Probably it is FOMO again..As you may have heard about the big announcements came from San Diego, CA’s big tech event of the year: VeeamOn.
While I am truly sad not to be there this year, but inside, I was excited watching the keynotes and announcements online. You can also watch it on demand now from here.
Let’s recap the announcements that I was excited about:
V13 is coming

Veeam Data Protection (VDP) V13 is announced to be GA by Q4-2025. It promises lots of enhancements and new approaches. For me, one of the best announcements here is Veeam Software Appliance.

It is a pre-built appliance, delivered as an ISO image or as a virtual appliance (OVA). And it is secure by default as it is pre-hardened and pre-configured according to DISA STIG guidelines. Also, it reduces the attack surface by disabling SSH and the integration services by default. Also, reduced privilege escalation opportunities with a low-privilege services architecture.
Some other features, like root privileges, are not available, and a mandatory MFA and secure password policy are applied.

It is available in beta right now, and you can contact Veeam sales to obtain your access.

Getting back to VDP V13, there were two threads you may need to read to know more about the upcoming release:
[V13] System Requirements for our 2025 release
[V13] Deprecated and Discontinued features for our 2025 release

Security ……… all over again
Veeam continues to invest more in cybersecurity with lots of enhancements. Because -simply- we are talking here about a full data protection platform.

Veeam also discussed the indicators of compromises. Indicators of compromise are non-malware programs. However, their unexpected presence on a system can indicate a security risk. Indicators of compromise are specified in the SuspiciousFiles.xml file. They are selected from and categorized using the MITRE ATT&CK Matrix.
To detect indicators of compromise, the Veeam Data Analyzer Service compares guest indexing data from two restore points with the SuspiciousFiles.xml file. The later restore point will be compared with the earliest restore point from the same 25-hour period. If there is no restore point, the scan will use the most recent restore point from the same 30-day period. If an indicator of compromise is present only in the later restore point, a malware detection event is created.

Veeam introduces a new role, “Security Administrator”

Veeam Guardian
Veeam Guardian enables automatic data search and protection, data loss prevention, hands-off security workflow execution, and customization of DR and restore testing.

Veeam and CrowdStrike Partner to Bring Data Resilience to Customers
CrowdStrike and Veeam have partnered to deliver a powerful solution that enhances data security and boosts operational efficiency across an organization’s IT ecosystem. Read the announcement from here.
I highly recommend reading the recap by Rick Vanover from here for more information about the VeeamOn 2025 announcements.


Former Nuclear Engineer | University Lecturer | Technology Advisor | Digital Transformation evangelist | FinTech | Blockchain | Podcaster | vExpert ⭐️⭐️⭐️⭐️ | VeeamVanguard ⭐️⭐️ | Nutanix SME | MBA | AWS ABW Grant’23