Download as pdf or txt
Download as pdf or txt
You are on page 1of 2

Competitive

Battle Card

Veeam vs. the competition for ransomware mitigation


Veeam benefits Probing questions and sales tactics
Comprehensive “Can you ensure backups are immutable and indelible on any hardware without proprietary lock-in?”
• Full visibility, categorization, alarms & reporting Pitch Veeam’s software-defined hardened repository for immutability with no lock-in and S3 Object Lock for copies & archives.
to identify a potential infection in near real-time
“When a ransomware attack does happen, would you prefer to be notified immediately or hours later after a backup is scanned?”
• Software-defined double-play immutability
Talk about Veeam ONE’s proactive ransomware activity alerts that can identify a potential infection as it is occurring.
• Automated verification and malware scanning
“What is your current workflow to verify backups before restoring them to production? How manual is that process?”
Flexible Discuss Secure Restore and describe how Veeam can ensure customer data is clean from malware before restoring to production.
• No reliance on specific hardware. No lock-in
• Secure restore of potentially infected data to “How certain are you that your VM infrastructure can be recovered after a disaster? How up to date is your DR documentation?”
ensure restores are clean from malware Show how Veeam Disaster Recovery Orchestrator can orchestrate recovery at scale, test recovery and automate DR documents.
• Fully portable backup data for added protection “Have you conducted a thorough ROI analysis on the costs associated with protecting your data?”
Talk about Veeam’s efficient and portable VUL licensing with no platform lock-in. Reuse HW to save costs and avoid high CapEx.
Affordable
• All major ransomware mitigation capabilities in
core product. No premium license required
• Reduced TCO through hardware reuse
Competitors’ strengths Competitors’ weaknesses
• Minimal implementation and management costs
• Appliance-based solutions may not require additional • Solutions that require specific hardware or proprietary
Efficient configuration after deployment for immutable backups filesystems for immutability often result in higher TCO
• Orchestrate recovery with integrated DR plans The trade-off for a quicker deployment is lock-in that Veeam’s software-defined solution is not dependent on any
• Instantly recover nearly all data types requires specific hardware and proprietary file systems HW for immutability and allows for HW reuse to lower TCO
• Recover quickly after an attack with Veeam’s • Competitors are often reliant on proprietary AI/ML models
• Some competitors offer ransomware mitigation capabilities
dedicated ransomware support staff for more workloads than Veeam (VM, NAS, M365, etc.) to identify ransomware with no guarantee of detection
Simple Backup to object storage in v12 will bring immutability to Veeam works with the industry’s leading security vendors
• Ransomware features integrated into platform more workloads than any competitor currently supports to utilize definitions and definitively identify ransomware
• Failover with 1-click DR plan execution • Some competitors provide general security features to • Competitors often focus on one area of ransomware
• Democratize ransomware protection with easy- reduce ransomware risk such as MFA & custom RBAC roles mitigation such as immutability or air-gapped backups
to-use products on any commodity hardware
Many enhancements, including MFA will be included in v12 Veeam offers a comprehensive solution to identify, protect,
detect, respond and recover to ransomware attacks

© 2021 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners. 1-Feb-22
Competitive
Battle Card

Capability comparison

Feature Veeam Cohesity Commvault Dell EMC Rubrik Veritas NBU Details

Software defined, storage agnostic Immutable repository that protects backup data from
immutability for primary backups ransomware. Deploy on any HW with no proprietary lock-in.

Immutability for backup copies Extend immutability to backup copies and archives via native
and archival data via object storage object storage capabilities. Support for either S3 or Azure.

Use WORM tapes, rotated hard drives or isolated networks to


True air-gapped backup ensure backups and backup copies are secure.

Protect against insider threats and actions by ensuring


Time-based retention lock backups cannot be modified until specified time has passed.

Ensure systems are accessed only by those who have proper


MFA for console access permissions to access them through OTP/TOTP/etc.

Built-in ransomware scan Automate scans of backup data using ML or antimalware


after backup software and definitions from trusted security vendors.

Built-in ransomware scan Guarantee the data being recovered is clean by scanning it
before recovery before restoring with trusted antimalware software.

Near real-time alerting to Utilize built-in monitoring tools to detect and alert to potential
potential ransomware activity ransomware infections in both production and backup data.

Automate failover and verify workloads and applications are


DR orchestration for recovery available. Automatically document workflows & processes.

Limited capability or 3rd


Complete capability Non-practical capability No capability
party product required

© 2021 Veeam Software. Confidential information. All rights reserved. All trademarks are the property of their respective owners. 1-Feb-22

You might also like