • Data Protection
  • Security Operations
  • Threat Intelligence
  • Webinar
  • Technical Deep Dive
  • Best Practices
  • Backup & Recovery
  • Ransomware Recovery
  • Backup Security
  • SIEM Integration
  • Threat Detection
  • IT-Security Alignment
  • Data Resilience
  • Incident Response
Show more Show less

Browse videos

  • Related
  • Featured
  • By date
  • Most viewed
  • Top rated
  •  

              Video's comments: Security Visibility with Veeam and CrowdStrike Integration

              Upcoming Webinar Calendar

              • 03/26/2026
                01:00 AM
                03/26/2026
                Reclaim Network Clarity and Accountability with Netskope DEM
                https://www.truthinit.com/index.php/channel/1846/reclaim-network-clarity-and-accountability-with-netskope-dem/
              • 03/26/2026
                05:00 AM
                03/26/2026
                ITDR's Role in Strengthening Critical Security Architecture
                https://www.truthinit.com/index.php/channel/1863/itdrs-role-in-strengthening-critical-security-architecture/
              • 03/26/2026
                01:00 PM
                03/26/2026
                HUMAN Dialogue: Transforming Municipal Risk through AI and City-Scale Cyber Resilience
                https://www.truthinit.com/index.php/channel/1835/human-dialogue-transforming-municipal-risk-through-ai-and-city-scale-cyber-resilience/
              • 03/26/2026
                01:00 PM
                03/26/2026
                Making GPUs Available On Demand (Without Breaking the Budget)
                https://www.truthinit.com/index.php/channel/1858/making-gpus-available-on-demand-without-breaking-the-budget/
              • 04/08/2026
                01:00 PM
                04/08/2026
                Managing Configuration at Scale Across Group Policy and Intune
                https://www.truthinit.com/index.php/channel/1865/managing-configuration-at-scale-across-group-policy-and-intune/
              • 04/15/2026
                01:00 PM
                04/15/2026
                Service Account Security in the Age of AI: From Legacy Accounts to Agentic Identities
                https://www.truthinit.com/index.php/channel/1866/service-account-security-in-the-age-of-ai-from-legacy-accounts-to-agentic-identities/
              • 04/30/2026
                10:00 AM
                04/30/2026
                SaaS Data Protection Insights: Key Findings from the 2026 Keepit Annual Report
                https://www.truthinit.com/index.php/channel/1868/saas-data-protection-insights-key-findings-from-the-2026-keepit-annual-report/

              Upcoming Events

              • Mar
                26

                Reclaim Network Clarity and Accountability with Netskope DEM

                03/26/202601:00 AM ET
                • Mar
                  26

                  ITDR's Role in Strengthening Critical Security Architecture

                  03/26/202605:00 AM ET
                  • Mar
                    26

                    HUMAN Dialogue: Transforming Municipal Risk through AI and City-Scale Cyber Resilience

                    03/26/202601:00 PM ET
                    • Mar
                      26

                      Making GPUs Available On Demand (Without Breaking the Budget)

                      03/26/202601:00 PM ET
                      • Apr
                        08

                        Managing Configuration at Scale Across Group Policy and Intune

                        04/08/202601:00 PM ET
                        More events
                        Truth in IT
                        • Sponsor
                        • About Us
                        • Terms of Service
                        • Privacy Policy
                        • Contact Us
                        • Preference Management
                        Desktop version
                        Standard version