Ransomware protection for your Veeam® Backup

Cyber resiliency is easy with Blocky for Veeam® 

Play Video

Your Last Line of Defense

Add ransomware protection to your Veeam® backup volumes.

Fast Recovery

Blocky protects backups on local or SAN attached storage to provide the fastest possible recovery time.

Early Detection

Blocky will alert on any attempt to write to protected backup volumes which provides an early warning of malware activity.

Get your 14 day free trial

Protect your VEEAM® backup volumes across your MICROSOFT® WINDOWS® environments.

  • Deploys in minutes 
  • No additional hardware or Linux repository required
  • Zero impact on the backup environment
  • Immediate protection

Protecting your Microsoft® Veeam® environment

Make your backups immutable by adding Blocky to your Veeam backup volumes running within a Microsoft Windows Environment. 

Blocky is installed on the Microsoft Windows Repository server and protects NTFS and ReFS volumes residing on internal storage, direct attached disk-based storage such as block storage connected via iSCSI or a Fibre Channel SAN.

Blocky Whitepaper

Application Whitelisting

Want to Become A Blocky Reseller?

Join the team

Video

Your Last Line of Defense

Blocky Overview

What does Blocky protect?

Learn more about us

Blocky for Veeam® was developed by GRAU DATA a leader in data protection software for over 15 years.

Key facts and features

Get your 14 day free trial

Protect your VEEAM® backup volumes across your MICROSOFT® WINDOWS® environments.

  • Deploys in minutes 
  • No additional hardware or Linux repository required
  • Zero impact on the backup environment
  • Immediate protection

FAQ

Your questions, already answered

Blocky is compatible with all current Veeam versions.

Blocky supports Windows Server 2012, 2016 and 2019.

Please note that only Windows Server operating systems are supported and, for example, the protection function does not work under Windows 10.

Blocky for Veeam also securely protects the Windows volumes of the Veeam v11 repositories from encryption.

When upgrading Veeam from a previous version, e.g. v9 or v10, please carry out the following steps for Blocky:

  • Temporarily deactivate Blocky Volume Protection before the Veeam update
  • Activate the Blocky Protection again after the Veeam update
  • Update the “Trusted Applications”:
    • Update of the fingerprints of the existing whitelist entries (right mouse button – update)
    • Add the application C: \ Windows \ Veeam \ Backup \ VeeamDeploymentSvc.exe to the Trusted Applications (add automatically or manually via “Whitelisting”)

Veeam users should protect their backup their backup volumes with Blocky for Veeam. In the event of an encryption attack, the backup will remain intact and enable the infected servers and data to be restored quickly.

The files from other backups such as Veeam Backup Copy Jobs and Veeam Scale-Out Repositories can also be protected with Blocky for Veeam.

Blocky protects Windows NTFS or ReFS volumes that appear with a drive letter in the Windows Device Manager.

Network-attached storage (NAS devices) have their own security environment and unfortunately cannot be protected via Blocky.

Yes, these volumes must not be used by other applications, for example, as a cache or dump or similar. This use is theoretically possible, but the function of the other applications cannot be guaranteed, since the blocky whitelisting may not identify all DLLs belonging to the application and provide them with a fingerprint.

Latest from our blog