Advertise on DCNN Advertise on DCNN Advertise on DCNN

Cyber Security


The data centre operators investing in DDoS mitigation
By Adrian Taylor, VP EMEA at A10 Networks For commercial data centre operators, business is good. Inventory and workloads are growing, while the percentage of vacant capacity is shrinking - indicators of success that have led to a projected industry revenue of nearly £50 billion by 2025. Although the future of the industry is looking bright, there are some threats on the horizon. The cost of downtime continues to grow. The Uptime Institute found one in four data centre incidents of downtime exceed $1 million. As DDoS attack methods become more sophisticated, effective and frequent, data centre operators need to bank on mitigation. A recent survey by A10 Networks and Gatepoint Research found that senior decision makers at commercial data centres are under siege from cyber criminals. Data centre and colocation providers are concerned not only about the cost of intensifying DDoS attacks, but also about lost business and reputational damage. Dissatisfied with their current data centre security and DDoS defence capabilities, many are seeking better ways to address the threat - and an increasing number want to extend that protection-as-a-service to their tenants as well. The simple yet devastating DDoS threats As disclosed in the latest A10 Networks DDoS Threat Report, DDoS threats are soaring. The number of tracked DDoS weapons in the environment has nearly tripled in the past two years, and the 3.45 Tbps DDoS attack on Microsoft Azure in late 2021 showed the unprecedented scale hackers are now capable of achieving. Of course, size isn’t everything - even attacks under 500Mbps that slip through data centre security gaps can have a significant impact on service. In fact, these smaller exploits are proliferating fast, as botnets-for-hire make it easy for even unskilled hackers to wreak havoc. A single compromised server can open the door to a flood of malicious traffic in under half a minute. Commercial data centre operators are all too aware of the situation, reporting to A10 Networks that DDoS threats in their networks are growing more sophisticated (64%), more frequent (48%), and larger (38%). Even a single DDoS attack can have a serious impact, impairing or denying mission-critical services for an individual data centre tenant or across the entire facility - and nearly one in 10 survey respondents are suffering such incidents weekly, or more. Lost business and customer attrition from a DDoS attack is a concern for nearly two-thirds of providers, and rightly so. Staying ahead of evolving tactics While data centre security and DDoS defence capabilities such as fast detection and response can limit the damage from a DDoS attack, time is of the essence. Data centre and colocation providers need to be able to distinguish a sudden flood of fraudulent requests from legitimate usage in real time, at massive scale, to filter out malicious traffic without disrupting their customers’ normal business operations. DDoS mitigation solutions typically offer features and capabilities such as benchmarking, anomaly detection, IP reputation lists, connection and rate limits, and attack mitigation, but these essential DDoS defence tasks need to be performed thoroughly and frequently. The A10 Networks-Gatepoint survey reported that data centre operators missed attacks, saw slowed performance, decreased service availability, and in an alarming number of cases, an inability to adequately detect DDoS threats at all. Nearly two in five are planning to re-evaluate their DDoS defence solution in the near future. Tenant shielding services Value-added services are a core element of the commercial data centre business, with a large majority of survey respondents going beyond space, power, and cooling to offer managed network services, professional IT consulting services, and remote management and troubleshooting. Given the tenant mix of the typical commercial data centre, often dominated by financial services, retail, and government customers, data centre security services are also a very popular offering. DDoS mitigation is particularly well suited to this model. From the tenant’s perspective, a DDoS mitigation service makes it possible for even small businesses to tap into high-end features such as machine learning, automation, and rapid mitigation. For the data centre provider, protection for individual tenants can reduce the risk of an out-of-control attack causing ancillary damage to neighbouring tenants or the data centre itself. When offered free of charge, DDoS mitigation can be a powerful competitive differentiator and customer enticement. Offered on a paid basis, potentially in multi-tiered models, DDoS mitigation services can open a rich new revenue stream. However, many in the industry have been slow to respond to either the advantages or the necessity of tenant DDoS mitigation, with only 58% offering such services either free or for an added fee. As DDoS threats increase, investing in effective mitigation services is a vital step for data centre operators, in order to protect tenants, themselves, and to fulfil the bright projections for the industry.

virtualDCS signs agreement with Seagate
virtualDCS is continuing to improve the speed at which its partners can restore, move, and consolidate data after forming a unique partnership with Seagate. The new Seagate Lyve offering, known as CloudCover Shuttle at virtual DCS, offers a fast and secure method of physical data transfer to avoid long transfer times that are dependent on internet bandwidth. The shuttle enables businesses to move their data quickly, securely, and simply from endpoints to the edge and to the landing destination of the data - be it private, public, or hybrid clouds.   Organisations that are seeding backup data, recovering data after a disaster, or carrying out hardware upgrades and cloud migrations, can now access a physical data ‘shuttle’ service, without the need for capital expenditure and hardware purchases. The shuttle offers a range of storage capacities and is delivered promptly, as well as being securely encrypted and tracked while it is being transported. Once the shuttle is returned, it will then undergo a full crypto-erase. The new offering is an extension of the virtualDCS CloudCover suite of services, which enables virtualDCS partners and their customers to backup and replicate business-critical data on their terms. Kurt Kiefer, Chief Revenue Officer at virtualDCS, says, “Our CloudCover suite is extremely popular, offering a comprehensive range of data protection services from full backups to near real-time failover of systems, as well as protecting against ransomware and other cyber threats. “Although data protected by the CloudCover suite can be recovered almost immediately, the ability for an organisation to fully restore and move data back to its own systems after a DR event often brings additional challenges. A stage that’s frequently underestimated by many is the reabsorption of the data back to its original location, or even to a cloud platform. ”Even though a few terabytes can be restored relatively quickly, for larger datasets it can take days, weeks, or even months and will completely saturate networks and internet bandwidth. CloudCover Shuttle addresses this challenge of repatriating data back to its origin in a timely, controlled, and secure manner. “Joining forces with Seagate Lyve solutions, CloudCover Shuttle offers organisations a level of security and encryption that exceeds anything else in the market including user-based permissions, tracking and crypto-erase. “This is particularly compelling for organisations operating in industries that have high levels of compliance and that can’t risk their data falling into the wrong hands, as well as anyone who understands the value and concept of time to data. “Crucially, we’ve also created a simple pricing model, where customers pay for the time they need the shuttle, rather than having to buy their own physical device, which would require a substantial investment and take up more valuable time.” Steve Jones, Lyve Business Development Manager at Seagate, says, “virtualDCS is always exploring how it can maximise data innovation. It has identified that many organisations faced a problem around data logistics and time to data after recovering from a disaster, which until now has been a big industry challenge. “Our new collaboration addresses this problem by providing one of the fastest, most reliable and secure data storage and transfer services giving a clear competitive advantage not only to virtualDCS, but also to its partners and customers.”   

New security platform to fight AI-based cyber attacks
OryxAlign has launched securyXDR, a fully managed extended detection and response (XDR) platform. An advanced form of antivirus and malware management, the system is part of a solution that will address the expected rise in sophisticated AI-phishing attacks. It will be valuable for SMEs, or those with a hybrid and remote workforce, across sectors including financial services, recruitment, legal and more. Traditionally, antivirus systems have operated in silos, being limited to detecting and responding to threats on individual devices, or endpoints. The solution was previously Endpoint Detection and Response (EDR). With the rise in hybrid and remote working, and the reliance on networked storage and cloud-based workflows, there is now a need for visibility of threats across a company’s entire IT ecosystem. “In 2023, we expect to see a sharp rise in sophisticated AI-based phishing attacks, as well as endpoint attacks on remote and hybrid workers. The criminals’ focus may change to SMEs as they are believed to have weaker security,” explains Nathan Charles, Head of Customer Experience. “But because we combine our XDR platform with EDR and email management we can fight fire with fire. “securyXDR is our new cyber security XDR platform that is offered as a fully managed service, in partnership with an outsourced security operation centre (SOC) that has 200 staff globally,” continues Nathan. “Given that even small networks can generate tens of thousands of cyber security alerts a day, the securyXDR managed service will alleviate the pressure on internal IT teams, taking them away from manually triaging and responding to individual threats, and focusing on more productive projects. “We know that the loss of productivity following a cyber attack can be just as devastating as the initial damage to your IT system. The cost of having an XDR system in place will more than pay for itself in the long run, by providing early detection of threats. What’s more, SOCs are uniquely positioned to respond to threats, by applying their broad learning from a high volume of attacks across their managed networks.” OryxAlign says that securyXDR stands out from other enterprise XDR platforms by offering customisable service plans based on customer needs. For example, users can select how long log files are stored to minimise storage costs, choose custom restore points for compromised endpoints, and set their choice of response urgency, typically from one to three hours.

Jane Frankland takes up advisory role at e2e-assure
e2e-assure has announced that Jane Frankland has joined the business as an advisor. Bringing over two decades of experience, her appointment reinforces e2e’s commitment to nurturing a diverse and unique set of skills and knowledge to help guide the company. Commenting on her new role, Jane says, “I'm thrilled to join e2e-assure and be part of a team that is dedicated to establishing trust, transparency and reliability in the increasingly complex world of cyber security. As experts in threat detection and response, an agile, innovative, and value-driven boutique player, serving clients of all sizes from the UK and Australia, e2e-assure serves an invaluable role in today's uncertain and expanding digital world. As an advisor, I'm looking forward to helping them scale, further innovate, and create a securer future for all.” Jane has built a stellar reputation as an award-winning leader, bestselling author, and women’s change agent. Referenced by Wiki, LinkedIn (as a Top Voice) and UNESCO, she works as a board advisor, speaker, consultant, coach and trainer. She is well-known for all the work she does to attract and retain women in cyber security through her writing, keynotes, consulting and her brand-new women's career platform, The Source. Rob Demain, CEO and Founder of e2e-assure comments, “We’re absolutely delighted and privileged to have Jane join the business. We recognised that, if we wanted to continue in our commitment to helping our customers succeed, we needed to ensure that we had someone with deep experience, a strong track record and gravitas. Visionary and highly respected within the market, Jane was a natural choice. We’re excited for her to be part of our journey, helping us to reinforce our mission - that is to give our customers greater access to faster, simpler and more cost-effective threat detection and response solutions.”

New group formed to overcome attacks against data centres
Operators will be given the tools to enhance the security measures within their data centres as a result of the new Data Centre Work Group, formed by the Trusted Computing Group (TCG). Data centres play a crucial role for business operations across the globe, but they remain prime targets for cyber criminals. Should an interposer position themselves between the Central Processing Unit (CPU) and a hardware Root of Trust - such as the Trusted Platform Module (TPM) - within a data centre, they can cause significant damage by gaining possession of legitimate control signalling between the CPU and the TPM. Interposers can even inject their own boot code into the CPU and wield an authorisation key to fool a remote verifier to make the TPM attest the integrity of fraudulent information. This allows them to snoop, suppress and modify vital signals and measurements, and, as a result, will be able to access and exploit secrets and information from within the data centre, weaponising it against the operator. To this end, the Data Centre Work Group at TCG has been formed to establish trust within systems and components within a data centre, focusing primarily on developing protective measures against any active interposers within a system. The Work Group will examine the existing attack enumerations against data centres, and devise ways to avoid or mitigate them. These attacks include the feeding of compromised boot code to the CPU, impersonations of the CPU to the TPM, the suppression and injection of false measurements to a legitimate TPM, and the redirection of legitimate measurements to an attacker controlled TPM. “With the formation of this Work Group, a TPM will be empowered to protect the resources and communication of a CPU to which it is bound with precise, given measurements”, says co-Chair of the Data Centre Work Group, Dennis Mattoon. “The TPM will also be able to prove the measurements and the correct CPU instance of a given object to a verifier. We look forward to developing our plans to continue establishing trusted computing within data centres”. Dennis and Jeff Andersen have been confirmed as the co-Chairs of the Work Group. Dennis is a Principal Software Development Engineer for Microsoft Research, and co-Chairs the attestation, supply chain security, DICE, and marketing work groups at TCG. Jeff is a Staff Software Engineer at Google and became a member of the TCG in 2021. “We’re delighted to publicly announce the formation of the new Work Group”, says Jeff. “Current data centre hardware designs make it difficult for CPUs to be permanently bonded with the TPM, creating a gap for malicious entities to exploit. Our goal is to overcome the interposers operating within this area and mitigate the significant threats they can bring to data centres.” The Work Group will also look at protecting the data centre against hackers looking to clear platform configuration registers (PCRs) in the legitimate TPM by falsely asserting that the CPU has reset. As a result, operators will be able to trust that the components and hardware found within the system are operating successfully without the fear it may become weaponised by an attacker.

Neterra stopped nearly 500,000 DDoS attacks in 2022
Neterra protected its customers from 488,151 DDoS attacks in 2022. To do this, the company implemented various effective solutions that include a cloud platform, specialised hardware equipment, and a combination of the two. Of the total number of attacks, its cloud platform stopped 135,590 and its hardware stopped 352,561. DDoS attacks aim to disrupt (wholly or partially) user access to the services or equipment of a specific company - targeted as a victim. Often, for example, the victim's website becomes unavailable, loads slowly and returns errors. While the company is under attack and struggling to restore normal operations, the perpetrators take advantage of the breach to gain access to its resources. Most DDoS attacks aim to steal data, money, or intellectual property. Customers of Neterra's DDoS protection service can monitor statistics of attacks against them in real time through the unified monitoring system, as well as make periodic inquiries, for example - the number of attacks daily, monthly, and annually. They can also see what each of the attacks looked like. In addition to protection from DDoS attacks, Neterra offers complete solutions for enterprises for both cyber security, such as backup and ransomware protection, and for connectivity - dedicated internet access (DIA), data centre and managed services, IT service and resource rental.

Macquarie Telecom delivers 17 consecutive halves of growth
Macquarie Telecom Group has announced its results for the half-year, which ended 31 December 2022. Chairman, Peter James, says, “This result represents our 17 consecutive half of EBITDA growth, an outstanding achievement demonstrating the continuing momentum in our business and the capability of our people.” Key Points • 17 consecutive halves of profitable growth. • Revenue of $172.5 million, an increase of 16% on 1H FY22 ($149.3 million). • Earnings before interest, tax, depreciation, and amortisation (EBITDA) of $51.3 million, an increase of 26% on 1H FY22 ($40.5 million). • Net profit after tax of $8.5 million, an increase of 133% on 1H FY22 ($3.7 million) reflecting the increased profitability across all segments. • Capital expenditure for 1H FY23 was $33.2 million (1H FY22: $68.9 million) driven by Growth Capex of $15.0 million, Customer Related Capex of $11.6 million and Maintenance Capex of $6.6 million. Chief Executive David Tudehope, says, “We are very pleased to deliver another strong result for our shareholders. We continue to grow by staying ahead of emerging trends in the technology sector and investing in the right solutions for our customers. We pair the best technology with the best customer service and operate in markets that continue to have significant growth potential, such as digital infrastructure and cyber security.” Outlook • FY23 EBITDA is expected to be approximately $102 to $104 million which includes Macquarie Data Centres expected EBITDA of $32 to $33 million. Continuing investment in Cloud Services & Government and Macquarie Data Centres underpins this profitable growth. • ATO contract extension demonstrates the continued demand from our Federal Government Agencies for cyber security services, providing high confidence for future growth in the Government business. • Site preparation works are underway to prepare the Macquarie Park Data Centre Campus in anticipation of obtaining the DA for IC3 Super West. • Telecom operational efficiencies will continue. • Net debt to be reduced in FY23. • FY23 Total Capex is expected to be between $72 - $76million. • FY23 Depreciation is expected to be between $63 and $67 million.

Panzura announces Customer Security Advisory Council
Panzura has announced the formation of its Customer Security Advisory Council, chaired by Chris Hetner, a respected leader in cyber security. The Council will provide education and awareness around data resiliency with a mission of advancing business, operational, and financial alignment to cyber security risk governance. “It is a privilege to chair Panzura's Customer Security Advisory Council and share my experience and knowledge on this critical issue,” says Chris Hetner. “The current cyber security ecosystem is largely focused on addressing technical level threats used to inform measures to mitigate risk. While the cyber security ecosystem continues to evolve, it still lacks the ability to contextualise cyber threats and incidents to business, operational, and financial exposures. Education and awareness on this issue is imperative for businesses of all sizes to mitigate the risk involved from a material cyber security incident, and ultimately, stay in business.” With over 20 years of experience as a cyber security expert, Chris Hetner is recognised for raising cyber risk to the Corporate Council level to protect industries, infrastructures, and economies. He served as the Senior Cyber Security Advisor to the Chair of the United States Securities and Exchange Commission and as Head of Cyber Security for the Office of Compliance Inspections and Examination at the SEC. “Chris brings the ability to contextualise cyber risk to a business in terms of financial cost. He is also at the forefront of ever-evolving cyber security risk governance requirements and will provide ongoing education to Panzura customers to ensure their cyber security and operational resiliency,” says Katie McCullough, Panzura Chief Information Security Officer. “We are honoured our customers will benefit directly from his invaluable experience and knowledge.”

DCIG names the InfiniBox family one of the top five storage arrays
Infinidat has announced that DCIG has named its InfiniBox SSA II / InfiniBox one of the world’s top five high-end storage arrays. This ranking is based on independent research that DCIG conducted in the large enterprise market and among cloud service providers. 'The all-flash InfiniBox SSA II and hybrid InfiniBox arrays showcase Infinidat’s thorough understanding of enterprise high-end storage requirements,' according to the DCIG report. Among the product features that DCIG called out as exceptional in the InfiniBox platform is cyber resilience with InfiniSafe technology, which features near-instantaneous recovery, immutable snapshots, a fenced forensic network environment and remote logical air gapping for primary storage. “Being named one of the top five high-end storage arrays clearly shows Infinidat’s attention to the business and technical values essential to large enterprise storage deployments,” says Eric Herzog, CMO at Infinidat. “This is the second consecutive year that DCIG has selected Infinidat in a top five list, which affirms the confidence that enterprise customers have in the Infinidat portfolio of cyber resilient storage solutions. We’re building on the momentum we gained in 2022 when DCIG named Infinidat as one of the top SaaS vendors. When large organisations need enterprise storage, Infinidat has the attention of their key decision-makers.” “Large enterprises look to high-end storage arrays to provide a combination of high performance, high availability, cyber storage resilience, and comprehensive enterprise data services for all their business-critical data,” says Ken Clipperton, DCIG Lead Analyst for Storage. “The all-flash InfiniBox SSA II and hybrid InfiniBox arrays showcase Infinidat’s thorough understanding of these requirements, including guaranteed recoveries in less than one minute.” The InfiniBox SSA II is the industry’s fastest all-flash storage array with an unprecedented 35 microseconds of latency. InfiniBox says that it provides unmatched high availability, comprehensive cyber storage resilience, ease of use, autonomous automation, and high reliability, plus comprehensive AIOps integration. Enterprise customers obtain optimal application and workload performance, simplify substantial storage consolidation, and reduce CAPEX and OPEX. The InfiniBox and InfiniBox SSA II platforms for enterprise primary storage deployments are not only the most cyber resilient and most reliable storage solutions in the industry, but also the highest performing, according to Infinidat. Every InfiniBox and InfiniBox SSA II comes with a strong set of guaranteed SLAs: 100% availability guaranteed, performance guaranteed, and cyber resilience guaranteed. The solution delivers maximum performance with minimum administrative overhead. The DCIG report also highlighted a number of appealing attributes of the InfiniBox platform, including: • AI inside and outside the storage system with InfiniOps, which includes Neural Cache and the company’s data distribution and placement engine utilising machine learning to optimise data placement without tuning. • InfiniVerse, which leverages InfiniMetrics telemetry for cloud-based monitoring, AI-based predictive analytics, and AIOps support software, enabling Infinidat support engineers to take preventative actions before the customer is impacted. • InfiniBox Online Data Mobility, which enables non-disruptive workload movement between InfiniBox systems, ideal for organisations requiring more high-end storage than a single array provides. • Flexible consumption and deployment models, leveraging storage-as-a-service (STaaS). • Infinidat’s fully configured, rack-based approach, which facilitates rapid deployment at a customer location and instant capacity expansion.

Veeam releases new Veeam Data Platform
Veeam Software has introduced the new Veeam Data Platform, a platform delivering advanced data security, recovery and hybrid cloud capabilities. The Veeam Data Platform, which includes Veeam Backup and Replication (VBR) v12, provides secure backup and fast reliable recovery that keeps business running. It brings together the latest features offered from Veeam into a single solution that is offered in three enterprise-grade editions for protecting cloud, virtual, physical, SaaS and Kubernetes applications across complex and expanding IT environments, and the increasing set of challenges facing every organisation from outages to errors and ransomware. Veeam Data Platform delivers the three key requirements to keep a business running: data security, data recovery and data freedom to back up and use data from anywhere without platform or cloud lock-in. There are three enterprise-grade editions: Foundation, Advanced and Premium. All editions contain Veeam’s VBR and Instant Recovery; Advanced and Premium editions also deliver advanced resiliency features including monitoring, analytics and recovery. • Foundation Edition offers complete data protection with VBR v12, which adds more than 500 new features and enhancements. • Advanced Edition combines VBR with Veeam ONE to give customers intelligent monitoring and observability to identify and resolve any backup or recovery problems before they begin. • Premium Edition offers enterprise Modern Data Protection and recovery capabilities as the premier offering - with VBR, ONE and Veeam Recovery Orchestrator (VRO). Building on the other editions, Premium adds the full automation of complex data recovery process with near-zero Recovery Point Objectives (RPOs) while automating testing and providing complete data resiliency with the confidence of one click recovery. Premium edition customers are also eligible for the new Veeam Ransomware Warranty which covers the cost of data recovery, up to $5 million, in the event of a ransomware or cyber attack. “Organisations are more vulnerable than ever. Over the past 12 months, 85% of organisations were attacked at least once - up from 76%,” says Danny Allan, CTO and Senior Vice President of Product Strategy at Veeam. “We understand IT leaders feel they aren’t sufficiently protected and as IT environments continue to grow more complex and demanding, it’s now obvious that Modern Data Protection must be integrated into the overall ‘cyber preparedness’ plan. The Veeam Data Platform brings the best of Veeam solutions together to deliver a single platform with relentless security, reliable data recovery and trusted data freedom, and is designed to give our customers the choice to leverage the right solution that fits their needs and keeps their business running.”  All editions of Veeam Data Platform leverage the latest backup and recovery technology of VBR v12 as its foundation. New functionality that advances enterprise-grade recovery capabilities ensures confidence in the face of disaster or cyber attacks across the hybrid cloud, including: • New Direct-to-object storage backups: take full advantage of the unlimited scalability of on-premises and cloud object storage without sacrificing performance. Send backups directly to Veeam’s ecosystem of object storage partners on-premises with the performance needed to meet goals or backup your edge locations directly to cloud object storage. • Immutability for every workload: ensure backups can always be restored after a cyber attack with comprehensive, enterprise-grade immutability options, including on-premises object, block and file storage, hardened repositories and deduplicating storage appliances, cloud object storage and tape. • Cyber resilient: enable the fastest response to ransomware attacks by identifying, alerting and restoring only clean data, including automation and proven recovery orchestration for all workloads. Empower a zero-trust journey with multi-factor authentication (MFA), password-less service accounts (gMSA) for Windows and single-use credentials for Linux, and fortify defence against cyber attacks with Kerberos-only and IPv6-only environment support. • Hybrid-cloud optimised: achieve even greater efficiency and security across the hybrid cloud with immutable backups for cloud-native AWS and Microsoft Azure workloads, new cloud-integrated agents for lift-and-shift workloads, and unified cloud monitoring and reporting. • Ecosystem Excellence: Veeam Universal Storage API 2.0 and new Smart Object Storage API provide even more future-proofing for enterprise scalability and offsite resiliency. Ecosystem vendors include Pure Storage, Scality and Object First as the inaugural launch partners that integrate with these new APIs. Veeam’s monitoring and analytics solution delivers intelligent insights and visibility within the NEW Veeam Data Platform Advanced and Premium Editions to help identify and resolve issues before problems arise, ensuring the highest protection of critical data. The latest version expands on new capabilities and includes support for more Veeam backup solutions (including Veeam Backup for Microsoft 365). Additionally, new monitoring and visibility capabilities include immutability reporting and data protection statuses for multi-cloud. These new advances deliver more value and insight into businesses’ data protection strategy than ever before. The new Veeam Data Platform Premium Edition also includes recovery orchestration, one of the most powerful tools to cut down time to recovery - delivering confidence in business resiliency. By automating planning, testing and orchestrating the steps needed to recover from a disaster, businesses can simplify operations and prove backup compliance. The Veeam Data Platform now delivers automated, orchestrated recovery to Microsoft Azure, instant restore of Veeam Agents backups as virtual machines (VMs), and an automated recovery rollback for clean, ransomware-free data recoveries. Platform extensions may be added to any of the Veeam Data Platform editions, or operated standalone, including backup for Kubernetes with Kasten K10 by Veeam, Veeam Backup for Microsoft 365, and Veeam Backup for Salesforce.



Translate »