Customize Consent Preferences

We use cookies to help you navigate efficiently and perform certain functions. You will find detailed information about all cookies under each consent category below.

The cookies that are categorized as "Necessary" are stored on your browser as they are essential for enabling the basic functionalities of the site. ... 

Always Active

Necessary cookies are required to enable the basic features of this site, such as providing secure log-in or adjusting your consent preferences. These cookies do not store any personally identifiable data.

No cookies to display.

Functional cookies help perform certain functionalities like sharing the content of the website on social media platforms, collecting feedback, and other third-party features.

No cookies to display.

Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics such as the number of visitors, bounce rate, traffic source, etc.

No cookies to display.

Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.

No cookies to display.

Advertisement cookies are used to provide visitors with customized advertisements based on the pages you visited previously and to analyze the effectiveness of the ad campaigns.

No cookies to display.

Veeam

Research Note: Veeam’s VeeamOn Announcements

At its annual VeeamON 2025 event, Veeam Software announced three significant expansions to its data resilience platform. The updates focus on identity protection, AI integration, and security partnerships.

In addition to these product-focused announcements, Veeam released its annual Ransomware Trends Report, its inaugural ESG Report, and a new Data Resilience Maturity Model, which aren’t covered in this Research Note.

Let’s look at where Veeam focused its product announcements.

Veeam Data Cloud for Microsoft Entra ID

Veeam expanded its Data Cloud platform to include protection for Microsoft Entra ID (formerly Azure AD).

The solution provides:

  • Complete backup and restore capabilities for Entra ID users, groups, application registrations, and related objects
  • Change monitoring and visibility controls for maintaining compliance
  • Cloud-native SaaS delivery with unlimited storage
  • Unified management interface integrated with other Veeam Data Cloud services
  • Pre-hardened and self-configured environment requiring minimal setup or maintenance

Integration for Anthropic’s MCP for AI Agents

Veeam has new support for the Model Context Protocol (MCP), an open standard from Anthropic. MCP enables AI applications to access and utilize data stored in Veeam repositories.

The support provides:

  • Direct connectivity between backup data and various AI tools, including large language models
  • Natural language query support for retrieving related documents
  • Content summarization capabilities for archived communications
  • Automation tools for compliance and e-discovery processes
  • Context enrichment for enterprise-specific AI agents and copilots

Veeam’s AI roadmap encompasses five distinct pillars:

  1. AI Infrastructure Resilience: Protection for AI applications, vector databases, and models
  2. Data Intelligence: Utilizing protected data for AI applications
  3. Data Security: AI/ML-powered threat detection and malware identification
  4. Admin Assist: AI-driven guidance for backup administrators
  5. Data Resilience Operations: Intelligent policy creation and risk analysis

CrowdStrike Partnership & Solution

Veeam and CrowdStrike announced a partnership to create a bi-directional integration between Veeam’s data resilience platform and CrowdStrike’s AI-native Falcon cybersecurity platform.

This goal is to enable security teams to maintain visibility into backup operations while providing data protection teams with enhanced security intelligence.

The collaboration initially delivers two distinct integration products:

  1. Veeam App for CrowdStrike Falcon LogScale: This provides security teams with detailed visibility into Veeam Data Platform activities through:
    • Customized pre-built dashboards specifically designed for backup security monitoring
    • Automated data parsing that transforms backup activity logs into security-relevant intelligence
    • Proactive alerting based on anomalous backup behavior patterns
    • Support for newly added Veeam Backup for Microsoft Entra ID, enhancing visibility into identity-based threats
  2. Veeam Data Connector for CrowdStrike Falcon Next-Gen SIEM: This component creates a unified security view by:
    • Streaming Veeam Data Platform events directly into the CrowdStrike Falcon platform
    • Correlating backup activity with broader security events across the enterprise
    • Enabling unified security incident management through a single console
    • Reducing alert fatigue by contextualizing backup alerts within broader security operations

Impact to IT Organizations

Veeam’s have implications for IT practitioners responsible for data protection, identity management, and security operations. The convergence of these traditionally separate domains creates opportunities and challenges for technical teams.

Operational Benefits:

  • Reduced administrative overhead through SaaS delivery for identity protection
  • Simplified security monitoring through unified dashboards
  • Accelerated threat detection and incident response capabilities
  • Elimination of manually maintained backup infrastructure for Entra ID
  • Enhanced recovery options for identity management systems
  • Reduced training requirements through unified management interfaces

Cost Implications:

  • Potential license consolidation for existing Veeam Data Cloud customers (bundling Entra ID with Microsoft 365 protection)
  • Reduced infrastructure costs through SaaS delivery model
  • Potential reduction in security staffing requirements through enhanced automation
  • Offset by subscription costs and potential vendor lock-in considerations
  • ROI calculations should factor in reduced recovery time during identity-based security incidents
  • Unclear pricing model for MCP integration capabilities

Analysis

Veeam continues its transition from backup vendor to data resilience platform with three clear strategic directions:

  1. Security Integration Focus: Connecting data protection directly with security operations platforms, making Veeam a critical component in broader security architecture (rather than just in its traditional stronghold, backup infrastructure).
  2. SaaS-First Expansion: The company’s continued investment in cloud-native, SaaS-delivered capabilities continues its strategic shift towards cloud-centered protection strategies.
  3. AI Protection: Making backup data an intelligence asset through MCP integration is a nice differentiator for Veeam. Its competitors will follow, but it’s a strong directional and early-mover play for the company.

Veeam’s product announcements align with a broader industry trend driving convergence between data protection, security operations, and artificial intelligence. At the same time, Veeam is showing a solid understanding that data resilience requirements extend beyond traditional recovery scenarios to encompass security, compliance, and business intelligence.

We also like the CrowdStrike partnership, which recognizes that backup systems have become part of the attack surface. Veeam and CrowdStrike are addressing a critical blind spot in many organizations’ defense strategies.

These announcements, just the latest in a long line of changes for the company, show Veeam rapidly progressing from a backup vendor to a trusted comprehensive data resilience platform. We like Veeam’s strategy and are impressed by its execution.

Competitive Outlook & Advice to IT Buyers

These sections are only available to NAND Research clients and IT Advisory MEmbers. Please reach out to info@nand-research.com to learn more.

Disclosure: The author is an industry analyst, and NAND Research an industry analyst firm, that engages in, or has engaged in, research, analysis, and advisory services with many technology companies, which may include those mentioned in this article. The author does not hold any equity positions with any company mentioned in this article.

Leave a Reply

Your email address will not be published. Required fields are marked *