| Title | : | Ransomware-proof backups: Configuring and Integrating Object First´s Ootbi with Veeam VBR |
| Duration | : | 11:32 |
| Viewed | : | 480 |
| Published | : | 12-03-2024 |
| Source | : | Youtube |
It's alarming to note that over the past few years, the speed at which ransomware attacks are executed has plummeted by a staggering 94%. Criminals now take an average of just 3.85 days to deploy a ransomware attack, a significant decrease that should raise serious concerns. Once triggered, the encryption process is lightning-fast, further underscoring the situation's urgency. Since ransomware attacks specifically target backup environments, the importance of immutable backup repositories cannot be overstated. They have evolved from a mere security feature to a critical component of any data protection architecture, serving as a robust defense against the evolving threat landscape. Object First is an immutable S3 object storage developed to work with the Veeam Data Platform. Object First´s Ootbi also helps you extend the principles and best practices of CISA's Zero Trust Maturity Model to the backup and recovery architecture, enabling the implementation of a Zero Trust Data Resilience (ZTDR) architecture. In this demonstration, I present the initial configuration of Object First´s Ootbi appliance using the text user interface (local console) to the configuration of the S3-keys and the S3-bucket in the web interface and end with the configuration and use of the solution in VBR and its presentation to Veeam ONE. For more information, refer to the post in the Veeam Community and in my blog: https://community.veeam.com/blogs-and-podcasts-57/ransomware-proof-backups-configuring-and-integrating-object-first-with-veeam-vbr-6930 https://cloudnroll.com/
![]() |
Object First - Ootbi is now LIVE! 35:58 - 0 |
![]() |
Got @veeam ? Become Ransomware-Proof with Ootbi... 59:59 - 0 |
![]() |
"Blackberry fatal i Berberit", Karamuço: Ballu... 08:03 - 0 |
![]() |
Veeam V12.1 (Ransomware protection and security... 25:03 - 0 |
![]() |
Network Security and Troubleshooting Part 2 11:04 - 0 |
![]() |
Network of Connecting Dots | 4K Relaxing Screen... 30:00 - 0 |
![]() |
Remotus IT | Malware Detection with Veeam B&R (... 08:54 - 0 |
![]() |
HTTPS, SSL, TLS & Certificate Authority Explained 43:29 - 0 |


