Skip to content
Luca Dell'Oca Principal Cloud Architect @Veeam
Virtual To The Core Virtual To The Core

Virtualization blog, the italian way.

  • Media
  • About me
Virtual To The Core
Virtual To The Core

Virtualization blog, the italian way.

How Veeam Cloud Connect in-flight Encryption works

Luca Dell'Oca, July 23, 2015July 22, 2015

In my previous life, I worked as an IT Security consultant. Not the pony-tailed cracker/pentester you could imagine, but more focused on procedures, organizational risks, and so on. I then moved a long ago into the virtualization space, but that mindset has always stayed with me.

When I talk about security with different people, being them colleagues, customers, partners, service providers, I usually met two different kind of people.
For many, security is just a check in a feature list: “oh, you support encryption for your backups? Good”.
Then, there are security-savvy people, those who don’t accept those simple answers, and even the fact we say “we use AES-256 for our encryption” is not enough, and they want to have more and more details before accepting any solution in their environments. And in some infrastructures, a NO from the Security Team means a NO GO for any deployment.
I’m surely in the latter category, and when we at Veeam developed Cloud Connect, while discussing about the great feature in it called Cloud Gateway, I wanted to know more and more. We use a single TCP port with SSL protection for direct connections over the Internet, so which level of SSL is used? Do we fallback if a client requires a lower version? How do we prevent man-in-the-middle (MITM) attacks?

I can tell you, I stressed our developers and product managers a lot, but the outcome was a great set of informations for people like me who take security for real. After collecting these informations, I’ve developed a series of animations to better explain those concepts; so why not record a voice-over on them? The final result is this 6 minutes video, where I explain the security features of Veeam Cloud Connect communications: how we use SSL (or better said, TLS, we do not use old protocols like SSL, we say SSL because few people know the term TLS…), or how we exchange keys and avoid MITM attacks.

Enjoy the video, and let me know what do you think.

Share this:

  • Click to share on X (Opens in new window) X
  • Click to share on Facebook (Opens in new window) Facebook
  • Click to share on LinkedIn (Opens in new window) LinkedIn
  • Click to email a link to a friend (Opens in new window) Email
  • Click to share on Tumblr (Opens in new window) Tumblr
  • Click to share on Pinterest (Opens in new window) Pinterest
  • Click to share on Reddit (Opens in new window) Reddit
  • Click to share on WhatsApp (Opens in new window) WhatsApp
  • Click to share on Pocket (Opens in new window) Pocket
Tech cloudconnectveeam

Post navigation

Previous post
Next post

Search

Sponsors

Latest Posts

  • Migrate WSL (Windows Subsystem for Linux) to a new computer
  • Pass keystrokes to a pfSense virtual machine to install it automatically
  • Automatically deploy pfSense with Terraform and Ansible
  • My Automated Lab project: #6 Create a S3 Bucket with Terraform
  • My Automated Lab project: #5 Deploy a Linux vSphere VM with Terraform and custom disks
©2025 Virtual To The Core | WordPress Theme by SuperbThemes
We use cookies to ensure that we give you the best experience on our website, and to collect anonymous data regarding navigations stats using 3rd party plugins; they all adhere to the EU Privacy Laws. If you continue to use this site we will assume that you are ok with it.OkNoPrivacy Policy