Veeam Blog
Filters (Results: 1624)
Results: 1624
Filters (Results: 1624)
  • Business Types (1)
Stay up to date on the latest tips and news
By subscribing, you are agreeing to have your personal information managed in accordance with the terms of Veeam’s Privacy Policy
You're all set!
Watch your inbox for our weekly blog updates.
OK

Winning under pressure: What the World Cup can teach every team about resilience

Markets shift, incidents happen, and the scoreboard is always on. The best teams don’t “rise to the occasion”, they fall to the level of their preparation. Whether you’re on the pitch or in the boardroom, resilience is less about being the hero and more about the habits you build before game day. In our recent webinar, Veeam SVP Shiva Pillay and Fox Sports Studio Analyst and former World Cup athlete, Alexi Lalas, shared insights on how to win under pressure, from the elite competition of the World Cup to mission-critical IT. In the sections ahead, we’ll pull a few World Cup-grade lessons and turn them into practical ways any organization can build teams that thrive under pressure.  Read more
Emily Real
Emily Real

Content Strategy Specialist

Looking Ahead: How Veeam is Preparing for the Quantum Future

If you work in cybersecurity, you know there’s never a dull moment. Every year brings new threats, new technologies, and yes, new acronyms. But few topics are as buzzy or as potentially game changing as quantum computing. It’s not just hype: quantum computers will eventually be powerful enough to break some of the encryption we rely on today. That’s why it’s important for Veeam to share how we are preparing for what’s next. Clarity on the approach helps customers, partners, and employees align timelines, integration points, and the practical steps that make the transition safe and predictable.  Read more
Gil Vega
Gil Vega

Chief Information Security Officer

Scattered Spider and the Rise of Identity-Led Extortion 

Many organizations still understand cyber extortion primarily as a malware problem. Ransomware encrypts files, systems go offline, and a ransom demand forces a crisis response. That sequence still exists, but it does not fully explain many of the highest-impact incidents of 2025. Drawing on hundreds of engagements, Coveware by Veeam observed that initial access and attacker leverage increasingly shift toward people, process, and identity, with targeted social engineering emerging as a defining entry pattern. In many of these cases, the intrusion began well before ransomware entered the picture, and no threat actor group illustrates that shift more clearly than Scattered Spider.  Read more
Raymond Umerley
Raymond Umerley

Field CISO

Data Trust and Resilience Report 2026

Digital transformation, cloud adoption, and AI have increased the value of enterprise data and expanded the attack surface around it. Data moves across clouds, applications, APIs, models, and automated systems faster than most organizations can track.  Read more
Emilee Tellez
Emilee Tellez

Field CTO, Veeam OR Director of Product Strategy

Command the Expand: Driving More Value with Veeam Data Cloud

Welcome back to our Command the Expand series! In this second installment, we’ll explore how Veeam Data Cloud unlocks new cross-sell opportunities to drive customer value and accelerate partner growth. To learn more about Command the Expand, what it is, and why partners should lean into it, read this blog post. Read more
Michael Loos
Michael Loos

Principal Global Partner Marketing

Veeam Ransomware Detection Service: AI That Proactively Detects Attacks

Ransomware attacks in 2024–2025 have become far more deliberate. Attackers often spend time stealing credentials, moving laterally, and exfiltrating data before triggering encryption. When the payload finally runs, many variants use intermittent or selective encryption, encrypting only portions of files or skipping large data segments, to disguise activity and accelerate impact. Because of this, detections that rely solely on sudden resource spikes can miss early warning signs, leaving organizations unaware until recovery becomes impossible. Read more
Zack Rossman
Zack Rossman

Tech Lead, VDC AI & Security

Payam Kavousi
Payam Kavousi

Senior Software Engineer

7 Reasons to Move to Veeam Data Cloud for Microsoft 365

If you’re running Veeam Backup for Microsoft 365 today, you’ve already made the most important decision in SaaS protection: you built independent backups because you know “cloud” doesn’t automatically mean “recoverable”. What’s changed is the pressure on recovery itself. As Microsoft 365 environments expand and identity-driven incidents demand faster response at larger scale, the day-to-day overhead of self-managed backup grows alongside the consequences of falling behind.

Veeam Data Cloud for Microsoft 365 keeps the core principles you rely on, including independent copies, retention control, and granular recovery, while shifting the infrastructure, storage, and ongoing maintenance to a managed service run by Veeam. The result is less time babysitting backup and more confidence ... Read more

Ian Findling
Ian Findling

Sr. Content Strategy Specialist

Customers spoke, and Veeam was named a Gartner® Peer Insights™ Customers’ Choice for Backup and Data Protection Platforms

When you’re choosing a backup and data protection platform, you’re not just buying software. You’re choosing peace of mind knowing your company’s data is protected, and you’re setting the standard for what happens next: How confidently your team responds when an incident hits, how quickly you can restore, and how smoothly you keep moving afterward. Read more