Sempre in testa i giovani DRAGHETTI dopo l’importante vittoria contra VILLA FABBRICCHE. Sono marcati stretti dai Monzesi di BRANCALEONE, dietro di un soffio. Molto bene anche BERGAMASCA e con qualche punto di distanza, SOFA.
Sopra gli incontri del terzo turno da giocare entro lunedì 14 dicembre. Dopo questo turno ci saranno le prime eliminazioni di squadre con più di 41 punti a carico.
Ecco i risultati del primo turno. Partono subito in quarta i favoriti VILLA FABBRICCHE e i giovani DRAGHETTI.
Altre grosse vittorie da OCCI, BRANCALEONE, MELANGE e BERGAMASCA. Pesante sconfitta un po’ a sorpresa dei detentori del titolo ANNIBALE, ma hanno incontrato una squadra tosta con ottimi giocatori.
Comunque il torneo è appena iniziato ed è naturalmente presto per fare qualsiasi previsione di chi arriverà tra le prime otto, oltre alla grande favorita VILLA FABBRICCHE.
Prendete nota degli abbinamenti per il secondo turno da giocare entro giovedì10 dicembre.
In this last article about Security and Ransomware, I’m going to add new features and deep dive those you’ve already read in my first article about Veeam Backup & Replication.
The starting point is creating copies of your data (remember the 3-2-1 rule) and from these copies perform automatic tests of availability and security.
Which technology should be deployed to sleep safer?
In this article, I’m going to show you some Veeam technologies that address the threats explaining why they are a must to be used.
Sure-Backup
It is the best way to be certain that a backup is really usable.
What does it mean exactly?
In my public speeches, I often use a pen to explain the Sure-Backup concept correctly.
How can I be sure that the pen is usable? The answer is very easy. If it writes on paper it works and it is usable.
Going back to our scenario, the only way to know if your backup is usable is to perform a restore in an environment logically separate from the production.
How Sure-Backup works?
It is composed of two parts: The application group identifies the backup VMs that have to be verified. DataLab is the way through which VMs are switched-on into a specific network that can’t communicate with the production network.
This great technology allows you to add the number zero meaning no errors (from 3-2-1 to 3-2-1-0) to the above rule.
One more important thing to add here is that you can create scripts to random test your backup.
In the following article by Luca Dell’Oca, you can have an excellent example of how scripts can help you.
It scans the saved VM Windows (VM that has at least one valid restore point), with your antivirus software before restoring the VM to the production environment.
Secure Restore is available for the following restore tasks:
Instant VM Recovery
Entire VM Restore
Virtual Disks Restore
The only requirement is that your antivirus has to be installed on the mount server and supports CLI.
Data Integration API
Veeam Data Integration API is a set of Veeam PowerShell cmdlets that allow you to represent data of backup files as a mounted Windows folder.
This feature allows you to access backed-up data in read-only mode.
It has a lot of possible usages to example data mining and data warehouse.
In the field of security, it can be adopted to check if a virus is already present in your VM checking via backup files the guest OS files through your antivirus software (It scans the files of the VMs and not the backup file). A good example of use is in the following blog article by Niels Engelen
The primary storage integration allows customers to perform backup more frequently because this technology allows creating backup without impacting the VMware environment.
The integration allows creating a test environment because it is integrated with Datalab and Sure technologies.
The secondary storage integration is commonly used with deduplication appliances that can allow you another layer of security for ransomware.
When the Veeam Data Mover Service is installed directly on the appliance, it reduces the risk of ransomware encrypting and deleting data.
In addition, if for some reason the first data is compromised, copies can be replicated to a second data center or in the cloud.
Before leaving you my two last cents:
1) The starting point is always to perform copies of your data. Veeam gives you powerful tools to manage them and to perform more check to verify that your data are safe from threats.
2) Some customers still think that the backup asset is just a cost because they are used just to restore. With Veeam you can use backup data to perform different actions relieving the production of not business core tasks (for example think the great use of Data API Integration for data mining, data warehouse etc)