Stay One Step Ahead: Meet new Veeam Recon Scanner

Stay One Step Ahead: Meet new Veeam Recon Scanner

In a world with rapidly evolving cyberthreats, staying ahead is essential. ?? Enter Recon Scanner, our new proactive threat analysis ?? tool, now available for Veeam Data Platform.

We sat down with Javier Perez , Senior Director, Product Marketing, at Veeam, to go under the hood of Recon Scanner, explore cybersecurity challenges, and more. So, grab a coffee and start reading! ??


For those who aren’t familiar, what is Recon Scanner and how does it work?

It’s a lightweight software agent for rapid collection of forensic data. It collects data in just a few minutes and then automatically uploads data to Coveware by Veeam’s cloud for analysis.

Results and findings are available via a portal and include baseline activity, suspicious event timeline, identification of adversary tactics, techniques and procedures (TTPs), detection/mitigation guidance and more.

Why did the Coveware by Veeam team develop Recon Scanner?

Coveware by Veeam assists customers during ransomware attacks, so as part of the initial assessment, there was the need to research rapidly, identify indicators of compromise, and gather as much information as possible to help organizations evaluate options in the middle of a ransomware attack.

Recon Scanner helps with that and has improved over the years, it also compares collected data against previous cases, now a database of thousands of incidents.

What’s one word you would use to describe Recon Scanner and why?

For the Veeam Data Platform use case, the word is “proactive.” A unique tool to proactively assess potential cyberthreats.

How does Recon Scanner proactively prevent cyberattack?

For a variety of reasons and despite the best security defenses, threat actors can compromise systems such as backup servers. The ability to identify threats during dwell time before an attack has allowed Recon Scanner to help customers prevent the execution of hacker tools that encrypt or exfiltrate data. It also recognizes suspicious activities such constant logging or deletion of data.

What’s your favorite Recon Scanner feature?

The easy-to-read timeline and the mapping of finding to MITRE ATT&CK framework tactics, techniques, and procedures (TTP).

What do you think is the biggest cybersecurity challenge facing organizations?

Cyber extortion in the form of ransomware encryption or exfiltration of data. We see these attacks happening every day across industries and to organizations of all sizes. Despite the constant news about cyber incidents, the reality is that the majority of cases do not make it to the news and remain private matters. ?

Is Recon Scanner a tool for backup admins or security teams?

Good question because we continue to add and improve security features in Veeam Data Platform so our backup admin users get access to more security information. Now with Recon Scanner, they can send the findings and collaborate with their security teams. The proactive nature of Recon Scanner allows security teams to receive important information to block and remove potential cyberattacks.

How can a Veeam customer get started with Recon Scanner?

All Veeam Data Platform Premium Edition customers now have access to Recon Scanner. They can go to My Account and follow the instructions to download and install it.?


Thanks, Javier! ?? To learn more about Recon Scanner and how it’s transforming cyber resilience, please read our blog?or watch our 5-minute demo video here.


Javier Perez

Chief Evangelist | Open Source & Cybersecurity Advocate | Ransomware Incident Response | Tech Marketing | Product Marketing | Product Management | Technologist | Speaker | Blogger | Author | Strategy | Ex-Red Hat, Ex-IBM

3 个月

Thanks for the interview Veeam team

要查看或添加评论,请登录

Veeam Software的更多文章

社区洞察

其他会员也浏览了