First of all, did you even know that there’s a Veeam Cloud Provider program? A Veeam Cloud Provider is a type of Veeam partner that functions in a service provider model. This can exist in a number of ways for a number of different service models. For example, a hosting provider or telco using Veeam to protect hosted VMs, an Application Service Provider leveraging Veeam to protect customer data, or a Cloud Service Provider offering Veeam-powered backup and disaster recovery services, and more. In fact, there are scores of ways Veeam products can be used to protect applications and data. Here are 5 things you likely didn’t know about the Veeam Cloud Provider program:
Today we’re happy to announce general availability of Veeam Backup & Replication Add-on for Kaseya! The first release is available now for download at the Veeam website.
Veeam Backup & Replication Add-on for Kaseya is completely FREE and intended for service providers (and IT departments) who use Kaseya VSA to manage IT environments remotely and at the same time use Veeam Backup & Replication to protect vSphere and Hyper-V VMs.
Below, I’ve tried to answer the most common questions about the add-on, describe its key features and more.
I am sure that many of you by now heard or read about the Heartbleed bug that has been in the IT news for a few days now. The Heartbleed bug is a serious vulnerability in the OpenSSL cryptographic software library. This is a very popular used network software that many companies and services on the internet use for encrypting their services. Websites & online services such as Facebook, Tumblr, Google, Yahoo, Gmail, Yahoo mail, Amazon web services, GoDaddy and many more use the affected OpenSSL version and therefore are sensitive for this bug.
Luckily it seems that the bug was discovered by security teams before malicious hackers were able to exploit this but the consensus remains that you ...
When I think about NetApp, the first word that comes to my mind is Snapshot. And if you work in virtualization or storage, or both, snapshots are the foundations of many solutions we all use every day.
NetApp is no doubt one of the major players in the storage world, and one of its best and most known feature is its snapshot technology. Efficient, space saving, with basically no impact on production workloads, NetApp users have always relied on this technology to protect their data. The power of NetApp have always been in its software: the ONTAP operating system offers a full-featured storage platform, and the snapshot technology is the starting point for more advanced protection solutions like ...
If you search for IT horror stories on the internet, the majority of them will be about inadequate or missing backups.
This is quite predictable—if you forget about a WHERE statement on a SQL update, upload test data into production or unintentionally delete an entire organizational unit in Active Directory, what’s the only thing that can save your bacon? A good backup!
That’s why on March 31, Veeam is celebrating World Backup Day, the day when we recognize the importance of reliable backups.
A couple of weeks ago I wrote “3 Easy Steps to Migrate to Hyper-V 2012 R2” talking about how to migrate VM’s from Windows Server 2008 R2 to Windows Server 2012 R2. Since then I keep hearing the same question over and over again.
Question: When you migrate VMs from Hyper-V in Windows Server 2008 R2 to Hyper V in Windows Server 2012 R2 can you also automate conversion from .vhd to .vhdx? And can it be done with minimum interruption to the operation of the workload of the VM?
Our friends Aidan Finn and Didier Von Hoye are using a really cool PowerShell script to automate the entire process. The only challenge here ...
Today Veeam announces Veeam Explorer for Active Directory! Veeam Explorer for Active Directory is a valuable and innovative extension for Veeam Backup & Replication. Veeam Explorer for Active Directory will allow you to browse the backup of an NTDS.DIT database to locate containers, objects, and their attributes and then restore them to their original location in the running domain controller or to a new location.
In the good old days, like yesterday, Active Directory recovery demanded the downtime associated with restoring the VM that hosted the Active Directory Domain Controller and then using active directory restore mode to recover containers, objects, and their attributes. Unfortunately some attributes such as passwords were problematic or downright impossible to recover. With Veeam ...
It’s 10 am on a Monday morning, and I’m sitting here in the classroom at the first Veeam Certified Engineer (in short, VMCE) training in Italy; with me, there are nine other IT techies, in front of our teacher and his slide deck.
“Wait, you at the Veeam Training Course?”
I know what you are thinking here. I am a long time and heavy Veeam Backup & Replication user, my first installation was at the time of the 3.0 version, and after many blog posts and whitepapers, I ended up being hired by Veeam and appointed as one of their "Evangelists”. So, I am supposed to be the one knowing everything, and instead of listening I should go around explaining what I ...
There is one word that brings fear and exasperation to the hearts of IT Professionals everywhere. Licensing! The installation of every operating system and application comes with the required and totally ignored EULA. We all find ways not to read the EULA. A contract embedded in an installation program seems counterintuitive. Imagine how long an installation would take if you actually read the EULA. The ways and means with which licenses are issued and established in the IT world are as varied as imagination will allow. Creativity in licensing is so prevalent that there are certified licensing specialists who make their entire careers out of making licensing recommendations. Why does it have to be so hard? Finally it doesn’t! ...
I hope this never happens to you, but if you ever receive a legal discovery request, you may find this post useful. One of my IT friends shared this story of when he had to do an exchange discovery for a set of keyword combinations on historical email communications that he thought might have happened 2 years ago. This kind of discovery would be a real challenge for a lot of IT organizations.
Houston, we have a problem!
Since the company was using Exchange 2010, my IT pal googled for some advice and found an article on TechEd. The article advised him to use a Multi-Mailbox Search: http://technet.microsoft.com/en-us/library/dd335072(v=exchg.141).aspx
However, you usually don’t have an Exchange server with a ...