
Veeam enables AI-powered business insights from backup data
This development allows Veeam customers to search for documents using natural language, generate summaries from archived emails and tickets, automate compliance and e-discovery, and enrich AI agents and copilots with enterprise-specific information, using their own backup data stores.
The integration with MCP is intended to securely connect Veeam's backup repositories with a range of AI applications, turning previously passive backup data into an active source of business intelligence.
Niraj Tolia, CTO at Veeam, commented: "We're not just backing up data anymore - we're opening it up for intelligence. By supporting the Model Context Protocol, customers can now safely connect Veeam-protected data to the AI tools of their choice. Whether it's internal copilots, vector databases, or LLMs, Veeam ensures data is AI-ready, portable, and protected."
The capabilities enabled by MCP integration support several AI-powered functions, such as discovering and retrieving related documents with natural language queries, summarising archived communications, automating compliance monitoring, and giving AI systems richer, enterprise-specific context.
Veeam's stated aim is to change how organisations view their stored data, positioning backup repositories as strategic assets capable of delivering real-time insights.
As part of its AI roadmap, Veeam is basing its approach to artificial intelligence on five pillars: AI infrastructure resilience, data intelligence, data security, admin assist, and data resilience operations.
Through AI Infrastructure Resilience, Veeam intends to safeguard investments in AI infrastructure by ensuring applications, data, vector databases, and models are secured to the same standard as other critical business data.
The Data Intelligence pillar focuses on delivering value from backup data by enabling its use in AI applications, both from Veeam's own offerings and through customer- or partner-built solutions.
Data Security leverages machine learning techniques in Veeam's malware, ransomware, and threat detection capabilities to bolster overall cyberdefence.
Admin Assist provides AI-driven support and guidance for backup administrators, aiming to improve efficiency and decision-making in data management.
Finally, Data Resilience Operations covers the use of AI to inform backups, restores, policy creation, and risk-based sensitive data analysis.
The Model Context Protocol itself functions as an open standard for connecting AI agents to organisational systems and data repositories. Its implementation in Veeam positions the platform as a bridge between protected enterprise data and an expanding array of AI tools, from Anthropic's Claude to custom large language models built by customers.
Among the cited benefits of MCP-enabled Veeam integration are enhanced data accessibility for AI agents through context-aware search, improved decision-making through the application of Veeam-protected data, and simplified integration that eliminates the need for custom connectivity work.
Support for the Model Context Protocol will become available in future releases of Veeam Data Cloud, broadening customers' ability to use backup data in various enterprise AI contexts.
Hashtags

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles


Techday NZ
2 hours ago
- Techday NZ
SOCRadar debuts MCP Server for secure AI threat intel access
SOCRadar has launched its MCP Server to enable secure integration between artificial intelligence models and its threat intelligence platform for cybersecurity professionals. The MCP Server introduces the Model Context Protocol, a standard interface designed to facilitate secure connections between AI language models and external data sources. Through this server, AI assistants can access real-time threat intelligence information, interact with databases and APIs, and utilise various services while ensuring security boundaries are preserved. Facilitating human–AI collaboration According to SOCRadar, cybersecurity teams are increasingly adopting AI agents in their workflows, particularly for threat analysis and incident response. In response, the company developed the MCP Server to offer standardised, controlled access to its threat intelligence databases and security tools. "Microsoft CEO Satya Nadella said it best: 'Human language is the new UI layer.' That's exactly why we launched our MCP server. We believe the future of cybersecurity lies in seamless human–AI collaboration. Security threats are evolving too fast for traditional, manual processes to keep up. By allowing AI assistants to access our threat intelligence in real time through natural language, we're giving security teams the ability to respond faster, with more context, and far less friction," said Huzeyfe Onal, CEO of SOCRadar. Simplifying operational workflow The MCP Server allows security teams to interact with SOCRadar's threat intelligence services through conversational requests, bypassing the need to navigate the existing user interface or memorise workflows. Designated commands, such as "Show me my critical assets exposed to the latest Citrix vulnerability" or "Give me the top CVEs affecting my attack surface today," can be issued directly to the MCP Server, which interprets, executes, and provides actionable results on demand. SOCRadar stated this process eliminates interface overload, helping teams focus on managing vulnerabilities and threat responses rather than administrative tasks. Reporting and integration capabilities Security professionals can use the MCP Server to generate reports quickly, including daily threat updates, geo-targeted actor profiles, or environment-specific vulnerability snapshots. Sample requests include: "SOCRadar, create a report on threat actors targeting energy companies in the US over the past week." The company reports that such reports are generated dynamically in seconds, removing the need for templates or filter adjustments. In addition to these features, the MCP Server supports integration with AI-driven SOC platforms and internal AI agents. The server functions as a gateway for systems to enrich indicators of compromise (IOCs), retrieve CVE intelligence, automate response actions, and trigger custom playbooks, all without the need for additional API development. SOCRadar explained that this allows existing AI agents to access the company's platform by simply sending requests, with the server managing the interpretation and fulfilment of tasks. "With SOCRadar's MCP server, there's no need to build brittle APIs. The agent just asks, and SOCRadar answers," the company explained. Platform reach SOCRadar provides threat intelligence services to over 800 customers in 70 countries. Its Extended Threat Intelligence Platform incorporates artificial intelligence and machine learning to deliver threat detection and actionable intelligence for proactive cybersecurity efforts. Product offerings include cyber threat intelligence, external attack surface management, brand protection, dark web monitoring, and supply chain threat intelligence.


Techday NZ
2 days ago
- Techday NZ
Exclusive: AI drives new cyber threats & resilience strategies in APJ
There is both opportunity and risk, as artificial intelligence (AI) is adopted at enterprises across the region, according to Ben Young, Field CTO for APJ at Veeam. He also sees businesses are under pressure not only to adopt new technologies but also to shore up their defences as adversarial groups increasingly harness the same innovations for malicious purposes. "Every single vertical can benefit from some form of AI adoption," Young asserts. "But it's a double-edged sword. Just as we're trying to innovate, the threat groups-cyber adversaries-are leveraging AI as well." He points to the growing accessibility of AI-powered toolkits that lower the bar for launching attacks: "There are tools you can buy for a few hundred USD a month as a subscription, and they allow non-experts to write malware or deploy very convincing phishing campaigns. Large language models can push spear phishing click-through rates from industry averages of 12% up to 54%." This sharp escalation in the sophistication and volume of threats comes at a pivotal time when organisations are also accelerating their AI strategies. Veeam, which originally established its brand in backup and disaster recovery, is rapidly expanding its portfolio to address an evolving landscape, protecting hybrid environments, SaaS platforms, and even providing storage for backup workloads. Young notes that the company's partnerships, especially with Microsoft on Azure, have enabled it to offer backup-as-a-service while leveraging global economies of scale-critically, with "no egress and no API transaction fees." However, he's quick to add that adaptability is part of its core: "It's on the roadmap for other clouds to run these things, because not everyone's an Azure shop." The broadening definition of business resilience now brings backup and security disciplines much closer together. 90% of cyber attacks focus on backup repositories, which has resulted in disaster recovery and cybersecurity being intertwined. "Backups are the last resort, and threat actors know it. If they take out your backups, your only options are to pay the ransom and hope for the best," Young explains. Veeam's acquisition of CoveWare, an incident response firm, enables the direct integration of real-world telemetry and threat intelligence into Veeam's product development and customer education initiatives. Changing regulations are also playing a critical part. The recently enacted Japanese cyber defence bill mandates the reporting of ransomware incidents and the development of regular response plans. Young applauds this direction, noting, "It's critical we talk about incidents-otherwise these are not board-level discussions and security teams struggle for budget." He points out that cyber extortion is no longer a niche risk. Financial institutions and public sector organisations, in particular, are contending with increasingly sophisticated AI-enabled attacks while balancing compliance, governance, and privacy regulations across diverse national boundaries. The surge in 'shadow IT'-where departments launch unsanctioned SaaS, AI applications or cloud projects-presents new blind spots. "We're seeing lots of little shadow IT projects, especially as people rush to experiment with AI. When that gets to production, who is looking after that system? It's the same shadow IT problem we've seen for years, now amplified by the ease of consuming AI services," Young says. This requires a step change in visibility. Veeam is responding by mapping and analysing customers' data footprints and building automated support, monitoring, and reporting features through its observability platform. The company's AI-powered 'Veeam Intelligence Engine' is designed to suggest remediations, generate code samples, and flag risks in natural language-"making support and reporting far more accessible," says Young. The complexity of emerging architectures compounds the challenge of AI adoption. "We're really good at protecting databases and webservers because we know what they are and how to back them up. But with the introduction of vector databases, AI agents, and model training checkpoints, we need new strategies," Young explains. The potential cost and risk of a failed AI project, such as losing weeks of model training due to corrupted data, is prompting enterprises to consider backup and recovery for infrastructure previously outside the IT remit. "Agents are going to be central to the future, especially with more reliable, reflective AI systems. The good news is, most of these platforms run on environments-Kubernetes, cloud infrastructure-that we already protect." Young identifies security lapses as a persistent oversight in the current rush to implement AI: "It's the shiny new thing, and the basics can be forgotten. If we can get people thinking about security as part of their DNA while deploying AI, they'll be better off." He cautions that most SaaS providers operate a shared responsibility model: "Microsoft or Salesforce take care of the platform, not your data. If it's deleted from the cloud, it's gone-vendors won't provide a full backup. Your data is your responsibility." Against this backdrop, keeping pace with threats requires organisation-wide preparation. Veeam's customer workshops and regular incident simulations demonstrate a commitment to education as a proactive defence. "Preparation is the key: practice and plan. Use your tools, test your backups, scan for vulnerabilities, and have a response plan. Yara signature rules, for example, can be imported to scan for specific attack strains in backup archives," Young says, emphasising the importance of practical readiness over theoretical robustness. Young notes that Veeam's AI and resilience roadmap is anchored in five pillars: infrastructure resilience, intelligence, security pre- and post-attack, and business value extraction from archived data. The company's long-standing data integration API, for instance, enables the surfacing of unstructured data, ranging from images to documents, for AI applications, analytics, or compliance. "AI applications require fuel, and that fuel is data. Unlocking value from our organisations means thinking beyond expensive, monolithic data lakes, and instead focusing on the ability to extract insight from all data sources, structured or not." "Our role is to assist with growing compliance, governance, and regulatory requirements, but also to bring responsible, opt-in AI features to our customers and to help make data protection, cybersecurity, and digital transformation board-level priorities," Young concludes. "It's critical we talk about incidents-it raises awareness across all organisations. If we don't, it's not going to be a board-level discussion, and teams will struggle to get budget for this stuff."


Scoop
3 days ago
- Scoop
Depositor Compensation Scheme Now In Effect
1 July 2025 The Depositor Compensation Scheme (DCS) came into effect today, protecting depositors for up to $100,000 in the unlikely event that their bank or other licensed deposit taker fails. Licensed deposit takers include banks, credit unions, building societies and finance companies who take retail deposits in New Zealand and are supervised by the Reserve Bank of New Zealand. The scheme covers money held in standard banking products, including transaction, savings, notice, and term deposit accounts. It protects individuals, businesses and trusts, and applies automatically from today. The scheme is established under the Deposit Takers Act 2023, and the Reserve Bank will manage and administer the scheme. It is fully funded by levies on industry. Kerry Beaumont, Director of Enforcement and Resolution at the Reserve Bank says, "While deposit taker failures are rare, the DCS gives depositors extra peace of mind that their standard banking products are protected. This type of protection already exists in many other countries and contributes to the stability of New Zealand's financial system.' The scheme does not cover investments like KiwiSaver, bonds, shares, and similar products. It also does not protect against frauds or scams. Banks, credit unions, building societies and finance companies who take retail deposits will list their DCS-protected products on their websites so depositors can check if their accounts are covered. Information about the scheme is also available on the Reserve Bank website.