Maximum Ransomware Protection for Veeam®
Only Blocky Stops Ransomware attacks without requiring
extra servers, specialized storage, or Linux.
- No additional servers or specialized storage
Optimize Veeam TCO
- Runs on the Veeam Windows servers
- Easy deployment across multiple sites
Make Veeam® Immutable in 20 minute.
Blocky transforms the Veeam® Windows volumes into an immutable, zero-trust repository in 20 minutes.
Join the team, become a Blocky Partner
“Blocky is the perfect product to protect the Veeam repository from ransomware. Quick to install, inexpensive, and extremely effective.”
Protect Veeam® backups from ransomware attacks
- no Linux or additional hardware required.
Blocky is the only solution to harden Veeam® Windows repository without adding extra servers, specialized storage, or requiring Linux. Blocky installs on the Windows server to harden the NTFS and ReFS volumes. Blocky instantly transforms Veeam® into a hardened, zero-trust environment. The Veeam® repository becomes an immutable, WORM-only volume, and only trusted Veeam processes can delete, encrypt, or modify backup data. Ransomware (malware) is blocked.
Blocky 30-day free trial
- No need for Linux or additional hardware
- Tamperproof Deactivation Protection
- Active intrusion detection and event management
- Deploys in minutes
Key facts and features
85% of ransomware attacks target Windows®
Blocky turns the Windows NTFS/ReFS volumes(s) into an immutable, protected repository.
Rapid attack recovery
Blocky protects your local backup volumes to ensure the fastest possible recovery time.
Can you afford a ransomware attack?
In 2019, a ransomware attack happened every 11 seconds, the average cost was $150,000.
Have questions? We’re here to help!
You need Blocky to stops ransomware attacks. Add Blocky to your Veeam® for maximum protection of your backup data against malware and ransomware attacks. Blocky runs on the Windows VBS and hardens the Veeam® Backup Repository (VBR) without adding Linux or additional servers.
No, Blocky does not require Linux. Blocky runs on the Veeam® Windows server.
No! Blocky runs on the Veeam® Windows server.
Blocky is the only ransomware protection that runs on the Veeam® Windows server. Blocky transforms the Veeam® Windows repository into a WORM-only volume, and only trusted Veeam® processes can delete, encrypt, or modify backup data. Ransomware (malware) is blocked. Blocky automatically creates a fingerprint for each trusted Veeam process. Each write/delete process is verified to enforce that only Veeam® has full access to the critical backup data and to prevent corruption of backup data due to malware.
Blocky protects the ReFS and NTFS volumes on the Veeam® Backup Repository. Blocky can protect one or more on locations.
In the event of a malware attack, the backup will remain intact and the infected servers and data can be restored quickly.
The files from other backups, such as Veeam Backup Copy Jobs and Veeam Scale-Out Repositories, can also be protected with Blocky.
Blocky protects Windows NTFS or ReFS volumes that appear with a drive letter in the Windows Device Manager.
Network-attached storage (NAS devices) have their own security environment and, unfortunately, cannot be protected via Blocky.
Blocky is compatible with all current Veeam versions.
Blocky supports Windows Server 2012, 2016, 2019, and 2022.
Please note that only Windows Server operating systems are supported, and, for example, the protection function does not work under Windows 10.
Blocky for Veeam also securely protects the Windows volumes of the Veeam v12 repositories from encryption. When upgrading Veeam from a previous version, e.g. v9, v10 or v11, please carry out the following steps for Blocky:
- Temporarily deactivate Blocky Volume Protection before the Veeam update
- Activate the Blocky Protection again after the Veeam update
- Update the “Trusted Applications”:
- Update of the fingerprints of the existing whitelist entries (right mouse button – update)
- Add the application C: \ Windows \ Veeam \ Backup \ VeeamDeploymentSvc.exe to the Trusted Applications (add automatically or manually via “Whitelisting”)
Yes, these volumes must not be used by other applications, for example, as a cache, dump, or similar. This use is theoretically possible, but the function of the other applications cannot be guaranteed since the blocky whitelisting may not identify all DLLs belonging to the application and provide them with a fingerprint.
Learn more about us
Blocky for Veeam® was developed by GRAU DATA, a leader in data protection software for over 20- years.
The latest news from our blog!
Ransomware continues to evolve and wreak havoc. The question that emerges is, why are companies not taking steps to strengthen their Veeam® repositories against ransomware?
Blocky for Veeam® – the ultimate protection against ransomware attacks Ransomware attacks have become a prevalent and alarming threat to organizations worldwide. In the past