Skip to content

Our “Wrapped-Up” 2024: Pandora FMS advances and accomplishments that marked the year

If Spotify can do its annual wrap-up, so can we! It is true that you will not discover your musical evolution this 2024, but you will be able to check all the advantages that one more year are added to the Pandora FMS portfolio and thereby improve your business operations.

2024 has been a transformational year for Pandora FMS, marked by significant advances and a clear focus on our customers’ global needs. We have strengthened our position as a leader in monitoring and observability, expanding our offering with key functionalities that integrate security into IT management. 

One of the most important milestones this year was the launch of Pandora SIEM, a solution that enables organizations to integrate cybersecurity into their daily monitoring strategy, proactively detecting and mitigating threats. This development reinforces our commitment to providing tools that go beyond traditional monitoring, helping our customers manage complex environments with complete confidence.

Pandora SIEM allows you to centrally visualize threats, identify those that are most critical, and ensure they are addressed by the right people. This streamlined approach simplifies threat management and safeguards your infrastructure.

We have also continued to improve our remote management solution (RMM), which is key for distributed environments, optimizing the monitoring and control of critical infrastructures. This tool adopts a global infrastructure visibility approach and establishes a preventive instead of being merely a reactive maintenance model, for example by automating tasks, which ultimately contributes to greater security and SLA compliance. This effort is reflected in the four new versions of ITSM released this year, each designed to respond to the changing demands of our users and ensure maximum flexibility in managing their systems. In addition, the integration of Pandora ITSM with Pandora FMS allows our users to unify ticket management from the Pandora FMS console.

Our results speak for themselves: more than 2,000 tickets managed with a remarkably positive satisfaction rate, and a total of 1,700 tickets under development processed, reflecting the continuous work of our team to perfect our solutions. Each new release has been made possible by a fully optimized development process, which this year has been radically transformed to achieve even higher performance.

Throughout the year, we also strengthened our international presence, standing out as a leading solution in more than 30 key categories on platforms such as G2, where we obtained an average rating of 4.5/5. Our commitment to innovation and flexibility has been recognized by customers in markets around the world, from large corporations to medium-sized companies, who value our ability to adapt to multiple technology needs.

Looking ahead to 2025, we are poised to continue to innovate and expand our capabilities. Our goal is clear: to provide even more robust solutions and remain the trusted technology partner for organizations in any industry, anywhere in the world. To this end, we intend to continue adding functionalities to Pandora SIEM, such as filters or advanced reports; as well as internal auditing to Pandora RMM. We will also continue to explore the limits of monitoring, including user activity monitoring.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About PandoraFMS
Pandora FMS is a flexible monitoring system, capable of monitoring devices, infrastructures, applications, services and business processes.
Of course, one of the things that Pandora FMS can control is the hard disks of your computers.

Dedicated Device Management: Everything You Need to Know

The use of mobile devices has increased dramatically in recent years and will continue to do so with the rapid growth of EMM (enterprise mobility management). Managing these devices is crucial to safeguarding data and the devices that handle critical business information and functions. UEM is the best solution for managing and securing dedicated devices.

 

What are Dedicated Devices?

Dedicated devices are company-owned devices that can be employee-facing or customer-facing. They include self-check-in systems, point-of-sale (POS) systems, digital signage, retail store billing, checkout systems, and airport ticket printing desks, to name a few. The devices fulfill a single-use case by running in kiosk mode which can be single-app or multi-app. Dedicated devices perform essential business functions and hence need to run without any interruptions.

Some common examples of customer-facing dedicated devices are ATMs for cash transactions, digital signage in hotels for advertisements, baggage check-in at airports, POS terminals, handheld devices used as barcode scanners as well as for navigation, and dedicated tablets used for educational purposes.

Some employee-facing dedicated devices are for inventory management in logistics, handheld devices used by healthcare professionals, and vehicle-mounted devices used by drivers in transportation.

However, these devices can’t run independently and are required to be managed remotely. Usually, the devices are unattended and run in dedicated kiosk mode. Communicating with these devices in the field and ensuring timely updates on these devices can be best done using a dedicated device management solution like a Unified Endpoint Management (UEM) solution.

Corporate-owned dedicated devices don’t store content and information, and it’s crucial to push updated content regularly to these devices as they perform mission-critical functions. UEM enables you to update, troubleshoot, interact, and pass commands to devices remotely. UEM also simplifies configuring devices and provisioning them, enforcing policies, and ensuring device and data security.

How Does Dedicated Device Management Work?

A dedicated computer or dedicated hardware is often locked to a single application or a set of applications to serve a specific purpose, ensuring efficiency and security. This is achieved using either single-app kiosk mode or multi-app kiosk mode, based on the use case:

  • Multi-app kiosk mode: When a device needs to run multiple applications, it operates in a multi-app kiosk mode. With the help of a kiosk launcher, admins can easily switch between apps and manage various functions. This approach is perfect for devices used in environments that demand versatility while still maintaining the dedicated purpose of the hardware.
  • Single-app kiosk mode: In this setup, the device is locked to a single application, providing IT admins extensive control over the device’s functionality. They can configure peripheral settings to ensure seamless operation. Once locked, the application launches automatically and remains on the screen, even after the device restarts or shuts down. This makes it ideal for scenarios requiring a focused, dedicated hardware solution.
Learn More: What is Kiosk Mode?
Free trial

Types of Dedicated Devices

When it comes to types of hardware devices, dedicated hardware plays a pivotal role in streamlining specific operations across various industries. These devices are categorized based on their purpose and functionality:

  1. Single-Use Hardware Devices
    These devices are designed to perform one specific task, often operating in single-app kiosk mode. Examples include:
    • Point-of-Sale (POS) Systems: Optimized for transaction processing.
    • Digital Signage Devices: Built to display content like advertisements or announcements.
    • Self-Service Kiosks: Used for ticketing, check-ins, or orders.
  2. Multi-Function Hardware Devices
    These devices run multiple applications while maintaining a dedicated purpose, utilizing multi-app kiosk mode for flexibility. Examples include:
    • Retail Tablets: Supporting inventory management, customer assistance, and payment apps.
    • Educational Tablets: Configured with a suite of learning applications for students.
    • Medical Devices: Designed for patient records, monitoring, and diagnostics.
  3. Industrial Hardware Devices
    Built for durability and reliability, these devices are essential in demanding environments, such as:
    • Barcode Scanners: Used for inventory tracking and warehouse management.
    • Fleet Management Devices: Installed in vehicles to monitor operations and logistics.
    • IoT Sensors: Designed for data collection and automation in industrial setups.

Benefits of Using Dedicated Devices

Using dedicated devices, particularly those managed with a UEM solution, brings numerous advantages for businesses.

Here are the key benefits:

Manage Content and Applications

The purpose of a dedicated device can evolve, requiring changes in the content or applications it runs. UEM software ensures smooth updates by allowing admins to silently install or uninstall apps without relying on end users. This reduces device downtime significantly. Through the UEM dashboard, admins can push apps from the Play Store or deploy enterprise apps directly from the Enterprise Store, making management efficient.

Ensure Endpoint Security

UEM solutions play a critical role in securing Android-dedicated devices and other platforms. They encrypt sensitive corporate data, preventing unauthorized access. With kiosk mode, admins gain full control over device settings, including peripherals, ensuring minimal end-user interference. Furthermore, network configurations such as Wi-Fi are managed to connect devices exclusively to corporate-approved networks. Automated OS updates ensure devices remain protected from malware and viruses.

Protect Lost or Stolen Devices

When devices are lost or stolen, UEM solutions provide critical security features like factory reset protection for Android devices. Admins can remotely lock the device, wipe sensitive data, and prevent misuse of corporate information. Location tracking and location history monitoring via the UEM dashboard ensure admins can quickly locate devices or enforce location-specific policies.

Remote Troubleshooting of Devices

Remote cast and control capabilities allow IT admins to address technical issues immediately. By casting the device screen to the UEM dashboard, admins can resolve glitches or sync files remotely, significantly reducing downtime. This feature is particularly valuable for dedicated devices operating in unattended locations, where physical access is challenging during disruptions.

G2 Review
G2 Review

Some Popular Examples of Dedicated Devices

Dedicated devices are designed to serve specific purposes, offering reliability and efficiency across various industries. Here are some dedicated devices examples that showcase their diverse applications:

  1. Point-of-Sale (POS) Terminals: Used in retail and hospitality, these devices handle transactions and ensure smooth customer checkouts.
  2. Digital Signage Systems: Display advertisements, announcements, or schedules in retail stores, airports, and public spaces.
  3. Self-Service Kiosks: Found in ticketing counters, restaurants, and banks, these kiosks simplify customer interactions and reduce wait times.
  4. Rugged Industrial Devices: Built for warehouse or field operations, these include barcode scanners and handheld terminals.
  5. Healthcare Monitoring Devices: Used in hospitals for patient monitoring, diagnosis, and medical record access.

Key Considerations When Choosing Dedicated Devices

Selecting the right dedicated device is essential for meeting business needs while ensuring reliability and security. Here are some key factors to consider:

  1. Purpose and Use Case: Clearly define the device’s role in your operations. Whether it’s for digital signage, POS, or rugged fieldwork, understanding the requirements will guide your choice.
  2. Durability and Environment Suitability: If the device will be used in challenging environments, like warehouses or outdoor locations, ensure it has a rugged design and supports extreme conditions.
  3. Management and Configuration Support: Choose devices that integrate seamlessly with a UEM solution to allow for remote management, app updates, and network configuration.
  4. Security Features: Devices must offer strong security measures, such as encryption, kiosk mode, and remote locking or wiping capabilities, especially for corporate data protection.
  5. Compatibility: Ensure the dedicated devices work with your existing software and infrastructure, including enterprise apps or specific operating systems like Android or iOS.

Pick Your UEM Alongside Your Dedicated Hardware

When investing in dedicated hardware, it’s crucial to pair it with a robust Unified Endpoint Management (UEM) solution. Here’s why this combination matters:

  1. Streamlined Device Management
    A UEM solution allows IT admins to manage, monitor, and secure devices remotely. It ensures that the dedicated hardware always functions optimally by pushing updates, configuring settings, and deploying apps.
  2. Enhanced Security
    Protect sensitive corporate data on your dedicated hardware through features like encryption, kiosk mode, and remote locking or wiping in case of theft or loss.
  3. Flexible Adaptation to Business Needs
    UEM lets you reconfigure devices for new tasks or applications without replacing the hardware, extending its lifespan and value.
  4. Minimized Downtime
    With remote troubleshooting and monitoring capabilities, admins can address technical issues immediately, ensuring uninterrupted device performance.

By choosing the right UEM solution alongside your dedicated hardware, you can maximize the functionality, security, and reliability of your devices, empowering your business operations.

The Final Words

Though dedicated devices help in executing different strategies for various businesses, the security of these devices is extremely important. Scalefusion UEM stands out as a versatile solution to efficiently manage a fleet of dedicated devices from a single console, offering robust data security and seamless management capabilities.

About Scalefusion
Scalefusion’s company DNA is built on the foundation of providing world-class customer service and making endpoint management simple and effortless for businesses globally. We prioritize the needs and feedback of our customers, making sure that they are at the forefront of all decision-making processes. We are dedicated to providing comprehensive customer support services, and place emphasis on customer-centric thinking throughout the organization.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

OpenLogic 是如何製作 CentOS 修補程式

針對生命週期結束(EOL)的 CentOS 進行修補程式製作,是一項複雜且精細的工作。OpenLogic by Perforce 的技術專家分享了如何透過回溯移植(Backporting)和測試流程,為舊版 CentOS 提供持續的安全更新,確保其在生命週期結束後仍然穩定可靠。

回溯移植是針對生命週期結束的操作系統版本,將上游的最新修補程式,調整並應用於舊版軟件的過程。這並非簡單的直接套用,而是需要根據舊版系統的架構和特性,進行細緻的改寫與測試。例如,CentOS 7 使用的許多軟件,自第一個版本發布以來幾乎未有更新,這意味著新的修補程式可能無法直接適用,需要進行技術處理。

在修補程式製作的流程中,OpenLogic 會首先分析每個漏洞(CVE)的詳細信息,包括漏洞的攻擊向量、影響範圍及嚴重性,並決定修補程式優先次序。接著,檢查上游可用的修補程式或原始碼,然後針對舊版系統進行改寫,確保其與現有環境兼容。例如,在處理像 OpenSSL 這類底層庫時,必須確保修補程式不會影響依賴該庫的其他應用程式。

修補程式移植完成後,OpenLogic 會執行多層次的測試,包括基本功能測試、軟件包內置的測試套件,以及 CentOS 自身的功能測試套件。這些測試確保修補程式能在安裝後維持系統的穩定性和正常運行。

此項技術過程摘錄自 OpenLogic 的網絡研討會《CentOS 7 生命週期結束:為何你需要現在開始規劃 EOL 應對措施》,該研討會旨在幫助公司企業應對 CentOS 7 生命週期結束所帶來的挑戰。OpenLogic 的修補程式製作流程展現了他們在支援 EOL 系統上的專業與承諾,為仍在使用舊版 CentOS 的公司企業提供了可靠的安全保障。

關於 OpenLogic

OpenLogic 由 Perforce 提供完整的企業級支援和服務,專為在其基礎設施中使用開源軟件的公司企業而設計。我們支援超過 400 種開源技術,提供保證的服務水準協議(SLA),並可直接與經驗豐富的企業架構師溝通。透過我們的 24×7 工單支援、專業服務和培訓,OpenLogic 提供綜合且全面的開源支援解決方案。

關於Version 2

Version 2 Digital 是立足亞洲的增值代理商及IT開發者。公司在網絡安全、雲端、數據保護、終端設備、基礎設施、系統監控、存儲、網絡管理、商業生產力和通信產品等各個領域代理發展各種 IT 產品。透過公司龐大的網絡、通路、銷售點、分銷商及合作夥伴,Version 2 提供廣被市場讚賞的產品及服務。Version 2 的銷售網絡包括台灣、香港、澳門、中國大陸、新加坡、馬來西亞等各亞太地區,客戶來自各行各業,包括全球 1000 大跨國企業、上市公司、公用事業、醫療、金融、教育機構、政府部門、無數成功的中小企及來自亞洲各城市的消費市場客戶。

Leading the Guard: What MSPs Need to Know About Cybersecurity Heading Into 2025

As 2025 looms on the horizon, MSPs are grappling with an ever-shifting cybersecurity landscape. The stakes are higher than ever, with small and medium-sized businesses continuing to face relentless cyber threats. While MSPs play a critical role in shielding these businesses, the road ahead is not without its twists and turns.

Drawing from recent insights—including our Guardz survey, which found that 77% of MSPs are struggling to manage multiple cybersecurity solutions—I want to unpack the challenges, risks, and opportunities MSPs should have on their radar for the year ahead.

Top Challenges for MSPs 

1. The Complexity Conundrum

Managing cybersecurity point solutions has become a juggling act and not a fun one. With every new tool claiming to solve the latest threat, MSPs find themselves buried under layers of complexity. Our survey underscores this pain point: nearly 8 in 10 MSPs find it difficult to consolidate their cybersecurity stack.

Why does this matter? Complexity slows response times, increases the chances of misconfigurations, and ultimately leaves gaps that cybercriminals are all too happy to exploit.

2. Identities at the core 

Account compromise is climbing the ranks as one of the most persistent and damaging cyber threats. Cybercriminals are finding new ways to exploit weak or reused credentials, phishing unsuspecting employees, and bypass multi-factor authentication (MFA) through methods like MFA fatigue attacks, stolen tokens, etc.

For MSPs, this means prioritizing solutions that protect Identities—not just at login but throughout their lifecycle. Continuous monitoring, behavioral analytics, and robust identity management strategies are becoming essential across cloud directories, email, devices, data, and training.

3. Supply Chain Attacks on the Rise

It’s no longer enough to protect your clients; you also have to worry about the vendors and partners they rely on. Supply chain attacks are becoming alarmingly common, and MSPs are often caught in the crossfire.

These attacks exploit the trust inherent in software and hardware providers, making them insidious and hard to detect. For MSPs, ensuring clients’ security now means scrutinizing third-party relationships more than ever.

The Big Risks MSPs Face

1. Underestimating the Human Factor

We like to talk about firewalls and encryption, but let’s not forget that most breaches start with a simple mistake—like clicking on a phishing link. MSPs often focus on tech solutions while overlooking the importance of training end users.

If employees at your client’s organization aren’t part of the cybersecurity conversation, you’re leaving a major vulnerability wide open.

2. Burnout of technicians 

Running an MSP is tough. Cyber threats are 24/7, and the demands on your time and energy are relentless. In addition, monitoring and implementing dozens of point solutions for every client adds more challenges and a level of constant pressure can lead to burnout, affecting your business and the quality of service you provide to clients.

3. Cyber Insurance Complexity

Cyber insurance can be a lifeline for SMBs after a breach—but obtaining and maintaining coverage has become increasingly complex. Insurers are tightening their requirements, and MSPs are often called upon to ensure clients meet them. The risk? Falling short could leave clients exposed and MSPs under fire.

Opportunities for MSPs in 2025

Amid these challenges, MSPs have opportunities to elevate their game and deliver even more value to SMB clients.

1. Consolidation is King

One of the clearest takeaways from our survey is the need for streamlined cybersecurity solutions. MSPs can differentiate themselves by adopting unified platforms that simplify management without sacrificing protection. The less time you spend wrangling tools, the more time you have to focus on strategic initiatives.

2. Leveraging AI For Faster Responses

AI is rapidly transforming cybersecurity operations, and MSPs that harness its power will gain a significant edge. AI-driven tools can automate repetitive tasks, identify threats faster than any human analyst, and deliver real-time responses to incidents.

For MSPs, AI isn’t just a luxury—it’s becoming a necessity. By integrating AI-powered solutions into their offerings, MSPs can enhance efficiency, reduce response times, and ensure a higher level of protection for their clients. This not only improves outcomes but also frees up valuable time to focus on strategy and growth.

3. Proactive Risk Management

The days of reactive cybersecurity are over. MSPs that adopt a proactive approach—focusing on threat intelligence, vulnerability management, and regular penetration testing—can set themselves apart. SMBs are looking for partners who can anticipate problems before they arise.

4. Building a Cybersecurity Culture

While tools are essential, fostering a culture of cybersecurity awareness within SMBs is equally critical. MSPs have a unique opportunity to offer training and workshops that empower employees to become the first line of defense against cyber threats.

5. Expanding Services to Include Cyber Insurance 

With the cyber insurance market tightening, MSPs can position themselves as essential partners in the application and compliance process. Offering services that help SMBs navigate these waters can open up new revenue streams and deepen client relationships.

Looking Ahead

The role of MSPs is more critical than ever. SMBs are counting on you not just to defend against threats but to guide them through an increasingly complex digital environment. By focusing on simplification, proactivity, and education, you can not only tackle the challenges of 2025 but also seize the opportunities it presents.

The cybersecurity battle is ongoing, and it’s not just about technology—it’s about strategy, people, and vision. As we lead the guard together, let’s make 2025 a year where MSPs don’t just survive but thrive.

Until next time,
Dor

About Guardz
Guardz is on a mission to create a safer digital world by empowering Managed Service Providers (MSPs). Their goal is to proactively secure and insure Small and Medium Enterprises (SMEs) against ever-evolving threats while simultaneously creating new revenue streams, all on one unified platform.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

Setting up StarWind Virtual SAN (VSAN) as Hardened Repository for Veeam B&R

 

Introduction

Hi, fellas. If you’re in charge of keeping your business data safe, you know that protecting it from ransomware and other threats is a top priority. One of the best ways to do this is using a 3-2-1-1 backup practice. That extra “1” in 3-2-1-1 stands for using immutable storage, such as on a Linux-based hardened repository.

In this article, I will show you how to turn your existing or aging server hardware into immutable backup storage to keep your data safe against ransomware. All you need is Veeam Backup & Replication and StarWind VSAN that will perform a role of Hardened Repository. This is a super easy and efficient way to keep your data safe, and I’ll walk you through the entire process step by step.

Why immutability?

Firstly, let’s talk about why backups have to be immutable. Essentially, it means that once a backup is made, it can’t be deleted or changed. This is important for crucial data because it means that even if a hacker gets into your system and tries to remove your backups, they won’t be able to. This is why write-once-read-many (WORM) storage media like tape libraries and optical media are commonly used for backups. However, these types of media can be a bit of a pain to manage because they need to be rotated and replaced regularly to align with retention policies.

What’s the easiest way to enable immutability? 

This is where Veeam B&R comes in – it’s an industry-standard backup solution that works with most storage media types, including physical and virtual tapes. What’s more, in Veeam B&R v11, they added support for  Hardened Backup Repositories, allowing to enable immutability for backups without using object storage or any specialized third-party solutions. You can find the deployment documentation for this on Veeam B&R KB.

Now, you could go through the process of setting up a Linux server and configuring it to work with Veeam B&R, but it’s not exactly a walk in the park. However, there’s good news – we’ve made it super simple with StarWind VSAN.Diagram: StarWind VSAN as Hardened Repository for Veeam B&R

We’ve developed a set of management tools that are pre-configured in the web console, so you can easily set up a storage server using commodity hardware. All you need to do is use a few wizards in StarWind Virtual SAN  web-console, and you’ll have a hardened repository for Veeam B&R in no time.

How to set up?

In today’s article, I won’t be covering the initial setup process. For details on configuring the StarWind Controller Virtual Machine (CVM), its networking, and storage, refer to our previous article: ‘How to Create a File Share with StarWind VSAN‘. Make sure to review it before proceeding. We’ll also post instructions for the bare-metal StarWind VSAN deployment in a separate blog post later on, so stay tuned.

Assuming you’ve completed the preliminary steps and created a storage pool, we can now move on to creating a new volume in the Virtual SAN Web UI.

Once the storage pool is created, navigate to the “Volumes” tab and click the “+” button to open the “Create volume” wizard:

“Volumes” tab | “Create volume”

Now select the storage pool that you are going to use for the new volume and click “Next”:

Create volume wizard | Select storege pool

Specify the name of the new volume and select the required size:

Create volume | Specify settings

Now select the filesystem for your volume. Select the “Backup repository” option, because it is already configured according to Veaam best practices and recommendations.

Create volume | Choose Filesystem settings

Review your settings and click “Create” to create the new volume:

Create volume | Review summary

After this, you need to add a Veeam user to the CVM to provide Veeam access to the storage. For this, in the “Volumes” tab, select your newly created backup volume and click “Manage VHR (Veeam Hardened Repository) user.

In the “Manage VHR user” pop-up window, click the “+” button:

Manage VHR user | Create Veeam user

Specify the credentials for the new user:

Create Veeam user | Specify the credentials for the new user

Select the newly created user and enable SSH access for it, and click “Save”:

Manage VHR user | Select the newly created user and enable SSH

Congrats! You have completed the StarWind VSAN configuration. You’ll need to connect the created volume to Veeam B&R as the new backup repository. To do that, open the Veeam Backup and Replication console, navigate to “Backup Infrastructure”, and select “Backup Repositories”:

Veeam Backup and Replication console | Navigate to “Backup Infrastructure”, and select “Backup Repositories”

Click “Add Repository”  and select “Direct attached storage:

Add Backup Repository | Select “Direct attached storage

Next, select “Linux (Hardened Repository)”:

Direct Attached Storage | Select “Linux (Hardened Repository)”

In the “New Backup Repository” wizard, specify the name and description for the new repository and click “Next”:

“New Backup Repository” wizard | Specify the name and description for the new repository

In the next step, click “Add New”:

New Backup Repository wizard | Add New

In the “New Linux Server” wizard, specify the IP address or the DNS name of your StarWind CVM and click “Next”:

New Linux Server wizard | Specify the IP address or the DNS

Click “Add” and specify the credentials of the VHR user account that you created in StarWind VSAN Web UI:

New Linux Server | Specify the credentials of the VHR user account

SSH Connection | Provide Credentials

Review the installed components and click “Apply”:

New Linux Server | Review the installed components

Wait until the installation is completed and then click the “Next” button:

New Linux Server | Wait until the installation is completed

Review the summary and click “Finish”:

New Linux Server | Review the summary

In the “New Backup Repository” wizard, select the newly added Repository server from the drop-down menu:

New Backup Repository wizard | Select the newly added Repository server

Now, select the path to the volume on the StarWind VSAN appliance. Also, check that the “Use fast cloning on XFS volumes” setting is enabled and specify the required retention period for immutability:

New Backup Repository | Select the path to the volume on the StarWind VSAN appliance

After that, check the Mount Server settings, where you will be doing fast restores of your backups:

New Backup Repository | Check the Mount Server settings

Check the components that will be installed and click “Apply”:

New Backup Repository | Check the components that will be installed

Wait until the process is completed and click “Next”:

New Backup Repository | Wait until the process is completed

Review the summary and click “Finish”:

New Backup Repository | Review the summary

To secure the server from potential local threats such as credentials theft, in the StarWind VSAN Web UI, navigate to the “Volumes” page, launch the “Manage VHR user” wizard, and disable SSH for the VHR user account:

Manage VHR user wizard | Disable SSH for the VHR user account

Additionally, keep in mind that this method makes it easy to set up a hardened repository and secure your backups. It’s still important to regularly test and verify your backups to ensure they are working properly and can be restored in case of an emergency. Ensure your software and hardware up to date, and to have a disaster recovery plan in place in case the worst happens.

Conclusion

To sum up, using StarWind VSAN as hardened repository for Veeam B&R is a great way to protect your business data from any threats, while also making the process of setting it up easy and straightforward. With the help of our management tools, you can have a secure and reliable backup solution up and running in no time. So, if you’re looking to upgrade your backup strategy and keep your data safe, give StarWind VSAN a try.

About StarWind

StarWind is a pioneer of hyperconvergence and storage virtualization and the only all-flash hyperconvergence vendor on the market. We provide a unique blend of simplicity, performance, and affordability, yet with the ultimate in flexibility. Our focus is to help companies create sustainable and effective IT infrastructures with minimum effort.

We believe that quality should preside over quantity when it comes to building infrastructures. Our solutions provide businesses with the ability to use only those IT resources that are truly necessary and to make the most out of them in an efficient and performant manner.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

×

Hello!

Click one of our contacts below to chat on WhatsApp

×