Software Products
About 62 products found for Software- Workload Limit: Protects up to 10 workloads total
- Supported Platforms: VMware vSphere, Hyper-V, Proxmox VE, Nutanix AHV; physical Windows/Linux servers/workstations via Veeam Agents.
- Backup Methods: Forever forward incremental, forward/reverse incremental backups with changed block tracking (CBT); active/synthetic full backups
- Replication: VM replication for disaster recovery, creating bootable onsite/offsite copies powered on via native hypervisor tools
- User Limits: Supports up to 10 Exchange Online/OneDrive for Business users; 10 Microsoft Teams; 1 TB total SharePoint Online data
- Protected Services: Backs up Exchange Online mailboxes, SharePoint Online sites/lists, OneDrive for Business files, Microsoft Teams chats/channels/files
- Recovery Options: Granular item-level restores (emails, files, sites); full object recovery; powerful eDiscovery search for compliance needs
- Deployment: Installs on Windows Server 2012 R2+ (64-bit); requires 4 GB RAM minimum, 3 GB disk space plus logs; proxy for backups optional
- Scale Limits: Restricted to up to 5 Kubernetes nodes; same core functionality as Enterprise edition but lacks production-scale support and advanced features
- Deployment: Simple Helm chart installation into a Kubernetes cluster (e.g., namespace "kasten-io"); supports major distributions like OpenShift, Rancher, EKS, AKS
- Core Capabilities: Policy-driven backups, application-consistent snapshots, restore/disaster recovery, multi-cloud mobility; automatic discovery of apps and dependencies
- Interfaces: Intuitive web-based GUI dashboard, CLI, and native Kubernetes API for automation; real-time monitoring of policies and restore points
- User Limit: Protects up to 50 Salesforce users at no cost; ideal for small organizations using Enterprise or Unlimited Salesforce editions
- Backup Frequency: High-frequency backups as often as every 5 minutes per object, with flexible scheduling down to the object level for low RPOs
- Deployment Flexibility: Runs anywhere—on-premises, AWS, Azure, or other clouds; multi-org management from a single console.
- Security Features: Client-side encryption
- Monitoring Scope: Covers up to 10 workloads
- Core Features: Real-time alarms for proactive alerts
- Remediation Actions: One-click fixes like removing orphaned snapshots or adding VMs to backup jobs; process monitoring
- Reporting: Comprehensive dashboards for performance, capacity, and SLA compliance; no email customization or advanced report features.
- Backup Types: Supports entire computer image backups, volume-level backups, and file-level backups with options for full, incremental, and differential chains
- Recovery Options: Bare-metal recovery to same/different hardware, granular file restores, and bootable WinPE recovery media creation for disaster scenarios.
- Deployment: Installs directly on Windows 10/11, Server 2016–2025 (64-bit); no central server needed, but integrates with Veeam Backup & Replication for management.
- Scheduling and Automation: Configurable backup schedules, pre/post-job scripts, and entire user profile backups to avoid missing data.
- Backup Capabilities: Entire computer (with auto-exclude of unnecessary files), volume-level block backups, file-level with masks/folders
- Recovery Options: Bare-metal restore to same/different hardware, volume-level for failed drives/partitions
- Kernel and Distro Support: Linux kernels 2.6.32+ using default distribution kernels; distributed as RPM/DEB packages for broad compatibility including old installations.
- Deployment and Interface: Simple installation via console UI or veeamconfig CLI; standalone or managed by Veeam Backup & Replication; supports snapshotless mode for mounted filesystems
- Supported macOS Versions: Compatible with macOS 11 Big Sur through macOS 15 Sequoia
- Backup Capabilities: File-level and volume-level backups of user data/folders; APFS snapshots for consistent backups; supports incremental chains to local disks, network shares, or object storage
- Recovery Options: Granular file restores, full volume recovery; wizard-driven interface for easy restoration; achieves 3-2-1 rule compliance with offsite targets.
- Deployment: Standalone .pkg installer or managed via Veeam Backup & Replication/Jamf Pro; requires full disk access permission in System Settings for complete protection.
- Multi-Tenancy: Full tenant isolation with quotas, usage tracking, and role-based access; supports unlimited tenants from a single web console.
- Encryption Standards: End-to-end 256-bit AES encryption at source, in-flight (SSL/TLS), and at rest; customer-managed keys for compliance.
- Deployment Options: Installs on physical/virtual servers or public clouds like Azure/IBM Cloud; Cloud Gateway requires 8 GB RAM (scales to 500 concurrent tasks), 300 MB disk, 1 Gbps+ network
- Storage Integration: Native object storage (S3-compatible) for unlimited capacity; supports re-archiving to cloud tiers for cost efficiency.
- Centralized Monitoring: Provides a single dashboard for visibility into customers' on-premises, hosted, or cloud workloads, including backup jobs, alarms, and RPO/SLA compliance reports.
- Multi-Tenancy: Securely isolates tenant data with role-based access; supports companies and resellers with customizable resource allocation and self-service portals.
- Licensing Management: Automates license generation, deployment, and usage reporting for Veeam products like Backup & Replication, ONE, and Microsoft 365; integrates with VCSP Pulse Portal.
- API and Automation: Robust RESTful APIs for integrations with tools like ConnectWise; enables automated onboarding, billing, and support ticket creation with log bundling.
- Immutable Backups: Uses hardened, unchangeable storage with air-gapped copies to protect against ransomware, deletion, or tampering, aligned with NIST 2.0 standards.
- RPO/RTO Flexibility: Achieves seconds-level Recovery Point Objectives (RPO) via Continuous Data Protection (CDP); customizable Recovery Time Objectives (RTO) through orchestrated failover/failback
- Multi-Tenancy Support: Leverages Veeam Service Provider Console (VSPC), Cloud Connect (VCC), and Disaster Recovery Orchestrator (VDRO) for scalable tenant onboarding and web-based recovery portals
- Platform Compatibility: Replicates VMware vSphere, Hyper-V VMs to provider-side vSphere, VMware Cloud Director (VCD), or Hyper-V; supports hybrid/multi-cloud environments
- Version Compatibility: Supports Veeam Backup for Google Cloud v7.0.0.47 with Veeam Backup & Replication (VBR) v13.0.1.180; plug-in v13.7.0.281 on Ubuntu 22.04 LTS backup
- Hardware for Plug-in: x86-64 CPU, 8 GB RAM minimum (plus 1 GB per concurrent task), 500 MB disk for installation; requires .NET Core Runtime 8.0+ and ASP.NET Core 8.0+.
- Proxy Requirements: 2+ vCPU cores (recommended 4+), 2 GB RAM + 1 GB per task, 750 MB disk (Windows) or 400 MB (Linux); 1 Gbps network for optimal performance.
- Backup Appliance: 6 vCPUs, 6 GB RAM, 100 GB disk; handles up to 4 concurrent tasks (add 1 vCPU/1 GB RAM per extra task).
- Current version: 9a (build 9.1.0.3107, released May 31, 2023); next GA planned for June 2026 per lifecycle policy.
- Supports upgrade: from v8.0+; older versions like v8.0 U6 (2015–2018) and v7.0 are out of support.
- VMware: vSphere/ESXi/vCenter 8.x/7.x/6.5 (English)
- Hyper-V: Windows Server 2022/2019/2016; SCOM 2022/2019/2016.
- Coverage: Apps, namespaces, KubeVirt VMs, PVs; auto-discovers dependencies (PVCs, ConfigMaps, Secrets); policy-driven backups.
- Features: Application-consistent snapshots, multi-cluster replication, ransomware protection, restore validation, blueprint-based DB protection.
- Cluster: 4 vCPU/8 GB RAM min for K10 pod; scales to 16 vCPU/32 GB for 500+ namespaces.
- Node: x86_64/ARM64; Kubernetes 1.25-1.31; CSI driver required for snapshots.
- Coverage: All Salesforce objects (data, metadata, attachments, reports, profiles, flows); child/parent relationships; custom fields.
- Features: Custom schedules/high-frequency backups, granular restore/compare, sandbox seeding, archiving, data masking, encryption (built-in/AWS KMS), RBAC notifications
- Setup: Cloud console; Salesforce Administrator account; OAuth/API v63.0+; supports multi-org RBAC (view/full admin)
- Backup Proxy: Fully managed; handles unlimited storage/archiving; high-frequency schedules (hourly+).
- Coverage: VMware/Hyper-V/Nutanix/Proxmox/KubeVirt VMs; agents for Windows/Linux; AWS-native backups; immutable storage; ransomware protection.
- Performance: Scales via proxies (2+ cores CPU, 2+ GB RAM/task); backup server (6+ cores, 6+ GB RAM, 100 GB disk).
- Backup Server: 6+ cores CPU, 6+ GB RAM base (+1 core/1 GB per task); 176 GB disk (10 GB database/catalog per 1,000 VMs).
- Proxies/Repos: 2-4+ cores CPU, 2+ GB RAM/task; WAN accelerators need 2 cores/4 GB min, 20 GB disk
- Backup Types: Native API policy-based image/file-level backups; immutable S3 storage (Standard, Glacier Flex/Deep Archive)
- Recovery: Full instance restore, file-level (FAT/NTFS/ext4/XFS/Btrfs), VPC config protection free.
- Requirements: t3.medium+ EC2 (x86_64), outbound AWS access; no VBR management needed
- Coverage: EC2, RDS, EFS, FSx, DynamoDB, Redshift; image/file-level backups; VPC config protection.
- Backup Capabilities: Host-level backups for VMs; agent-based for physical/cloud machines; granular file/application recovery via Veeam Explorers.
- Replication: VM replication for low RTO disaster recovery; bootable onsite/offsite copies. ?
- Cloud Support: Direct restore/migration to AWS, Azure; NAS backup up to 250 GB per license
- Limits: Max 10 sockets/instances total; no GFS/tape/scale-out repo; VeeamZIP unlimited.
- Confident Security: Offers 7-phase onboarding, design/implementation assistance per Veeam best practices, and quarterly security assessments by experts.
- Comprehensive Incident Support: Provides 24/7 access to a dedicated Ransomware SWAT Team with 30-minute SLAs for rapid response and recovery orchestration.
- Financial Protection:: : Includes up to $5M ransomware warranty covering recovery costs, plus Coveware-led extortion response (assessment, negotiation, decryption aid).
- Eligibility & Tiers: Open to all customers regardless of product/edition; no restrictions apply.
- Assessment Phase: : Identifies ransomware strain, risks, recovery options, and strain analytics like data recovery rates.
- Negotiation Support: Handles extortion talks using threat actor data from thousands of cases; includes settlement and decryption aid
- Response Retainer: 24/7 Coveware support for triage, forensics, post-incident docs, and up to $5M ransomware warranty
- :
- Unified Protection: Secures Kubernetes apps, KubeVirt VMs, and workloads via consistent policies; supports multi-cluster management with RBAC/OIDC and FIPS compliance.
- Mobility Features: Enables seamless workload movement between on-premises, cloud, and edge; integrates CSI storage, Kanister Blueprints for databases, and GitOps/Helm installs.
- Resilience Tools: Provides immutable air-gapped backups, ransomware defense, rapid file restores from PersistentVolumeClaims via SFTP, and cyber recovery
- :
- Region?locked placement policies: Policies that lock backups and copies to specific geographic regions (e.g., “EU?only,” “US?only”) to meet data?residency laws.
- Self?describing backups: Backup data carries all metadata needed to restore anywhere in the allowed region, with no dependency on external catalogs or appliances.
- Policy?based governance: Central policy engine for backup, retention, encryption, and immutability settings, with live dashboards to highlight policy gaps before audits.
- Immutable, locked storage: Integration with Veeam Data Cloud Vault and hardened repositories to enforce WORM?style retention in the chosen region.
- Veeam Intelligence (conversational AI): Built?in assistant that answers questions in natural language about job health, risks, performance, and recommended actions.
- Predictive / early?warning insights: Machine?learning?driven early?warning signs, risk prediction, and compliance?gap detection before jobs fail.
- Recovery?focused insights: Identifies the safest, cleanest restore points and models “blast?radius” of detected threats to guide recovery paths.
- Data sources: Backup job logs, performance metrics, storage usage, and security scans (including Recon Scanner 3.0 in Veeam Data Platform v13).
- Data encryption: AES 256 encryption for backup data at rest and TLS?encrypted network traffic in transit.
- Access protection: Support for multi?factor authentication (MFA), role?based access control (RBAC), and “four?eyes” approval for sensitive operations.
- Immutable backups: Immutable native backups that cannot be modified or deleted for a defined retention period, protecting backups from ransomware and tampering.
- Cleanroom / safe?point recovery: Identify and recover from “clean” restore points, validated as free of known threats.
- Virtual: VMware vSphere, Microsoft Hyper?V, Nutanix AHV
- Physical: Windows / Linux servers, workstations
- Cloud: AWS, Azure, Google Cloud (VMs, disks, cloud?native snapshots).
- SaaS / apps: Microsoft 365, Salesforce, Microsoft Entra ID, Azure workloads. Backup and recovery capabilities
- Storage class: Secure object storage backed by Microsoft Azure Blob Storage.
- Foundation: Locally redundant storage (3 copies in one data center), 11?nines durability, “fair?use” restore behavior
- Advanced: Zone?redundant storage, up to 12?nines durability, unlimited read/restore.
- Immutability: Immutable by default with WORM?style object lock, time?based retention, and compliance?mode legal hold to resist ransomware and accidental deletion.
- Protected data: Salesforce data and metadata (standard/custom objects, records, profiles, permission sets, flows, etc.).
- Backup model: Near?continuous backups using Salesforce API; schedules configurable per object with RPO?driven policies.
- Granular restore: individual records, files, fields, or entire objects, including hierarchy?aware parent/child restores
- Deployment: Runs on?premises, in AWS, Azure, or as Veeam Data Cloud for Salesforce (SaaS?delivered).
- Azure databases: Azure SQL, Cosmos DB, Azure Files
- Infrastructure: Azure Virtual Network (VNet) configuration
- Backup types and scheduling: Supports image?level backups (full + incremental) and cloud?native snapshots (point?in?time).
- Recovery targets: Restore within Azure, Restore to on?premises
- Microsoft 365 data: Exchange Online, SharePoint Online, OneDrive for Business, Microsoft Teams
- Bulk / DR?scale restore: Fast bulk restore for large?scale incidents or tenant?level disruptions.
- Deployment: Fully SaaS?based, no?agent for M365/Entra ID; no local Veeam server needed
- Storage: Unlimited storage included in the per?user subscription
- Cyber-Immune Design: Built on KasperskyOS for security by design.
- VDI Support: Supports virtual desktop infrastructures.
- Remote Access: Enables secure access to remote applications.
- Centralized Management: Allows unified control of thin client devices.
- Secure Microkernel: Uses a minimal and highly secure kernel design.
- Component Isolation: Isolates system components to limit attack impact.
- Policy-Based Control: Strictly controls interactions between processes.
- Reduced Attack Surface: Limits exploitable system functions.
- Integration Ready: Designed for embedding into third-party solutions.
- High Performance: Optimized for fast scanning and low latency.
- File Scanning: Scans files and objects for malicious content.
- Data Stream Analysis: Analyzes data streams in real time.
- Machine Learning Analysis: Uses ML models to analyze large data sets.
- Unknown Threat Detection: Detects threats without known signatures.
- Behavioral Monitoring: Monitors activity across systems and processes.
- Early Warning: Value: Provides early alerts for suspicious activity.
- Phishing Simulations: Tests employee response to phishing attacks.
- Automated Campaigns: Runs training and simulations automatically.
- Learning Paths: Provides structured cybersecurity training programs.
- User Assessment: Measures employee security behavior over time
- Global Threat Coverage: Covers threats observed worldwide.
- Indicators of Compromise: Supplies IOCs for faster threat detection.
- Malware Analysis: Delivers insights into malware behavior and risks.
- Threat Context: Adds context to security alerts and incidents.
- Behavioral Analysis: Detects abnormal user behavior patterns.
- Account Protection: Prevents account takeover attempts.
- Transaction Monitoring: Analyzes online payment activities.
- Device Profiling: Identifies suspicious or risky devices.
- Real-Time Monitoring: Continuously monitors airspace activity.
- Drone Tracking: Tracks drone movement and flight paths.
- Threat Identification: Identifies drone types and behavior.
- Area Protection: Secures restricted and sensitive locations.
- Asset Visibility: Identifies and monitors OT and ICS assets.
- Industrial Protocol Support: Supports common industrial communication protocols.
- Non-Intrusive Monitoring: Operates without disrupting industrial processes.
- Centralized Management: Provides a unified view of OT security status.
- Data Sovereignty: Ensures no security data is shared externally.
- Threat Intelligence: Uses Kaspersky detection technologies locally.
- Reputation Services: Provides local file and URL reputation checks.
- Compliance Support: Meets strict regulatory and security requirements.
- Real-Time Correlation: Correlates events to identify security incidents.
- Threat Detection: Detects suspicious activity and potential threats.
- Alerting: Generates alerts for critical security events.
- Log Management: Stores and manages large volumes of log data.
- Runtime Protection: Monitors containers for suspicious behavior during execution.
- Kubernetes Support: Integrates with Kubernetes environments.
- Vulnerability Detection: Identifies known weaknesses in container images.
- Policy Enforcement: Applies security rules across container workloads.
- Virtual Machine Security: Protects VMs from malware and advanced threats.
- Centralized Management: Manages security policies from a single console.
- Advanced Threat Detection: Detects sophisticated attacks on cloud workloads.
- System Integrity Monitoring: Monitors critical system changes in cloud environments.
- Secure Connectivity: Protects data traffic between network locations.
- Traffic Optimization: Routes traffic based on performance and policies.
- Centralized Management: Manages all sites from a single console.
- Link Aggregation: Uses multiple network links for better reliability.
- Zero-Day Protection: Detects previously unknown exploits.
- Behavioral Analysis: Analyzes suspicious behavior to identify attacks.
- Sandbox Analysis: Safely analyzes suspicious files in isolation.
- Network Traffic Analysis: Detects malicious activity in network communications.
- URL Filtering: Controls access to websites by category.
- Real-Time Traffic Scanning: Scans web traffic as it passes through the gateway.
- Phishing Protection: Prevents access to phishing and fake websites.
- Malware Detection: Identifies and blocks web-delivered malware.
- Phishing Defense: Prevents phishing and social engineering attacks.
- Spam Filtering: Reduces unwanted and harmful email traffic.
- Real-Time Scanning: Scans emails as they pass through the server.
- Attachment Control: Inspects and blocks dangerous file types.
- Malware Detection: Scans attachments and links for malware.
- Exchange Online Security: Protects Microsoft Exchange Online mailboxes.
- OneDrive Protection: Scans files stored in OneDrive for threats.
- SharePoint Protection: Secures shared documents and collaboration spaces.
- Extended Threat Detection: Identifies advanced and multi-stage cyber attacks.
- Incident Response Support: Provides expert guidance during security incidents.
- Centralized Visibility: Offers a unified view of detected threats.
- Alert Prioritization: Filters and prioritizes critical security alerts.
