SlideShare a Scribd company logo
1 of 44
Sean Lee Heung
Territory Manager
sean.lee.heung@veeam.com
Veeam Availability
Prevent, Detect, Respond
Chris McDonald
Systems Engineer
chris.mcdonald@veeam.com
Ransomware in the News
Source: https://blog.knowbe4.com/heads-up-new-ransomware-strain-encrypts-cloud-email-real-time-video
Ransomware in Office 365
OAuth Token
Malware
encrypting
objects
SaaS
Intelligent data management platform that delivers the hyper-availability of data demanded from
the enterprise
Orchestration
Private
Cloud
Public
Cloud
Managed
Cloud
Edge &
IoT
Physical
Universal APIs
Visibility & Control
Cloud
Office
365
Physical
DataLabs
Backup
& Recovery
Replication
& Failover
Veeam Hyper-Availability Platform
Any app, any data, across any cloud
Veeam Availability
• 3-2-1-1 Rule
• Cloud Connect AND Cloud Tier
• Backup and replication of
encrypted VM’s
• Encryption of Veeam network traffic and
backup files
Prevention
The 3-2-1-1 Rule
2Different media
3Different copies
of data
1of which is off-site
1Is offline
The 3-2-1-1 Rule
Production Environment
Cloud Connect Repository
Offsite/Secondary Repository
Veeam
Backup & Replication
Tape
The 3-2-1-1 Rule with Snapshots
Production Environment
Cloud Connect Repository
Offsite/Secondary Repository
Veeam
Backup & Replication
TapeStorage Snapshots
Recovery from Storage Snapshots
Nightly
Backup
Nightly
Backup
Unprotected
8 AM 9 AM 10 AM 11 AM 12 PM 1 PM 2 PM 3 PM 4 PM 5 PM
Veeam Leveraging Storage Snapshots
snapsnapsnapsnapsnapsnapsnapsnapsnapsnap
Microsoft
Exchange
Microsoft
Active Directory
Microsoft
SQL Server
Microsoft
SharePoint
Oracle
Veeam Cloud Connect
• Backup as a Service
• Disaster Recovery as a Service
Veeam Cloud Connect Value
•
•
•
•
Technology that permits Veeam Cloud Connect backups to keep backup
data safe from a number of potentially dangerous situations:
Insider protection
Insider protection use case
In the unfortunate situations where:
• All backups are deleted or removed from
the end user’s on-premises infrastructure
• All backups are deleted or removed from
Veeam Cloud Connect Backup repositories
The Veeam Cloud Connect Backup service
provider can make backup data available
again outside of the customer’s control.
Veeam
Availability Suite
On-premises installation
and backup data
Cloud
repository
Insider Protection Use Case
Veeam Availability Suite Cloud Repository Recycle Bin /
“Undelete”
• Service Provider can
make data available
to tenant through
insider protection
capability.
On-premises installation
and backup data
Unlimited
Capacity
Cost
Effective
Veeam Cloud Tier
DAS
NAS
Dedupe
Appliance
Performance
Tier
Capacity
Tier
Amazon S3
& S3 Compatible
Azure Blob
Storage
IBM Cloud
Object Storage
Oldest Backups
• Policy-based
• Transparent
• Space efficient
• Self-sufficient
• No extra costs
Veeam Cloud Tier
Veeam Availability
• 3-2-1 Rule
• Cloud Connect AND Cloud Tier
• Backup and replication of
encrypted VM’s
• Encryption of Veeam network traffic and
backup files
Prevention
Veeam Availability
• 3-2-1 Rule
• Cloud Connect AND Cloud Tier
• Backup and replication of
encrypted VM’s
• Encryption of Veeam network traffic
and backup files
Prevention
Veeam Availability
Detection
• Ransomware Monitoring
• Infrastructure changes audit
• Protected (and unprotected) VM’s
• Backup and Replica verification
Veeam Availability
Detection
• Ransomware Monitoring
• Infrastructure changes audit
• Protected (and unprotected) VM’s
• Backup and Replica verification
Veeam Availability
Detection
• Ransomware Monitoring
• Infrastructure changes audit
• Protected (and unprotected) VM’s
• Backup and Replica verification
Veeam Availability
Detection
• Ransomware Monitoring
• Infrastructure changes audit
• Protected (and unprotected) VM’s
• Backup and Replica verification
100% Peace of mind recoveries will be successful
Automate restore tests
Data Lab
vPower
Veeam Availability
Response
• Instant recovery
• VM failover
• Instant application item access
with Veeam Explorers
• Data Labs for backup verification,
on-demand sandbox, secure restore,
staged restore
Restore any VM in minutes
Regardless of size
vPower
Migrate online
Veeam Availability
Response
• Instant recovery
• VM failover
• Instant application item access
with Veeam Explorers
• Data Labs for backup verification,
on-demand sandbox, secure restore,
staged restore
Failover
ReplicationFailover to your DR site with 1 click
Replication
Production
10.X.X.X
DR site
192.X.X.X
60s 120s 90s
Veeam Availability
Response
• Instant recovery
• VM failover
• Instant application item access
with Veeam Explorers
• Data Labs for backup verification,
on-demand sandbox, secure restore,
staged restore
Veeam Availability
Response
• Instant recovery
• VM failover
• Instant application item access
with Veeam Explorers
• Data Labs for backup verification,
on-demand sandbox, staged restore
Leverage your data for more than recoveries
Data Lab
vPower
Test new service packs / Isolate and debug production issues
Staged Restore
1. Restore point
selected
2. VM started from backup
in Veeam DataLb
3. Injected app-specific script is
executed inside the VM
4. Clean VM is
restored into
production
Secure Restore
27%
43%
25%
4%
1%
1 2 3 4 5
CONCERN ABOUT CROSS
CONTAMINATION OF BACKUPS? 70% of
Customers are
concerned about
backups being
contaminated!
ESG October 2018 Data Protection Landscape Study
Secure Restore
1. Restore point
selected
2. Mounts
restored
disks
3. Triggers AV scan
on guest volumes
4. Action is
determined
by AV scan result
5. Clean VM is
restored into
production
Veeam Availability
Prevention, Detection, Response
320K+
WW Customers
3.5X
NPS vs. industry average
>90%
Customer Satisfaction
17M+
VMs Protected
Thank you

More Related Content

What's hot

Network access control (nac)
Network access control (nac)Network access control (nac)
Network access control (nac)cyberlocke
 
Application Virtualization presentation
Application Virtualization presentationApplication Virtualization presentation
Application Virtualization presentationATWIINE Simon Alex
 
Deep Dive: a technical insider's view of NetBackup 8.1 and NetBackup Appliances
Deep Dive: a technical insider's view of NetBackup 8.1 and NetBackup AppliancesDeep Dive: a technical insider's view of NetBackup 8.1 and NetBackup Appliances
Deep Dive: a technical insider's view of NetBackup 8.1 and NetBackup AppliancesVeritas Technologies LLC
 
Azure vm introduction
Azure  vm introductionAzure  vm introduction
Azure vm introductionLalit Rawat
 
Cloud security and security architecture
Cloud security and security architectureCloud security and security architecture
Cloud security and security architectureVladimir Jirasek
 
Ransomware Resiliency, Recoverability and Availability
Ransomware Resiliency, Recoverability and AvailabilityRansomware Resiliency, Recoverability and Availability
Ransomware Resiliency, Recoverability and AvailabilityLai Yoong Seng
 
Disaster Recovery using Azure Services
Disaster Recovery using Azure ServicesDisaster Recovery using Azure Services
Disaster Recovery using Azure ServicesAnoop Nair
 
Cloud Computing - An Introduction
Cloud Computing - An IntroductionCloud Computing - An Introduction
Cloud Computing - An IntroductionRavindra Dastikop
 
Server virtualization
Server virtualizationServer virtualization
Server virtualizationofsorganizer
 
Cyberark training pdf
Cyberark training pdfCyberark training pdf
Cyberark training pdfAkhil Kumar
 
Understanding Azure Disaster Recovery
Understanding Azure Disaster RecoveryUnderstanding Azure Disaster Recovery
Understanding Azure Disaster RecoveryNew Horizons Ireland
 
Cloud computing and its security issues
Cloud computing and its security issuesCloud computing and its security issues
Cloud computing and its security issuesJyoti Srivastava
 
Evolving Your Backup Strategy with Veeam and AWS - DEM06 - Chicago AWS Summit
Evolving Your Backup Strategy with Veeam and AWS - DEM06 - Chicago AWS SummitEvolving Your Backup Strategy with Veeam and AWS - DEM06 - Chicago AWS Summit
Evolving Your Backup Strategy with Veeam and AWS - DEM06 - Chicago AWS SummitAmazon Web Services
 
What are the types of data centers
What are the types of data centersWhat are the types of data centers
What are the types of data centersLivin Jose
 
Virtualization & cloud computing
Virtualization & cloud computingVirtualization & cloud computing
Virtualization & cloud computingSoumyajit Basu
 
Veeam Presentation
Veeam PresentationVeeam Presentation
Veeam Presentationcvaleze
 

What's hot (20)

Network access control (nac)
Network access control (nac)Network access control (nac)
Network access control (nac)
 
Application Virtualization presentation
Application Virtualization presentationApplication Virtualization presentation
Application Virtualization presentation
 
Deep Dive: a technical insider's view of NetBackup 8.1 and NetBackup Appliances
Deep Dive: a technical insider's view of NetBackup 8.1 and NetBackup AppliancesDeep Dive: a technical insider's view of NetBackup 8.1 and NetBackup Appliances
Deep Dive: a technical insider's view of NetBackup 8.1 and NetBackup Appliances
 
Cloud Services: Types of Cloud
Cloud Services: Types of CloudCloud Services: Types of Cloud
Cloud Services: Types of Cloud
 
SIEM and Threat Hunting
SIEM and Threat HuntingSIEM and Threat Hunting
SIEM and Threat Hunting
 
Azure vm introduction
Azure  vm introductionAzure  vm introduction
Azure vm introduction
 
Cloud security
Cloud securityCloud security
Cloud security
 
Cloud security and security architecture
Cloud security and security architectureCloud security and security architecture
Cloud security and security architecture
 
Ransomware Resiliency, Recoverability and Availability
Ransomware Resiliency, Recoverability and AvailabilityRansomware Resiliency, Recoverability and Availability
Ransomware Resiliency, Recoverability and Availability
 
Disaster Recovery using Azure Services
Disaster Recovery using Azure ServicesDisaster Recovery using Azure Services
Disaster Recovery using Azure Services
 
Cloud Computing - An Introduction
Cloud Computing - An IntroductionCloud Computing - An Introduction
Cloud Computing - An Introduction
 
Server virtualization
Server virtualizationServer virtualization
Server virtualization
 
Cyberark training pdf
Cyberark training pdfCyberark training pdf
Cyberark training pdf
 
Understanding Azure Disaster Recovery
Understanding Azure Disaster RecoveryUnderstanding Azure Disaster Recovery
Understanding Azure Disaster Recovery
 
Cloud computing and its security issues
Cloud computing and its security issuesCloud computing and its security issues
Cloud computing and its security issues
 
Evolving Your Backup Strategy with Veeam and AWS - DEM06 - Chicago AWS Summit
Evolving Your Backup Strategy with Veeam and AWS - DEM06 - Chicago AWS SummitEvolving Your Backup Strategy with Veeam and AWS - DEM06 - Chicago AWS Summit
Evolving Your Backup Strategy with Veeam and AWS - DEM06 - Chicago AWS Summit
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
What are the types of data centers
What are the types of data centersWhat are the types of data centers
What are the types of data centers
 
Virtualization & cloud computing
Virtualization & cloud computingVirtualization & cloud computing
Virtualization & cloud computing
 
Veeam Presentation
Veeam PresentationVeeam Presentation
Veeam Presentation
 

Similar to Veeam: Cybersecurity protection solutions through Backup and Availability

Veeam Availability for Hybrid Cloud (AWS)
Veeam Availability for Hybrid Cloud (AWS) Veeam Availability for Hybrid Cloud (AWS)
Veeam Availability for Hybrid Cloud (AWS) Tanawit Chansuchai
 
Zerto Virtual Replication 4.5
Zerto Virtual Replication 4.5Zerto Virtual Replication 4.5
Zerto Virtual Replication 4.5BusinesstoVirtual
 
Veeam Using cloud connect in 3 unexpected, awesome ways
Veeam Using cloud connect in 3 unexpected, awesome waysVeeam Using cloud connect in 3 unexpected, awesome ways
Veeam Using cloud connect in 3 unexpected, awesome waysTanawit Chansuchai
 
VMworld 2014: Data Protection for vSphere 101
VMworld 2014: Data Protection for vSphere 101VMworld 2014: Data Protection for vSphere 101
VMworld 2014: Data Protection for vSphere 101VMworld
 
Deliver Availability & Agility across any app, any data, any cloud with Veeam...
Deliver Availability & Agility across any app, any data, any cloud with Veeam...Deliver Availability & Agility across any app, any data, any cloud with Veeam...
Deliver Availability & Agility across any app, any data, any cloud with Veeam...NEXTtour
 
Re-Think Veeam Availability Platform
Re-Think Veeam Availability Platform Re-Think Veeam Availability Platform
Re-Think Veeam Availability Platform Tanawit Chansuchai
 
HPE + Veeam Technical Hands ON Workshop #1
HPE + Veeam Technical Hands ON Workshop #1HPE + Veeam Technical Hands ON Workshop #1
HPE + Veeam Technical Hands ON Workshop #1Tanawit Chansuchai
 
Presentation vmug v mware v-cloud director
Presentation   vmug v mware v-cloud directorPresentation   vmug v mware v-cloud director
Presentation vmug v mware v-cloud directorsolarisyourep
 
Veeam presentación evento prensa Argentina
Veeam presentación evento prensa ArgentinaVeeam presentación evento prensa Argentina
Veeam presentación evento prensa ArgentinaITSitio.com
 
HBC8292 vCloud Air Recovery as a Service (RaaS) Deep Dive
HBC8292 vCloud Air Recovery as a Service (RaaS) Deep DiveHBC8292 vCloud Air Recovery as a Service (RaaS) Deep Dive
HBC8292 vCloud Air Recovery as a Service (RaaS) Deep Divedavehill99
 
Ransomware: Mitigation Through Preparation
Ransomware: Mitigation Through PreparationRansomware: Mitigation Through Preparation
Ransomware: Mitigation Through PreparationHostway|HOSTING
 
Extending Availability to the Cloud
Extending Availability to the CloudExtending Availability to the Cloud
Extending Availability to the CloudYoong Seng Lai
 
AMER Webcast: Build Development and Testing Environments on VMware vCloud Air
AMER Webcast: Build Development and Testing Environments on VMware vCloud AirAMER Webcast: Build Development and Testing Environments on VMware vCloud Air
AMER Webcast: Build Development and Testing Environments on VMware vCloud AirVMware
 
NetBackup Story Customer Presentation.pptx
NetBackup Story Customer Presentation.pptxNetBackup Story Customer Presentation.pptx
NetBackup Story Customer Presentation.pptxdismantlinghue7028
 
Simplified backup for Azure and AWS
Simplified backup for Azure and AWSSimplified backup for Azure and AWS
Simplified backup for Azure and AWSChris Bullock
 
Presentation vmware building “your cloud”
Presentation   vmware building “your cloud”Presentation   vmware building “your cloud”
Presentation vmware building “your cloud”solarisyourep
 
Presentation v mware cloud infrastructure - success in virtualization
Presentation   v mware cloud infrastructure - success in virtualizationPresentation   v mware cloud infrastructure - success in virtualization
Presentation v mware cloud infrastructure - success in virtualizationsolarisyourep
 

Similar to Veeam: Cybersecurity protection solutions through Backup and Availability (20)

Veeam Availability for Hybrid Cloud (AWS)
Veeam Availability for Hybrid Cloud (AWS) Veeam Availability for Hybrid Cloud (AWS)
Veeam Availability for Hybrid Cloud (AWS)
 
IT Resilience Technical
IT Resilience TechnicalIT Resilience Technical
IT Resilience Technical
 
Zerto Virtual Replication 4.5
Zerto Virtual Replication 4.5Zerto Virtual Replication 4.5
Zerto Virtual Replication 4.5
 
Veeam Using cloud connect in 3 unexpected, awesome ways
Veeam Using cloud connect in 3 unexpected, awesome waysVeeam Using cloud connect in 3 unexpected, awesome ways
Veeam Using cloud connect in 3 unexpected, awesome ways
 
VMworld 2014: Data Protection for vSphere 101
VMworld 2014: Data Protection for vSphere 101VMworld 2014: Data Protection for vSphere 101
VMworld 2014: Data Protection for vSphere 101
 
Manage your enterprise with System Center
Manage your enterprise with System CenterManage your enterprise with System Center
Manage your enterprise with System Center
 
Deliver Availability & Agility across any app, any data, any cloud with Veeam...
Deliver Availability & Agility across any app, any data, any cloud with Veeam...Deliver Availability & Agility across any app, any data, any cloud with Veeam...
Deliver Availability & Agility across any app, any data, any cloud with Veeam...
 
Re-Think Veeam Availability Platform
Re-Think Veeam Availability Platform Re-Think Veeam Availability Platform
Re-Think Veeam Availability Platform
 
HPE + Veeam Technical Hands ON Workshop #1
HPE + Veeam Technical Hands ON Workshop #1HPE + Veeam Technical Hands ON Workshop #1
HPE + Veeam Technical Hands ON Workshop #1
 
Presentation vmug v mware v-cloud director
Presentation   vmug v mware v-cloud directorPresentation   vmug v mware v-cloud director
Presentation vmug v mware v-cloud director
 
Veeam presentación evento prensa Argentina
Veeam presentación evento prensa ArgentinaVeeam presentación evento prensa Argentina
Veeam presentación evento prensa Argentina
 
HBC8292 vCloud Air Recovery as a Service (RaaS) Deep Dive
HBC8292 vCloud Air Recovery as a Service (RaaS) Deep DiveHBC8292 vCloud Air Recovery as a Service (RaaS) Deep Dive
HBC8292 vCloud Air Recovery as a Service (RaaS) Deep Dive
 
Ransomware: Mitigation Through Preparation
Ransomware: Mitigation Through PreparationRansomware: Mitigation Through Preparation
Ransomware: Mitigation Through Preparation
 
Extending Availability to the Cloud
Extending Availability to the CloudExtending Availability to the Cloud
Extending Availability to the Cloud
 
AMER Webcast: Build Development and Testing Environments on VMware vCloud Air
AMER Webcast: Build Development and Testing Environments on VMware vCloud AirAMER Webcast: Build Development and Testing Environments on VMware vCloud Air
AMER Webcast: Build Development and Testing Environments on VMware vCloud Air
 
Commvault Story - CVTSP_1.pptx
Commvault Story - CVTSP_1.pptxCommvault Story - CVTSP_1.pptx
Commvault Story - CVTSP_1.pptx
 
NetBackup Story Customer Presentation.pptx
NetBackup Story Customer Presentation.pptxNetBackup Story Customer Presentation.pptx
NetBackup Story Customer Presentation.pptx
 
Simplified backup for Azure and AWS
Simplified backup for Azure and AWSSimplified backup for Azure and AWS
Simplified backup for Azure and AWS
 
Presentation vmware building “your cloud”
Presentation   vmware building “your cloud”Presentation   vmware building “your cloud”
Presentation vmware building “your cloud”
 
Presentation v mware cloud infrastructure - success in virtualization
Presentation   v mware cloud infrastructure - success in virtualizationPresentation   v mware cloud infrastructure - success in virtualization
Presentation v mware cloud infrastructure - success in virtualization
 

More from Next Dimension Inc.

Siskinds | Incident Response Plan
Siskinds | Incident Response PlanSiskinds | Incident Response Plan
Siskinds | Incident Response PlanNext Dimension Inc.
 
Next Dimension: How to create a Cybersecurity Strategy
Next Dimension: How to create a Cybersecurity StrategyNext Dimension: How to create a Cybersecurity Strategy
Next Dimension: How to create a Cybersecurity StrategyNext Dimension Inc.
 
Cybersecurity and the Law: Fasken Law Firm
Cybersecurity and the Law: Fasken Law FirmCybersecurity and the Law: Fasken Law Firm
Cybersecurity and the Law: Fasken Law FirmNext Dimension Inc.
 
Cybersecurity: Protection strategies from Cisco and Next Dimension
Cybersecurity: Protection strategies from Cisco and Next DimensionCybersecurity: Protection strategies from Cisco and Next Dimension
Cybersecurity: Protection strategies from Cisco and Next DimensionNext Dimension Inc.
 
Cybersecurity: What does Cyber Insurance Cover?
Cybersecurity: What does Cyber Insurance Cover?Cybersecurity: What does Cyber Insurance Cover?
Cybersecurity: What does Cyber Insurance Cover?Next Dimension Inc.
 
Next Dimension and Veeam | Solutions for PIPEDA Compliance
Next Dimension and Veeam | Solutions for PIPEDA ComplianceNext Dimension and Veeam | Solutions for PIPEDA Compliance
Next Dimension and Veeam | Solutions for PIPEDA ComplianceNext Dimension Inc.
 
Next Dimension and Cisco | Solutions for PIPEDA Compliance
Next Dimension and Cisco | Solutions for PIPEDA ComplianceNext Dimension and Cisco | Solutions for PIPEDA Compliance
Next Dimension and Cisco | Solutions for PIPEDA ComplianceNext Dimension Inc.
 
Next Dimension and Siskinds PIPEDA Legislation Updates as of November 1 2018
Next Dimension and Siskinds PIPEDA Legislation Updates as of November 1 2018Next Dimension and Siskinds PIPEDA Legislation Updates as of November 1 2018
Next Dimension and Siskinds PIPEDA Legislation Updates as of November 1 2018Next Dimension Inc.
 
Next Dimension IIoT Presentation
Next Dimension IIoT PresentationNext Dimension IIoT Presentation
Next Dimension IIoT PresentationNext Dimension Inc.
 
Next Dimension + Cisco Smart Manufacturing
Next Dimension + Cisco Smart ManufacturingNext Dimension + Cisco Smart Manufacturing
Next Dimension + Cisco Smart ManufacturingNext Dimension Inc.
 

More from Next Dimension Inc. (10)

Siskinds | Incident Response Plan
Siskinds | Incident Response PlanSiskinds | Incident Response Plan
Siskinds | Incident Response Plan
 
Next Dimension: How to create a Cybersecurity Strategy
Next Dimension: How to create a Cybersecurity StrategyNext Dimension: How to create a Cybersecurity Strategy
Next Dimension: How to create a Cybersecurity Strategy
 
Cybersecurity and the Law: Fasken Law Firm
Cybersecurity and the Law: Fasken Law FirmCybersecurity and the Law: Fasken Law Firm
Cybersecurity and the Law: Fasken Law Firm
 
Cybersecurity: Protection strategies from Cisco and Next Dimension
Cybersecurity: Protection strategies from Cisco and Next DimensionCybersecurity: Protection strategies from Cisco and Next Dimension
Cybersecurity: Protection strategies from Cisco and Next Dimension
 
Cybersecurity: What does Cyber Insurance Cover?
Cybersecurity: What does Cyber Insurance Cover?Cybersecurity: What does Cyber Insurance Cover?
Cybersecurity: What does Cyber Insurance Cover?
 
Next Dimension and Veeam | Solutions for PIPEDA Compliance
Next Dimension and Veeam | Solutions for PIPEDA ComplianceNext Dimension and Veeam | Solutions for PIPEDA Compliance
Next Dimension and Veeam | Solutions for PIPEDA Compliance
 
Next Dimension and Cisco | Solutions for PIPEDA Compliance
Next Dimension and Cisco | Solutions for PIPEDA ComplianceNext Dimension and Cisco | Solutions for PIPEDA Compliance
Next Dimension and Cisco | Solutions for PIPEDA Compliance
 
Next Dimension and Siskinds PIPEDA Legislation Updates as of November 1 2018
Next Dimension and Siskinds PIPEDA Legislation Updates as of November 1 2018Next Dimension and Siskinds PIPEDA Legislation Updates as of November 1 2018
Next Dimension and Siskinds PIPEDA Legislation Updates as of November 1 2018
 
Next Dimension IIoT Presentation
Next Dimension IIoT PresentationNext Dimension IIoT Presentation
Next Dimension IIoT Presentation
 
Next Dimension + Cisco Smart Manufacturing
Next Dimension + Cisco Smart ManufacturingNext Dimension + Cisco Smart Manufacturing
Next Dimension + Cisco Smart Manufacturing
 

Recently uploaded

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetEnjoy Anytime
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 

Recently uploaded (20)

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 

Veeam: Cybersecurity protection solutions through Backup and Availability

Editor's Notes

  1. HOW ARE WE GOING TO IMPLEMENT THE VISION