The New Backup Exec Reinforces Data Protection & Ransomware Defenses

Backup Exec March 21, 2024

Ransomware attackers meticulously plan their strategies to exploit vulnerabilities, aiming for high-value targets like corporate secrets or personally identifiable information. Once compromised, this information can fetch a high price on the dark web or be used to harm individuals or organizations. The sophistication of these attacks is growing, with cybercriminals identifying and exploiting the weaknesses of susceptible individuals to gain unauthorized access to sensitive data.

At the same time, they face increasing dangers related to data privacy and cybersecurity due to the dynamic nature of digitization. Quite simply, cybersecurity and data protection are just like the two sides of the same coin - they cannot exist without the other.

Malware, short for malicious software, is designed to disrupt, damage, or gain unauthorized access to computer systems. It often enters through system vulnerabilities, including those introduced by human error, and once inside, it can execute a range of destructive activities and propagate throughout your environment.

Just launched, the new version of Backup Exec by Veritas offers a built-in way to identify malware within your environment, offering added protection from ransomware attacks. Step by step, it provides a collection of comprehensive functionalities designed to safeguard against cyber hazards and enhance operational effectiveness, all while ensuring your business-critical data is never at risk of loss.

Simple, Unified, Resilient, and Secure Data Protection

The unified design of Veritas Backup Exec eliminates the need for multiple point products and allows a user’s entire data estate to be managed from a single console. Veritas Backup Exec offers a cost-effective solution for keeping pace with the changing data and threat landscape. Continuously strengthening the solution’s capabilities and defensive measures and adhering to a rapid development cycle, the latest release of Veritas Backup Exec introduces several new features:

Malware detection 

Equips users with another line of defense against malicious code propagating within their data environment. Veritas Backup Exec malware detection, powered by Microsoft Defender, can be used to scan both VMware and Hyper-V backup sets at any time or prior to recovery.

Role-based access control

Limits access to data based on a user’s specific role. In the event an account is compromised by hackers, the hackers can only corrupt the small volume of data associated with that specific user’s account. 

Faster backup and recovery

Optimize protection performance with enhancements to deduplication. Protection of virtual machines is now faster with parallel backup of multiple virtual disks and the included ability to recover virtual machines instantly.

Combating Cyber Threats with Malware Detection

To combat malware, Veritas has incorporated Malware Detection into Backup Exec. This feature scans backup datasets for signs of malware infections, acting as an essential preventive measure. By ensuring that data is clean before it's restored, Backup Exec provides an added layer of security, safeguarding against the reintroduction of malware into the system.

Strengthening Security with Role-based Access Control

Without precise control over who can access what data and systems, organizations leave themselves open to internal threats and unauthorized access. Role-based Access Control (RBAC) systems address this issue by assigning specific roles and permissions to users, ensuring that only authorized personnel can access sensitive information and perform critical operations.

Role-based Access Control in Veritas Backup Exec is a powerful organizational security solution. Backup Exec controls sensitive activities and data by granularly defining user roles and server access. Internal threats are minimized this way, all while strengthening the overall security framework of an organization, promoting a culture of accountability, and safeguarding against potential breaches.

Optimizing Performance

Traditional backup methods, which often process virtual machines (VMs) sequentially, can result in prolonged backup windows and potentially impact the availability of critical systems. In response, there is an increasing demand for backup solutions that can protect multiple virtual machines concurrently. This effectively minimizes the time needed to safeguard critical data and guarantee less disruption to operational workflows.

In terms of performance, Veritas has included enhancements to the deduplication engine and optimized the protection of multiple virtual disks with parallel backup, a critical function that optimizes backup operations. Through the implementation of concurrent backups and optimized deduplication, this functionality effectively diminishes the duration needed to safeguard critical data across virtual environments, consequently augmenting operational efficiency.

Try Out the New Version of Backup Exec by Veritas!

There is no better time to refine your data protection and cybersecurity strategies. Forward-thinking businesses are invited to give Backup Exec a try and see for themselves how it may revolutionize their data protection and cybersecurity strategies. Try it free for 60 days and if you are an existing user of Backup Exec, we strongly encourage you to consider upgrading to the latest version today.

For a more detailed overview of the latest release, learn more here and make sure to read the press release.

Jason Von Eberstein
Senior Principle Product Manager
VOX Profile