
{"id":21707,"date":"2025-08-11T18:31:26","date_gmt":"2025-08-11T18:31:26","guid":{"rendered":"https:\/\/www.otava.com\/?post_type=webinars&#038;p=21707"},"modified":"2025-08-11T18:34:25","modified_gmt":"2025-08-11T18:34:25","slug":"secure-framework-undo-thank-you","status":"publish","type":"webinars","link":"https:\/\/www.otava.com\/webinars\/secure-framework-undo-thank-you\/","title":{"rendered":"On-Demand | S.E.C.U.R.E.\u2122 Framework: Strengthening Your Security Stance Using Data Protection Tools"},"content":{"rendered":"\r\n    <section class=\"hero-banner-sec fullwidth-banner center-align animate   \" id=\"common-banner master-bnr-block_f612316e88afa86f7f974de9ae00a0d7 master-banner\" >\r\n        <div class=\"hero-banner-wrapper\">\r\n                            <div class=\"hero-banner-img\">\r\n                                            <span class=\"layer\" style=\"background: linear-gradient(0deg, rgba(12, 10, 8, 0.3), rgba(12, 10, 8, 0.3)),\r\nlinear-gradient(16.43deg, rgba(40, 41, 47, 0) -54.36%, rgba(40, 41, 47, 0.65) 25%),\r\nlinear-gradient(352.89deg, rgba(40, 41, 47, 0) 64.38%, rgba(23, 24, 28, 0.3) 97.42%)\"><\/span>\r\n                                                                <img decoding=\"async\" class=\"desktop-banner\" src=\"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/08\/Hidden-Costs-of-Ingoring-Edge-Infrastructure.png\" alt=\"solution-category\" title=\"solution-category\" width=\"1440\" height=\"600\" loading=\"lazy\" \/>\r\n                                                                <img decoding=\"async\" class=\"mobile-banner\" src=\"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/08\/Hidden-Costs-of-Ingoring-Edge-Infrastructure.png\" alt=\"solution-category\" title=\"solution-category\" width=\"393\" height=\"513\" loading=\"lazy\" \/>\r\n                                    <\/div>\r\n\r\n\r\n            \r\n                            <div class=\"hero-content-outer\">\r\n                    <div class=\"container\">\r\n                        <div class=\"hero-banner-contnt\">\r\n                                                                                        <h1 > S.E.C.U.R.E.\u2122 Framework: strengthening your security stance using data protection tools<\/h1>\r\n                                                                                                                                                                            <div class=\"btn-wrap\">\r\n                                    <a href=\"https:\/\/www.youtube.com\/watch?v=f_HZoy491ZU\" class=\"primaryBtn w-23-Btn h-52-Btn\" target=_blank >Watch now                                        <span class=\"arrow\"><\/span>\r\n                                    <\/a>\r\n                                <\/div>\r\n                                                                                <\/div>\r\n                    <\/div>\r\n                <\/div>\r\n                    <\/div>\r\n    <\/section>\r\n\n\n\r\n    <section class=\"dflex-main-sec single-sec  \" style=\"background:;\">\r\n\r\n\r\n\r\n        \r\n        \r\n                <div class=\"d-flex-sec right-contnt\" data-aos=\"fade-up\" data-aos-duration=\"1000\">\r\n                    <div class=\"container\" id=\"two-col-content-image-block-block_a9167f3f3d2bb42a25e1c03f5682e56b\">\r\n                        <div class=\"d-flexaligned-wrapper\">\r\n                            <div class=\"left-sec\">\r\n                                                                    <h2>From threat to recovery: how to take control when it counts most.<\/h2>\n<p>In this second installment of OTAVA\u2019s S.E.C.U.R.E.\u2122 Framework webinar series, experts from OTAVA and partner Veeam zero in on the \u201cU\u201d for Undo\u2014focusing on how to isolate and restore critical data after a cyber-attack. The session highlighted the importance of proactive planning and business continuity, emphasizing solutions over one-size-fits-all tools. Presenters demonstrated how Veeam\u2019s backup anomaly detection, immutability features, and VMOne monitoring capabilities provide layered defenses against ransomware, data corruption, and insider threats. Attendees also learned how to configure and leverage immutable cloud storage, enforce four-eyes authorization for sensitive actions, and test recovery strategies with confidence. The session reinforced that cybersecurity is all about preparation, visibility, and working with the right partners to stay resilient in an ever-evolving threat landscape.<\/p>\n                                \r\n\r\n\r\n                                \r\n                                                                    \r\n                                <!--  -->\r\n                            <\/div>\r\n\r\n\r\n                                                                <div class=\"right-sec with-layer\" >\r\n                                        <span class=\"layer-image\"><\/span>                                        <img decoding=\"async\" src=\"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/08\/Streamlined-Secure-Migration-with-Azure.png\" alt=\"Streamlined Secure Migration with Azure\" title=\"Streamlined Secure Migration with Azure\" \/>\r\n\r\n                                    <\/div>\r\n                                                                                    <\/div>\r\n                    <\/div>\r\n                <\/div>\r\n\r\n        \r\n    <\/section>\r\n\r\n\n\n\r\n\r\n\r\n  <section class=\"govern-game-sec \" id=\"video-block-\" style=\"background-color: #11223B;\">\r\n    <div class=\"container\">\r\n      <div class=\"game-blk\">\r\n                  <h4>Ready to leverage your cloud strategy?<\/h4>\r\n                <div class=\"video-blk\">\r\n          <div class=\"video-govern-wrapper\" id=\"video-container\">\r\n            <span class=\"layer\"><\/span>\r\n            <div class='youtube_codegena' id='f_HZoy491ZU' data-params='?theme=light&#038;autoplay=1&#038;mute=1&#038;autohide=1&#038;keyboard=1&#038;modestbranding=1&#038;rel=0&#038;iv_load_policy=3&#038;enablejsapi=1' data-src='https:\/\/www.otava.com\/wp-content\/uploads\/2025\/08\/ready-to-leverage-your-cloud-strategy.jpg' style='width:993px; height:554px;' alt=\"videoblk\" title=\"videoblk\"><\/div>\r\n          <\/div>\r\n\r\n                      <div class=\"jump-blk jump-desktop-blk\">\r\n                              <h5>Jump right in<\/h5>\r\n                            <ul class=\"custom-list  video-options\">\r\n                                  <li><a href=\"javascript:void(0)\" class=\"jump-link\" data-video=\"f_HZoy491ZU\" data-start=\"52\" data-time=\"0:52\">Introduction to the Secure Framework and Focus on &#8220;Undo&#8221;<\/a><\/li>\r\n                                  <li><a href=\"javascript:void(0)\" class=\"jump-link\" data-video=\"f_HZoy491ZU\" data-start=\"304\" data-time=\"5:04\">Business Continuity Planning &#038; Partnering with Veeam<\/a><\/li>\r\n                                  <li><a href=\"javascript:void(0)\" class=\"jump-link\" data-video=\"f_HZoy491ZU\" data-start=\"422\" data-time=\"6:62\">Backup Data Anomaly Scanning and Real-Time Alerts<\/a><\/li>\r\n                                  <li><a href=\"javascript:void(0)\" class=\"jump-link\" data-video=\"f_HZoy491ZU\" data-start=\"620\" data-time=\"10:20\">Immutable Backups and Secure Restore Processes<\/a><\/li>\r\n                                  <li><a href=\"javascript:void(0)\" class=\"jump-link\" data-video=\"f_HZoy491ZU\" data-start=\"1019\" data-time=\"16:59\">Using Veeam ONE (VM1) for Monitoring, Threat Detection &#038; Reporting<\/a><\/li>\r\n                                  <li><a href=\"javascript:void(0)\" class=\"jump-link\" data-video=\"f_HZoy491ZU\" data-start=\"1864\" data-time=\"31:04\">Testing, Validation, and Post-Deployment Support<\/a><\/li>\r\n                \r\n              <\/ul>\r\n\r\n            <\/div>\r\n            <div class=\"jump-blk jump-mobile-blk\">\r\n              <!-- SELECT for mobile -->\r\n              <select class=\"video-select jump-select select2-video\">\r\n                <option value=\"\">&#8212; Select a Topic &#8212;<\/option>\r\n                                  <option data-video=\"f_HZoy491ZU\" data-start=\"52\">Introduction to the Secure Framework and Focus on &#8220;Undo&#8221;<\/option>\r\n                                  <option data-video=\"f_HZoy491ZU\" data-start=\"304\">Business Continuity Planning &#038; Partnering with Veeam<\/option>\r\n                                  <option data-video=\"f_HZoy491ZU\" data-start=\"422\">Backup Data Anomaly Scanning and Real-Time Alerts<\/option>\r\n                                  <option data-video=\"f_HZoy491ZU\" data-start=\"620\">Immutable Backups and Secure Restore Processes<\/option>\r\n                                  <option data-video=\"f_HZoy491ZU\" data-start=\"1019\">Using Veeam ONE (VM1) for Monitoring, Threat Detection &#038; Reporting<\/option>\r\n                                  <option data-video=\"f_HZoy491ZU\" data-start=\"1864\">Testing, Validation, and Post-Deployment Support<\/option>\r\n                \r\n              <\/select>\r\n            <\/div>\r\n          \r\n        <\/div>\r\n\r\n      <\/div>\r\n    <\/div>\r\n  <\/section>\r\n\r\n\r\n\r\n\r\n\r\n","protected":false},"excerpt":{"rendered":"<p>OTAVA and Veeam join forces to discuss potential strategies &#038; tools around isolating and restoring data to improve overall security posture using OTAVA&#8217;s S.E.C.U.R.E.\u2122 Framework.<\/p>\n","protected":false},"featured_media":21920,"parent":0,"menu_order":0,"template":"","categories":[],"class_list":["post-21707","webinars","type-webinars","status-publish","has-post-thumbnail","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>S.E.C.U.R.E.\u2122 Framework: Strengthening Your Security Stance Using Data Protection Tools | OTAVA<\/title>\n<meta name=\"description\" content=\"OTAVA and Veeam join forces to discuss potential strategies &amp; tools around isolating and restoring data to improve overall security posture using OTAVA&#039;s S.E.C.U.R.E.\u2122 Framework.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.otava.com\/webinars\/secure-framework-undo-thank-you\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"On-Demand | S.E.C.U.R.E.\u2122 Framework: Strengthening Your Security Stance Using Data Protection Tools\" \/>\n<meta property=\"og:description\" content=\"OTAVA and Veeam join forces to discuss potential strategies &amp; tools around isolating and restoring data to improve overall security posture using OTAVA&#039;s S.E.C.U.R.E.\u2122 Framework.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.otava.com\/webinars\/secure-framework-undo-thank-you\/\" \/>\n<meta property=\"og:site_name\" content=\"OTAVA\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-11T18:34:25+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/08\/Hidden-Costs-of-Ingoring-Edge-Infrastructure.png\" \/>\n\t<meta property=\"og:image:width\" content=\"798\" \/>\n\t<meta property=\"og:image:height\" content=\"300\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.otava.com\/webinars\/secure-framework-undo-thank-you\/\",\"url\":\"https:\/\/www.otava.com\/webinars\/secure-framework-undo-thank-you\/\",\"name\":\"S.E.C.U.R.E.\u2122 Framework: Strengthening Your Security Stance Using Data Protection Tools | OTAVA\",\"isPartOf\":{\"@id\":\"https:\/\/www.otava.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.otava.com\/webinars\/secure-framework-undo-thank-you\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.otava.com\/webinars\/secure-framework-undo-thank-you\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/08\/Hidden-Costs-of-Ingoring-Edge-Infrastructure.png\",\"datePublished\":\"2025-08-11T18:31:26+00:00\",\"dateModified\":\"2025-08-11T18:34:25+00:00\",\"description\":\"OTAVA and Veeam join forces to discuss potential strategies & tools around isolating and restoring data to improve overall security posture using OTAVA's S.E.C.U.R.E.\u2122 Framework.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.otava.com\/webinars\/secure-framework-undo-thank-you\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.otava.com\/webinars\/secure-framework-undo-thank-you\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.otava.com\/webinars\/secure-framework-undo-thank-you\/#primaryimage\",\"url\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/08\/Hidden-Costs-of-Ingoring-Edge-Infrastructure.png\",\"contentUrl\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/08\/Hidden-Costs-of-Ingoring-Edge-Infrastructure.png\",\"width\":798,\"height\":300},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.otava.com\/webinars\/secure-framework-undo-thank-you\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.otava.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"On-Demand | S.E.C.U.R.E.\u2122 Framework: Strengthening Your Security Stance Using Data Protection Tools\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.otava.com\/#website\",\"url\":\"https:\/\/www.otava.com\/\",\"name\":\"OTAVA\u00ae\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.otava.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.otava.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.otava.com\/#organization\",\"name\":\"OTAVA\u00ae\",\"url\":\"https:\/\/www.otava.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg\",\"contentUrl\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg\",\"caption\":\"OTAVA\u00ae\"},\"image\":{\"@id\":\"https:\/\/www.otava.com\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"S.E.C.U.R.E.\u2122 Framework: Strengthening Your Security Stance Using Data Protection Tools | OTAVA","description":"OTAVA and Veeam join forces to discuss potential strategies & tools around isolating and restoring data to improve overall security posture using OTAVA's S.E.C.U.R.E.\u2122 Framework.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.otava.com\/webinars\/secure-framework-undo-thank-you\/","og_locale":"en_US","og_type":"article","og_title":"On-Demand | S.E.C.U.R.E.\u2122 Framework: Strengthening Your Security Stance Using Data Protection Tools","og_description":"OTAVA and Veeam join forces to discuss potential strategies & tools around isolating and restoring data to improve overall security posture using OTAVA's S.E.C.U.R.E.\u2122 Framework.","og_url":"https:\/\/www.otava.com\/webinars\/secure-framework-undo-thank-you\/","og_site_name":"OTAVA","article_modified_time":"2025-08-11T18:34:25+00:00","og_image":[{"width":798,"height":300,"url":"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/08\/Hidden-Costs-of-Ingoring-Edge-Infrastructure.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.otava.com\/webinars\/secure-framework-undo-thank-you\/","url":"https:\/\/www.otava.com\/webinars\/secure-framework-undo-thank-you\/","name":"S.E.C.U.R.E.\u2122 Framework: Strengthening Your Security Stance Using Data Protection Tools | OTAVA","isPartOf":{"@id":"https:\/\/www.otava.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.otava.com\/webinars\/secure-framework-undo-thank-you\/#primaryimage"},"image":{"@id":"https:\/\/www.otava.com\/webinars\/secure-framework-undo-thank-you\/#primaryimage"},"thumbnailUrl":"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/08\/Hidden-Costs-of-Ingoring-Edge-Infrastructure.png","datePublished":"2025-08-11T18:31:26+00:00","dateModified":"2025-08-11T18:34:25+00:00","description":"OTAVA and Veeam join forces to discuss potential strategies & tools around isolating and restoring data to improve overall security posture using OTAVA's S.E.C.U.R.E.\u2122 Framework.","breadcrumb":{"@id":"https:\/\/www.otava.com\/webinars\/secure-framework-undo-thank-you\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.otava.com\/webinars\/secure-framework-undo-thank-you\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.otava.com\/webinars\/secure-framework-undo-thank-you\/#primaryimage","url":"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/08\/Hidden-Costs-of-Ingoring-Edge-Infrastructure.png","contentUrl":"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/08\/Hidden-Costs-of-Ingoring-Edge-Infrastructure.png","width":798,"height":300},{"@type":"BreadcrumbList","@id":"https:\/\/www.otava.com\/webinars\/secure-framework-undo-thank-you\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.otava.com\/"},{"@type":"ListItem","position":2,"name":"On-Demand | S.E.C.U.R.E.\u2122 Framework: Strengthening Your Security Stance Using Data Protection Tools"}]},{"@type":"WebSite","@id":"https:\/\/www.otava.com\/#website","url":"https:\/\/www.otava.com\/","name":"OTAVA\u00ae","description":"","publisher":{"@id":"https:\/\/www.otava.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.otava.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.otava.com\/#organization","name":"OTAVA\u00ae","url":"https:\/\/www.otava.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.otava.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg","contentUrl":"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg","caption":"OTAVA\u00ae"},"image":{"@id":"https:\/\/www.otava.com\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/webinars\/21707","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/webinars"}],"about":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/types\/webinars"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/media\/21920"}],"wp:attachment":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/media?parent=21707"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/categories?post=21707"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}