| | | | | Notice of our Privacy Policy | | | We believe everyone who uses Comcast Business products and services deserves a safe experience. While you're working hard to manage your business, please know that we are also working to help protect your employees' and customers' personal information, as reflected by our privacy and security practices and Privacy Center. The Privacy Center is a resource to learn about our privacy and security practices that apply to the services we provide to our Comcast Business customers. | | Each year, we are required to send our customers notice of our current Privacy Policy, which can be viewed at our Privacy Center. By continuing to use our products and services, you acknowledge you've reviewed the Privacy Policy and understand how we collect, use, and protect your information as described in that notice and in line with your chosen preferences. | | We value your business and the trust you place in us and appreciate you being a Comcast Business customer. If you have any questions, please don't hesitate to contact us – we're here to provide any answers and information you may need. | | Thank you for being a valued Comcast Business customer. | Sincerely,
Jackie Caridad
Chief Privacy and Legal Information Security Officer | | This is a service-related email. Comcast will occasionally send you service-related emails to provide you with information about your service, including information about service upgrades and new benefits. | | © 2026 Comcast. All rights reserved. | Comcast respects your privacy. For a complete description of our privacy policy, click here. | Comcast One Comcast Center 1701 JFK Blvd. Philadelphia, PA 19103-2838 Attn: Business Services | | | | | MM/ENT_EC_Notification_Privacy_Policy_EM1_19901_20260203 |
RSAC 2026 is around the corner — and we're planning our biggest year yet. | | | For starters, we're bringing together data protection, security, and resilience leaders for timely conversations on some of today's most important topics: Protecting data and AI, governing their use, and ensuring rapid recovery. If you're headed to San Francisco for RSAC in March, come join us at our booth, #S-0427 South Hall! | | | After signing up, you'll receive RSAC updates on: | | | See you in San Francisco, Team Veeam | | | | |
Josh Thoensen Campaign Manager-Hybrid Cloud • Campaign Marketing - High Volume Renewals & Customer Lifecycle Josh.Thoensen@veeam.com | | | | | | | Strengthen Your Cyber Resilience with Recon Scanner
Cyberthreats move fast, and backup environments are now a prime target. That's why Veeam built Recon Scanner into Veeam Data Platform Advanced and Premium Editions; to give you proactive protection right where you already work.
Recon Scanner continuously monitors your Veeam environment to spot suspicious activity early, often before traditional security tools can sound the alarm. Every finding is mapped to the MITRE ATT&CK framework and enriched with real‑world ransomware intelligence, so your team can get clear, actionable insights when it matters most.
With a unified Triage Inbox, simplified investigation workflows, and seamless integrations with Veeam ONE and Microsoft Sentinel, you can detect, prioritize, and respond to threats faster and with greater confidence.
Lightweight, automatic, and included at no extra cost, Recon Scanner helps you stay ahead of attackers, protect critical data, and recover quickly — because early visibility isn't optional. It's essential.
Customers with access can find the download on their My Account page. | | | | | | | | What's New at Veeam | | | | | | Identify Threats Earlier with Recon Scanner Recon Scanner, now included with Veeam Data Platform Advanced and Premium, helps identify suspicious and adversary-like behavior targeting your backup environment. New enhancements like a unified Triage Inbox, noise-reduction controls, and integrations with Veeam ONE and Microsoft Sentinel make detection and investigation faster and easier. | | | | | | | | | | | New & Need to Know | | | | | | Recon Scanner Detects Malicious Activity & Prevents Cyberattack Faced with restricted IT and security budgets, the IT team of a local municipality decided to take advantage of Recon Scanner, one of the latest Veeam Data Platform features. It proactively provides threat assessments and the fact that it was already available to them, made it very attractive to their IT team with limited defensive security tools. | | | | | | | | | | | Explore More | | | | | | Watch the new Veeam Data Platform webinar Guessing which backups are clean? The new Veeam Data Platform is designed to help with your toughest data protection challenges. So watch this webinar and hear from our experts how this release is purpose-built to protect data, recover faster, simplify operations, and help you stay resilient when facing those real-world challenges. Get confidence that your backup infrastructure remains secure with the latest release of Veeam Data Platform. | | | | | | | | | | | Learning & Support | | | | | | Protect, Prepare and Prevail from Cyberattacks with Veeam Cyber Secure Learn how Veeam Cyber Secure helps organizations protect their data, prepare for cyber incidents, and prevail when attacks happen — with expert guidance and proven best practices for cyber resilience. | | | | | | | | | | | Your Veeam Updates | | | | | | Cyber Vaults: The Key to Data Survival and Complete Recovery Backing up data is just the start—true resilience means you can recover fully, even after a disaster or cyberattack. In this new IDC spotlight, learn why offsite cyber vaults are vital for modern data protection and how Veeam Vault stands out as the best secure offsite storage for Veeam Data Platform. Discover key differences, selection tips, and more. Download the IDC spotlight now to strengthen your data resilience. | | | | | | | | | | | Experience Veeam In Action | | | | | | Veeam Security + Recon Scanner Resource Center Explore the latest Veeam Security tools and see how Recon Scanner enables proactive threat detection to help you strengthen cyber resilience. | | | | | | | | | | | Experience Veeam In Action | | | | | | Webinar: Building Data Resilience with AI Explore how AI-based security helps detect threats faster and drive resilience, compliance, and governance across your data protection strategy. | | | | | | | | | | | Pro Tips & Best Practices | | | | | | Akira Attacks in a Nutshell: Understanding and Detecting the Threat Without early detection and strong, proactive defenses, organizations risk facing crippling downtime and costly demands. However, companies that take decisive action — by hardening remote access, aggressively monitoring for credential misuse, and fortifying ESXi environments — can dramatically lower their risk profile. | | | | | | | | | | | Learn & Grow | | | | | | Top 5 TTPs Targeting Enterprise Cybersecurity Attack tactics, techniques, and procedures (TTPs) have evolved significantly, shaping the threat landscape with greater efficiency and effectiveness. These advancements have intensified enterprise cybersecurity threats, making proactive defense strategies more critical than ever. | | | | | | | | | | | Learn & Grow | | | | | | Navigating Data Sovereignty in the Cloud Era with a Resilience-Centric Approach The rules around where data lives, moves, and is accessed are shifting fast. From GDPR to NIS2, sovereignty is now central to every cloud security conversation. | | | | | | | | | | | Community News & Events | | | | | | YNCORIS utilizes Veeam recon scanner for proactive threat assessment At YNCORIS we operate in a heavily regulated chemical industry, where downtime can have a big impact on our customers revenues or costs. With Veeam recon scanner, our IT infrastructure team benefits from the early detection of threats to our physical and virtual environments, making us cyber resilient and operationally efficient. | | | | | | | | | | | Community Connect | | | | | | Hacker Thinking in Ransomware Attacks: Why Backup Infrastructure Is the Real Target Ransomware isn't just after your data anymore — it's after your backups. This blog breaks down how today's attackers think, why they're targeting backup infrastructure first, and what that means for your recovery strategy. Learn how to get inside a hacker's mindset to strengthen your defenses and keep your last line of protection truly secure. | | | | | | | | | | | | | Shape the future of Veeam | | Share your ideas, feedback and experience. Your voice drives the innovation | | | Propose an Idea Have a feature request or improvement? We're listening! | Take a Short Survey Tell us how we're doing. It takes less than a minute! | Be an Advocate Share your Veeam story or join our advocacy program! | | | | | | | | | | | |
| |