Veeam Software has launched Veeam Data Platform v12.3, introducing a suite of new features designed to bolster data protection and threat detection.

The update focuses heavily on improving identity protection and access management, most notably with support for backing up Microsoft Entra ID. This addition is a significant step, according to Krista Case, research director at The Futurum Group. “The ability to protect both Active Directory and Entra ID is critical, because identity-based attacks are massively on the rise. Hackers are choosing to log in as opposed to hacking in whenever possible,” Case explained.
In addition to Entra ID backup, v12.3 incorporates new tools for proactive threat analysis, including Recon Scanner and Veeam Threat Hunter. These tools leverage generative AI for more intelligent enterprise data protection and advanced reporting via Veeam Intelligence.
Further expanding its data portability, the platform now offers complete Nutanix AHV protection, complete with application-aware processing, in-depth alerting, and analytics for Nutanix AHV workloads. It is also fully integrated with Veeam Data Cloud Vault v2, which provides immediate access to secure, air-gapped, encrypted, and immutable cloud storage that is “predictably priced,” according to Veeam CEO Anand Eswaran.
“Security starts with identity and authentication, which is why providing backup for Microsoft Entra ID is an important addition to Veeam Data Platform v12.3. We can now protect the most used identity and access management system, and combine it with new proactive threat analysis tools that better prepare enterprises for cyber threats,” said Anand Eswaran, CEO at Veeam.

Recon Scanner provides proactive threat assessment technology, identifying adversary tactics, techniques, and procedures (TTPs) before a cyber attack. The technology is built from the patent-pending Coveware technology used to counter thousands of ransomware incidents, which Veeam acquired earlier this year.
Veeam Threat Hunter offers accelerated signature-based malware scanning, allowing organizations to identify dormant threats in their backups to ensure business continuity. Employing machine learning and heuristic analysis, Threat Hunter can identify advanced threats such as polymorphic malware. Threat signatures and ML models are updated multiple times daily to detect newly emerging threats.
Another new feature, the IoC Tools Scanner, enables organizations to receive notifications about the appearance of indicators of compromise (IoC) tools, which are commonly used by cybercriminals. This tool examines techniques related to lateral movement, exfiltration, command and control, credential access, and more on protected machines, with the promise to significantly reduce Mean Time to Detect (MTTD) threats.
While Veeam claims to be worth $15 billion following a recent investment, making it the most valuable organization in its field, the recent Cohesity/Veritas merger this week could potentially impact Veeam’s number one market share position.