All articles in Veeam

Protecting Oracle KVM with Veeam

In this post we will review the configuration of Veeam Backup & Replication and integration with Oracle KVM to protect virtual machines running on this platform. We will also see some important characteristics in relation to disks, types of disks in KVM and how to create disks to obtain Changed Block Tracking in incremental backups.

Continue reading Protecting Oracle KVM with Veeam
 

Incident Response Plan with NIST 800-61, 800-53r5, Mitre ATT&CK and Veeam

In today's cybersecurity landscape, being prepared for incidents is as crucial as preventing them. NIST regulations 800-61 and 800-53r5, along with the Mitre ATT&CK enterprise matrix, provide solid guidelines for creating an effective incident response plan. In this post, we will review the importance of these frameworks and how the Veeam Platform it is a strategically in incident response.

Continue reading Incident Response Plan with NIST 800-61, 800-53r5, Mitre ATT&CK and Veeam
 

Which Operating System is More Secure?

In this post, we will review the operating systems most used by organizations in IT environments, whether in the public cloud or local data centers, asking the typical question, which operating system is more secure? Microsoft Windows, Linux, OpenBSD, FreeBSD? Or, from another point of view, what are the protection measures that will be applied to operating systems? Is only Firewall and Antivirus enough? Is it sufficient to disable the SSH service in Linux environments? Is it enough to not use root?

Continue reading Which Operating System is More Secure?
 

How to Integrate Active Directory with Kasten K10 and OpenShift

In this post, we will review how to configure Kasten K10 installed via Operator for Red Hat Openshift to integrate the Authentikation of Microsoft Active Directory to access the console of K10 with Dex.

Continue reading How to Integrate Active Directory with Kasten K10 and OpenShift
 

How to Configure NFS Repository for Kasten K10

One of the options that many companies use to host their backups is NFS, in this guide, we will review how to configure an NFS Profile to be used by Kasten K10, in accordance with the good practices that are indicated in the documentation of Kasten.

Continue reading How to Configure NFS Repository for Kasten K10
 

Kasten K10 Authentik

One of the characteristics of Kasten K10 most used, is the integration with centralized Authentikation and identity systems, through different protocols, for the management of access to the different clusters of kubernetes using RBAC by means of K10 and/or for the access of K10 Multi-Cluster in environments with multiple clusters of kubernetes. In this post, we will review the easy setup of Authentik and integration with Kasten K10.

Continue reading Kasten K10 Authentik
 

Kasten RBAC Multi-Tenant Multi-Cluster Keycloak – 1

In this post, we will look at Role Based Access Control (RBAC) configuration in conjunction with Kasten K10 for access to one or multiple clusters protected by Kasten, is aimed both at clients who manage 1 or more clusters of any distribution of kubernetes supported by K10, as well as to service providers (SP or MSP) that offer the support of containers of kubernetes with Kasten K10, with the aim of providing controlled access to users / clients according to the granular roles required by each cluster or operation. We will also use a Single Sign-On (SSO) solution using OpenID in this case, Keycloak, for the centralized management of access credentials for either users or groups.

Continue reading Kasten RBAC Multi-Tenant Multi-Cluster Keycloak – 1
 

Veeam Backup for Red Hat Virtualization

tremendous news from Veeam! Now it supports a new virtualization platform, Red Hat Virtualization, with the aim of protecting virtual machines in an easy way and taking advantage of the integration of the new CBT APIs that have been implemented in RHV. In this post we will see how to deploy Veeam for Red Hat Virtualization integrated with Veeam Backup & Replication reviewing the features and dependencies necessary for complete RHV protection.

Continue reading Veeam Backup for Red Hat Virtualization
 

Veeam Cloud Connect Performance

One of the most used platforms to offer remote management services, backup, disaster recovery, among others is Veeam Cloud Connect with Veeam Service Provider Console, which enable service providers to offer multiple optionsones of data protection. also exists Veeam Cloud Connect for Enterprise that allows large companies to offer services internally according to the needs of their business. In this post we will review a simple configuration to improve the performance of receiving data.

Continue reading Veeam Cloud Connect Performance
 

Veeam Agent for Solaris and Veeam 11a

In this post we will review one of the new features in the latest version of Veeam Backup & Replication 11a which has been recently released and includes console management of Veeam Backup & Replication for Unix agents, Veeam Agent for Solaris and Veeam Agent for AIX

Continue reading Veeam Agent for Solaris and Veeam 11a