Skip to content

How ESM Transforms IT Departments into Service-Centric Organizations

 

How ESM Transforms IT Departments into Service-Centric Organizations

With enterprise service management (ESM), you can digitize your internal processes, streamline incoming request management, automate tasks, relieve pressure on your service desk, and perform lengthy, low-value-added processes efficiently while improving the user experience.

In essence, by adopting ESM tools, you apply IT service management (ITSM) best practices to your entire organization, not just the IT department.

On the other hand, any company that wants to remain competitive today can do nothing but commit itself to increasing the quality of its services, both internal (e.g., the activities of employees) and external (the end customer).

This commitment requires a transformation of IT departments, which must emerge from traditional isolation to become integrated and service-oriented organizations.

Enterprise service management is a crucial enabler of this transformation.


How IT Departments Are Changing: From Cost Centers to Strategic Partners

The need to integrate digital tools into every part of the business demonstrates that the isolation we have mentioned is an inefficient and uneconomical strategy.

Today, IT departments can achieve business results and generate value and can no longer be considered mere technical support functions.

Traditional IT departments focus on infrastructure management, system maintenance, and network security. They are reactive—responding to issues as they arise—and have limited interaction with other business units as they operate in silos. Their perception of being cost centers rather than strategic partners limits their ability to influence broader business goals.

Therefore, the traditional approach produces inefficiencies: isolated systems and processes cause delays and prevent the provision of consistent services.

The choice to equip oneself with ESM solutions helps to overcome the role typically assigned to IT departments, moving toward the adoption of a holistic approach that aligns with the broader organizational strategy.


What Does Service-Centric Mean?

By now, we should have realized that an organization’s true digital transformation is not just about expanding ITSM best practices.

For transformation to happen, processes must be standardized and unified, and services provided to users must be interconnected. Old ITSM tools are not suited to such flexible and customer-centric deployments; they are expensive and complex to extend to the rest of the company.

The development of more agile cloud-based tools is changing things for the better. Modern ESM software has become much faster to deploy, manage, and maintain. This means that non-IT functions are increasingly able to easily administer their own services.

The essence of a service-centric organization lies in the possibility of the different departments to exploit their specific objectives through collaboration with all other company functions, thanks to advanced ESM systems and ITSM best practices.


Key Components of Enterprise Service Management

ESM includes multiple key components: service catalogs, self-service portals, automated workflows, integrated reporting and analytics, and tools for incidentproblem, and change management.

These components help standardize service delivery across the organization, break down silos, and foster a more collaborative environment. They enable consistent delivery, regardless of the department or service being offered. Through automation and self-service capabilities, they reduce manual workloads and accelerate response times.

Finally, specific features allow for improved collaboration and communication between departments.


A Short Guide to ESM Implementation

Implementing ESM is a complex process. The following are the basic steps:

  1. The first step consists of a complete assessment of current IT capabilities—maturity of existing ITSM practices, level of automation in place, and general alignment of IT services with business objectives. Part of this initial phase also involves identifying weaknesses (areas where current services are lacking) and strengths. A successful ESM strategy must start with clear and aligned objectives and goals in line with the organization’s overall strategy.
  2. In the second step, a roadmap is developed to establish the necessary steps for implementing ESM, from identifying the scope of distribution of the ESM software to selecting the most appropriate tools and technologies up to defining the timing.
  3. The deployment of ESM solutions must be carefully planned and executed. At this stage, the infrastructure is set up, systems are configured, and stakeholders are adequately trained.

Best Practices for Successful Deployment

ESM implementation can only be successful if done correctly, following a methodical and thorough approach. Here are some tips:

  • Gain top management buy-in. Leadership support is an important signal to drive ESM adoption throughout the organization.
  • Set specific goals. Having clear, realistic goals you expect to achieve with ESM helps you measure your progress objectively.
  • Involve stakeholders. During the planning and implementation phases, representatives from different departments and teams should be involved to ensure a complete view of the entire adoption process.
  • Communicate effectively. Explaining the benefits of the change produced by ESM and promptly responding to doubts or correcting inaccurate beliefs helps to defuse resistance.
  • Opt for a phased approach. Implementing ESM so that each phase builds on the previous one helps manage complexity and minimize disruptions, leading to a smoother transition.

Benefits of ESM for IT Departments from a Customer-Centric Perspective

It is clear that ESM plays a fundamental role in enriching IT departments’ performance and contributes to their transformation into service-focused and fully customer-centric organizations.

Through process automation and standardization, ESM optimizes service delivery, enhances IT staff capabilities, and fosters a more efficient and customer-centric approach. The benefits are numerous; let’s explore them one by one.

  • Improved service delivery. A structured approach to service management ensures consistent and efficient service delivery, meeting the needs of internal and external users.
  • Improved user experience. By focusing on the user experience, ESM helps create more intuitive and user-friendly service interactions. Self-service portals and automated workflows enable users to access services quickly, easily, independently, and with greater satisfaction.
  • Reduced response times and downtime. Automation and streamlined workflows significantly reduce response times and downtime. This improves service reliability and allows staff, not just IT, to focus on more strategic activities.
  • Increased efficiency and productivity. Standardized processes and improved workflows enable IT departments to deliver service faster and reduce time spent on manual tasks. Eliminating redundant processes and optimizing resource allocation increases efficiency and productivity across the organization.
  • Cost savings. ESM helps save costs by reducing the need for IT departments to intervene manually. By automating routine tasks, organizations can allocate resources more effectively, resulting in significant cost reductions.
  • Empowered IT staff. ESM provides IT staff with ongoing training opportunities. By exposing them to a broader range of services and processes, ESM helps IT professionals develop a more comprehensive understanding of the business.
  • A service-oriented mindset. IT staff is encouraged to think beyond technical support and consider the overall user experience. This shift in perspective is critical to providing high-quality, truly customer-centric services.

ESM and IT Departments: New Scenarios

ESM adoption can present several challenges, including resistance to change, poor buy-in, and problems integrating with existing systems. Overcoming these challenges requires strong leadership, clear communication, and a well-defined implementation plan.

Emerging technologies, particularly artificial intelligence (AI) and automation, are largely driving the transformation of IT departments into service-centric and customer-centric organizations.

Adopting AI in ESM scenarios streamlines and facilitates service delivery, allowing IT teams to focus on strategic initiatives.

In practice, by automating routine tasks, AI allows proactive problem-solving and timely delivery of personalized services, such as generating articles, analyzing financial data, and communicating formal documents.

Moving from manual processes to intelligent automation enables IT departments to provide faster, more accurate, and personalized support. As a result, IT can better align with business goals, providing tailored services that meet the specific needs of different departments, thereby improving the overall user experience.

This focus on service quality and customer solutions is the essence of a service-centric organization.


Conclusion

As ESM continues to evolve, IT departments are transforming from support functions to strategic partners and service-centric organizations.

Enterprise service management (ESM) is a powerful tool that can make this transformation successful. By extending service management principles across the enterprise, ESM improves process efficiency and user experience while empowering IT staff.


FAQs

What does enterprise service management (ESM) do?

ESM applies IT service management best practices across the organization, helping IT departments become service-centric organizations focused on efficiency and user satisfaction.

What are the benefits of adopting ESM?

ESM improves service delivery, reduces costs, and increases productivity, transforming IT departments into strategic, service-centric partners focused on improving the user experience.

How does ESM support the transformation of IT departments into service-centric organizations?

ESM unifies and standardizes processes, enabling IT departments to deliver faster, more consistent services, which is critical to a service-centric, user-centric organization.

What are the main challenges in implementing ESM?

Challenges include resistance to change and integration issues. Overcoming these challenges helps IT departments evolve into service-centric organizations, improving collaboration and efficiency.

How is artificial intelligence (AI) enhancing the ESM?

AI automates routine tasks, improving service accuracy and speed. This supports the transformation of IT departments into service-centric organizations focused on personalized solutions for users.

About EasyVista  
EasyVista is a leading IT software provider delivering comprehensive IT solutions, including service management, remote support, IT monitoring, and self-healing technologies. We empower companies to embrace a customer-focused, proactive, and predictive approach to IT service, support, and operations. EasyVista is dedicated to understanding and exceeding customer expectations, ensuring seamless and superior IT experiences. Today, EasyVista supports over 3,000 companies worldwide in accelerating digital transformation, enhancing employee productivity, reducing operating costs, and boosting satisfaction for both employees and customers across various industries, including financial services, healthcare, education, and manufacturing.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

Dedicated Device Management: Everything You Need to Know

The use of mobile devices has increased dramatically in recent years and will continue to do so with the rapid growth of EMM (enterprise mobility management). Managing these devices is crucial to safeguarding data and the devices that handle critical business information and functions. UEM is the best solution for managing and securing dedicated devices.

 

What are Dedicated Devices?

Dedicated devices are company-owned devices that can be employee-facing or customer-facing. They include self-check-in systems, point-of-sale (POS) systems, digital signage, retail store billing, checkout systems, and airport ticket printing desks, to name a few. The devices fulfill a single-use case by running in kiosk mode which can be single-app or multi-app. Dedicated devices perform essential business functions and hence need to run without any interruptions.

Some common examples of customer-facing dedicated devices are ATMs for cash transactions, digital signage in hotels for advertisements, baggage check-in at airports, POS terminals, handheld devices used as barcode scanners as well as for navigation, and dedicated tablets used for educational purposes.

Some employee-facing dedicated devices are for inventory management in logistics, handheld devices used by healthcare professionals, and vehicle-mounted devices used by drivers in transportation.

However, these devices can’t run independently and are required to be managed remotely. Usually, the devices are unattended and run in dedicated kiosk mode. Communicating with these devices in the field and ensuring timely updates on these devices can be best done using a dedicated device management solution like a Unified Endpoint Management (UEM) solution.

Corporate-owned dedicated devices don’t store content and information, and it’s crucial to push updated content regularly to these devices as they perform mission-critical functions. UEM enables you to update, troubleshoot, interact, and pass commands to devices remotely. UEM also simplifies configuring devices and provisioning them, enforcing policies, and ensuring device and data security.

How Does Dedicated Device Management Work?

A dedicated computer or dedicated hardware is often locked to a single application or a set of applications to serve a specific purpose, ensuring efficiency and security. This is achieved using either single-app kiosk mode or multi-app kiosk mode, based on the use case:

  • Multi-app kiosk mode: When a device needs to run multiple applications, it operates in a multi-app kiosk mode. With the help of a kiosk launcher, admins can easily switch between apps and manage various functions. This approach is perfect for devices used in environments that demand versatility while still maintaining the dedicated purpose of the hardware.
  • Single-app kiosk mode: In this setup, the device is locked to a single application, providing IT admins extensive control over the device’s functionality. They can configure peripheral settings to ensure seamless operation. Once locked, the application launches automatically and remains on the screen, even after the device restarts or shuts down. This makes it ideal for scenarios requiring a focused, dedicated hardware solution.
Learn More: What is Kiosk Mode?
Free trial

Types of Dedicated Devices

When it comes to types of hardware devices, dedicated hardware plays a pivotal role in streamlining specific operations across various industries. These devices are categorized based on their purpose and functionality:

  1. Single-Use Hardware Devices
    These devices are designed to perform one specific task, often operating in single-app kiosk mode. Examples include:
    • Point-of-Sale (POS) Systems: Optimized for transaction processing.
    • Digital Signage Devices: Built to display content like advertisements or announcements.
    • Self-Service Kiosks: Used for ticketing, check-ins, or orders.
  2. Multi-Function Hardware Devices
    These devices run multiple applications while maintaining a dedicated purpose, utilizing multi-app kiosk mode for flexibility. Examples include:
    • Retail Tablets: Supporting inventory management, customer assistance, and payment apps.
    • Educational Tablets: Configured with a suite of learning applications for students.
    • Medical Devices: Designed for patient records, monitoring, and diagnostics.
  3. Industrial Hardware Devices
    Built for durability and reliability, these devices are essential in demanding environments, such as:
    • Barcode Scanners: Used for inventory tracking and warehouse management.
    • Fleet Management Devices: Installed in vehicles to monitor operations and logistics.
    • IoT Sensors: Designed for data collection and automation in industrial setups.

Benefits of Using Dedicated Devices

Using dedicated devices, particularly those managed with a UEM solution, brings numerous advantages for businesses.

Here are the key benefits:

Manage Content and Applications

The purpose of a dedicated device can evolve, requiring changes in the content or applications it runs. UEM software ensures smooth updates by allowing admins to silently install or uninstall apps without relying on end users. This reduces device downtime significantly. Through the UEM dashboard, admins can push apps from the Play Store or deploy enterprise apps directly from the Enterprise Store, making management efficient.

Ensure Endpoint Security

UEM solutions play a critical role in securing Android-dedicated devices and other platforms. They encrypt sensitive corporate data, preventing unauthorized access. With kiosk mode, admins gain full control over device settings, including peripherals, ensuring minimal end-user interference. Furthermore, network configurations such as Wi-Fi are managed to connect devices exclusively to corporate-approved networks. Automated OS updates ensure devices remain protected from malware and viruses.

Protect Lost or Stolen Devices

When devices are lost or stolen, UEM solutions provide critical security features like factory reset protection for Android devices. Admins can remotely lock the device, wipe sensitive data, and prevent misuse of corporate information. Location tracking and location history monitoring via the UEM dashboard ensure admins can quickly locate devices or enforce location-specific policies.

Remote Troubleshooting of Devices

Remote cast and control capabilities allow IT admins to address technical issues immediately. By casting the device screen to the UEM dashboard, admins can resolve glitches or sync files remotely, significantly reducing downtime. This feature is particularly valuable for dedicated devices operating in unattended locations, where physical access is challenging during disruptions.

G2 Review
G2 Review

Some Popular Examples of Dedicated Devices

Dedicated devices are designed to serve specific purposes, offering reliability and efficiency across various industries. Here are some dedicated devices examples that showcase their diverse applications:

  1. Point-of-Sale (POS) Terminals: Used in retail and hospitality, these devices handle transactions and ensure smooth customer checkouts.
  2. Digital Signage Systems: Display advertisements, announcements, or schedules in retail stores, airports, and public spaces.
  3. Self-Service Kiosks: Found in ticketing counters, restaurants, and banks, these kiosks simplify customer interactions and reduce wait times.
  4. Rugged Industrial Devices: Built for warehouse or field operations, these include barcode scanners and handheld terminals.
  5. Healthcare Monitoring Devices: Used in hospitals for patient monitoring, diagnosis, and medical record access.

Key Considerations When Choosing Dedicated Devices

Selecting the right dedicated device is essential for meeting business needs while ensuring reliability and security. Here are some key factors to consider:

  1. Purpose and Use Case: Clearly define the device’s role in your operations. Whether it’s for digital signage, POS, or rugged fieldwork, understanding the requirements will guide your choice.
  2. Durability and Environment Suitability: If the device will be used in challenging environments, like warehouses or outdoor locations, ensure it has a rugged design and supports extreme conditions.
  3. Management and Configuration Support: Choose devices that integrate seamlessly with a UEM solution to allow for remote management, app updates, and network configuration.
  4. Security Features: Devices must offer strong security measures, such as encryption, kiosk mode, and remote locking or wiping capabilities, especially for corporate data protection.
  5. Compatibility: Ensure the dedicated devices work with your existing software and infrastructure, including enterprise apps or specific operating systems like Android or iOS.

Pick Your UEM Alongside Your Dedicated Hardware

When investing in dedicated hardware, it’s crucial to pair it with a robust Unified Endpoint Management (UEM) solution. Here’s why this combination matters:

  1. Streamlined Device Management
    A UEM solution allows IT admins to manage, monitor, and secure devices remotely. It ensures that the dedicated hardware always functions optimally by pushing updates, configuring settings, and deploying apps.
  2. Enhanced Security
    Protect sensitive corporate data on your dedicated hardware through features like encryption, kiosk mode, and remote locking or wiping in case of theft or loss.
  3. Flexible Adaptation to Business Needs
    UEM lets you reconfigure devices for new tasks or applications without replacing the hardware, extending its lifespan and value.
  4. Minimized Downtime
    With remote troubleshooting and monitoring capabilities, admins can address technical issues immediately, ensuring uninterrupted device performance.

By choosing the right UEM solution alongside your dedicated hardware, you can maximize the functionality, security, and reliability of your devices, empowering your business operations.

The Final Words 

Though dedicated devices help in executing different strategies for various businesses, the security of these devices is extremely important. Scalefusion UEM stands out as a versatile solution to efficiently manage a fleet of dedicated devices from a single console, offering robust data security and seamless management capabilities.

About Scalefusion
Scalefusion’s company DNA is built on the foundation of providing world-class customer service and making endpoint management simple and effortless for businesses globally. We prioritize the needs and feedback of our customers, making sure that they are at the forefront of all decision-making processes. We are dedicated to providing comprehensive customer support services, and place emphasis on customer-centric thinking throughout the organization.

About Version 2 Digital
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

Storware Backup and Recovery 7.1全新登場

Storware Backup and Recovery 7.1 全新登場,帶來跨虛擬平台的強化還原功能、更豐富的儲存選項,及支援更多的操作系統。這一版本為公司企業提供更高的靈活性與效率,助力在多元化虛擬環境中實現數據還原與遷移。

Storware 7.1 重點新功能:

  • 跨虛擬化平台還原與遷移功能:Storware 7.1 引入了先進的跨虛擬化平台還原能力,允許在不同虛擬化平台之間進行虛擬機(VM)還原,例如 VMware vCenter / ESXi 與 OpenStack / Virtuozzo。此外,新增的 VM 對 VM(V2V)遷移功能,支援將 vSphere 虛擬機無縫遷移至 OpenStack 環境,為整合與改善多雲端基礎設施提供了便捷的解決方案。
  • 擴展的儲存支援:為滿足日益增長的數據保留與災難還原需求,Storware Backup and Recovery 7.1 現在支援 Ceph RBD 和 Nutanix Volume Groups 作為次級備份目標。此功能確保關鍵數據在多種儲存系統中安全可靠,並為儲存管理提供更高靈活性。
  • 操作系統支援更全面:Storware 7.1 將操作系統代理(OSA)功能擴展至 macOS,幫助企業在更廣泛的操作系統中實現數據保護策略的統一。此外,新版本完全支援 Canonical Ubuntu 24,進一步鞏固了其在多元化 IT 生態系統中的應用能力。
  • 更智能的備份策略配置:根據用戶意見反饋,7.1 版本新增常用路徑清單功能,幫助 IT 管理員更快速地設置備份策略。新功能還包括 Windows 和 Linux 系統的預設排除條目,大幅降低配置的複雜性。除此之外,此版本還支援 Proxmox VE 虛擬機磁碟級別設置,用戶可以更靈活地進行還原操作。
  • 支援新備份來源:Storware 7.1 現在支援 VergeOS 作為備份來源,為該 VMware 替代方案的超融合基礎設施提供全面保護。
  • 全新 Storware 備份設備:Storware 首次推出實體與虛擬兩種形式的備份設備(Backup Appliance)。這款設備集成了多功能特性,並採用基於 ZFS 的重複數據刪除技術,是全球最具靈活性的備份解決方案之一。

Storware Backup and Recovery 擁有強大的數據管理與保護能力,幫助公司企業在當前數據驅動的環境中保持穩定與安全,避免勒索軟體與其他威脅的侵襲,並促進業務的持續發展。立即免費試用,或享受 60 天免費試用期!

 

關於 Storware

Storware 是一家專注於備份軟體的企業,擁有超過十年的行業經驗。Storware 數據備份與還原解決方案適用於各種數據環境,無論是虛擬機、容器、儲存提供商、Microsoft 365 還是運行在本地或雲端的應用程式,均能提供支援。其小巧的設計使其能夠無縫整合進現有的 IT 基礎設施或企業級備份方案中,提供極為便捷的備份保護。

關於 Version 2 Digital
資安解決方案 專業代理商與領導者
台灣二版 ( Version 2 ) 是亞洲其中一間最有活力的 IT 公司,多年來深耕資訊科技領域,致力於提供與時俱進的資安解決方案 ( 如EDR、NDR、漏洞管理 ),工具型產品 ( 如遠端控制、網頁過濾 ) 及資安威脅偵測應 變服務服務 ( MDR ) 等,透過龐大銷售點、經銷商及合作伙伴,提供廣被市場讚賞的產品及客製化、在地化的專業服務。

台灣二版 ( Version 2 ) 的銷售範圍包括台灣、香港、中國內地、新加坡、澳門等地區,客戶涵 蓋各產業,包括全球 1000 大跨國企業、上市公司、公用機構、政府部門、無數成功的中小企業及來自亞 洲各城市的消費市場客戶。

Setting up StarWind Virtual SAN (VSAN) as Hardened Repository for Veeam B&R

 

Introduction

Hi, fellas. If you’re in charge of keeping your business data safe, you know that protecting it from ransomware and other threats is a top priority. One of the best ways to do this is using a 3-2-1-1 backup practice. That extra “1” in 3-2-1-1 stands for using immutable storage, such as on a Linux-based hardened repository.

In this article, I will show you how to turn your existing or aging server hardware into immutable backup storage to keep your data safe against ransomware. All you need is Veeam Backup & Replication and StarWind VSAN that will perform a role of Hardened Repository. This is a super easy and efficient way to keep your data safe, and I’ll walk you through the entire process step by step.

Why immutability?

Firstly, let’s talk about why backups have to be immutable. Essentially, it means that once a backup is made, it can’t be deleted or changed. This is important for crucial data because it means that even if a hacker gets into your system and tries to remove your backups, they won’t be able to. This is why write-once-read-many (WORM) storage media like tape libraries and optical media are commonly used for backups. However, these types of media can be a bit of a pain to manage because they need to be rotated and replaced regularly to align with retention policies.

What’s the easiest way to enable immutability? 

This is where Veeam B&R comes in – it’s an industry-standard backup solution that works with most storage media types, including physical and virtual tapes. What’s more, in Veeam B&R v11, they added support for  Hardened Backup Repositories, allowing to enable immutability for backups without using object storage or any specialized third-party solutions. You can find the deployment documentation for this on Veeam B&R KB.

Now, you could go through the process of setting up a Linux server and configuring it to work with Veeam B&R, but it’s not exactly a walk in the park. However, there’s good news – we’ve made it super simple with StarWind VSAN.Diagram: StarWind VSAN as Hardened Repository for Veeam B&R

We’ve developed a set of management tools that are pre-configured in the web console, so you can easily set up a storage server using commodity hardware. All you need to do is use a few wizards in StarWind Virtual SAN  web-console, and you’ll have a hardened repository for Veeam B&R in no time.

How to set up?

In today’s article, I won’t be covering the initial setup process. For details on configuring the StarWind Controller Virtual Machine (CVM), its networking, and storage, refer to our previous article: ‘How to Create a File Share with StarWind VSAN‘. Make sure to review it before proceeding. We’ll also post instructions for the bare-metal StarWind VSAN deployment in a separate blog post later on, so stay tuned.

Assuming you’ve completed the preliminary steps and created a storage pool, we can now move on to creating a new volume in the Virtual SAN Web UI.

Once the storage pool is created, navigate to the “Volumes” tab and click the “+” button to open the “Create volume” wizard:

“Volumes” tab | “Create volume”

Now select the storage pool that you are going to use for the new volume and click “Next”:

Create volume wizard | Select storege pool

Specify the name of the new volume and select the required size:

Create volume | Specify settings

Now select the filesystem for your volume. Select the “Backup repository” option, because it is already configured according to Veaam best practices and recommendations.

Create volume | Choose Filesystem settings

Review your settings and click “Create” to create the new volume:

Create volume | Review summary

After this, you need to add a Veeam user to the CVM to provide Veeam access to the storage. For this, in the “Volumes” tab, select your newly created backup volume and click “Manage VHR (Veeam Hardened Repository) user.

In the “Manage VHR user” pop-up window, click the “+” button:

Manage VHR user | Create Veeam user

Specify the credentials for the new user:

Create Veeam user | Specify the credentials for the new user

Select the newly created user and enable SSH access for it, and click “Save”:

Manage VHR user | Select the newly created user and enable SSH

Congrats! You have completed the StarWind VSAN configuration. You’ll need to connect the created volume to Veeam B&R as the new backup repository. To do that, open the Veeam Backup and Replication console, navigate to “Backup Infrastructure”, and select “Backup Repositories”:

Veeam Backup and Replication console | Navigate to “Backup Infrastructure”, and select “Backup Repositories”

Click “Add Repository”  and select “Direct attached storage:

Add Backup Repository | Select “Direct attached storage

Next, select “Linux (Hardened Repository)”:

Direct Attached Storage | Select “Linux (Hardened Repository)”

In the “New Backup Repository” wizard, specify the name and description for the new repository and click “Next”:

“New Backup Repository” wizard | Specify the name and description for the new repository

In the next step, click “Add New”:

New Backup Repository wizard | Add New

In the “New Linux Server” wizard, specify the IP address or the DNS name of your StarWind CVM and click “Next”:

New Linux Server wizard | Specify the IP address or the DNS

Click “Add” and specify the credentials of the VHR user account that you created in StarWind VSAN Web UI:

New Linux Server | Specify the credentials of the VHR user account

SSH Connection | Provide Credentials

Review the installed components and click “Apply”:

New Linux Server | Review the installed components

Wait until the installation is completed and then click the “Next” button:

New Linux Server | Wait until the installation is completed

Review the summary and click “Finish”:

New Linux Server | Review the summary

In the “New Backup Repository” wizard, select the newly added Repository server from the drop-down menu:

New Backup Repository wizard | Select the newly added Repository server

Now, select the path to the volume on the StarWind VSAN appliance. Also, check that the “Use fast cloning on XFS volumes” setting is enabled and specify the required retention period for immutability:

New Backup Repository | Select the path to the volume on the StarWind VSAN appliance

After that, check the Mount Server settings, where you will be doing fast restores of your backups:

New Backup Repository | Check the Mount Server settings

Check the components that will be installed and click “Apply”:

New Backup Repository | Check the components that will be installed

Wait until the process is completed and click “Next”:

New Backup Repository | Wait until the process is completed

Review the summary and click “Finish”:

New Backup Repository | Review the summary

To secure the server from potential local threats such as credentials theft, in the StarWind VSAN Web UI, navigate to the “Volumes” page, launch the “Manage VHR user” wizard, and disable SSH for the VHR user account:

Manage VHR user wizard | Disable SSH for the VHR user account

Additionally, keep in mind that this method makes it easy to set up a hardened repository and secure your backups. It’s still important to regularly test and verify your backups to ensure they are working properly and can be restored in case of an emergency. Ensure your software and hardware up to date, and to have a disaster recovery plan in place in case the worst happens.

Conclusion

To sum up, using StarWind VSAN as hardened repository for Veeam B&R is a great way to protect your business data from any threats, while also making the process of setting it up easy and straightforward. With the help of our management tools, you can have a secure and reliable backup solution up and running in no time. So, if you’re looking to upgrade your backup strategy and keep your data safe, give StarWind VSAN a try.

About StarWind

StarWind is a pioneer of hyperconvergence and storage virtualization and the only all-flash hyperconvergence vendor on the market. We provide a unique blend of simplicity, performance, and affordability, yet with the ultimate in flexibility. Our focus is to help companies create sustainable and effective IT infrastructures with minimum effort.

We believe that quality should preside over quantity when it comes to building infrastructures. Our solutions provide businesses with the ability to use only those IT resources that are truly necessary and to make the most out of them in an efficient and performant manner.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.