Digital Transformation Considerations

Veeam is proud to release the findings of yet another research project, the 2023 Data Protection Trends Report, which is the industry’s largest independent research on backup and data protection. This research is fully independent, representing the whole market, and not only from Veeam customers, and was conducted by a third-party research organization, with no one knowing that Veeam was involved. Read more
Jason Buffington
Jason Buffington

Vice President, Solutions Strategy

Dave Russell
Dave Russell

Vice President, Enterprise Strategy

Hybrid Infrastructure Trends from 2020 to 2025

Veeam is proud to release the findings of yet another research project, the 2023 Data Protection Trends Report, which is the industry’s largest independent research on backup and data protection. This research is fully independent and represents the whole market — not just from Veeam customers. It was conducted by a third-party research organization with no one knowing that Veeam was involved. Read more
Jason Buffington
Jason Buffington

Vice President, Solutions Strategy

Dave Russell
Dave Russell

Vice President, Enterprise Strategy

Selecting Hardware and Setting Up Environment for Veeam Hardened Repository

The Veeam Hardened Repository is Veeam’s native solution to provide trusted immutability for backups of Veeam Backup & Replication on a Linux server. By supporting generic Linux servers, Veeam ensures that customers always have a choice about their hardware without vendor lock-in. Veeam also allows customers to use their trusted Linux distribution (Ubuntu, Red Hat, SUSE) instead of being forced to use a “custom Veeam Linux”. Read more
Hannes Kasparick
Hannes Kasparick

Senior Analyst, Product Management

Announcing the Data Protection Trends Report for 2023

Veeam is proud to release the findings of yet another independent research project, the 2023 Data Protection Trends Report. For the last three years, Veeam believes that it has been breaking the record for delivering the largest research report in the history of backup and data protection. Read more
Jason Buffington
Jason Buffington

Vice President, Solutions Strategy

Dave Russell
Dave Russell

Vice President, Enterprise Strategy

Falkirk Council boosts data protection and improves cybersecurity with Veeam

“Veeam is a winner — it accelerated our Digital Transformation, played a pivotal role in our data center migration and elevated our cybersecurity operation. We couldn’t have accomplished what we accomplished without Veeam.” Read more
Murat Dilek
Murat Dilek

Network, Infrastructure and Cybersecurity Team Leader at Falkirk Council

Never waste a good crisis: How to handle a ransomware attack

At VNOG, we provide essential fire-fighting services and assistance in the event of accidents, disasters and crises to the 870,000 citizens of North and East Gelderland in the Netherlands. In this blog post, I’ll tell the story of my most memorable day as VNOG’s Chief Information Security Officer (CISO). Read more
Edwin Moraal
Edwin Moraal

Chief Information Security Officer, Veiligheidsregio Noord- en Oost-Gelderland

Managing Backups as Code – Configuring IAM roles in Veeam Backup for AWS with AWS CloudFormation and Lambda

One of the cornerstones of Amazon Web Services (AWS) best practices is using multiple accounts to manage your workloads. Dedicating accounts to specific business units or even specific applications provides numerous benefits that increase agility, improve security and streamline operations. This practice also helps operators follow the principle of least privilege, whereby only a minimal set of privileges required to perform a task are assigned to responsible users and services, and ideally, only for the time required to complete the task. Read more

Cyber Resilience with the Veeam Data Platform in 2023

The effectiveness of ransomware attacks has caused organizations to move from a threat prevention strategy to a cyber resilience strategy giving them the ability to respond to a security breach to mitigate damage while enabling data recovery to restore normal operations. This shift has caused more companies to look at backup and recovery as part of the security stack. The holistic approach to attacks acknowledges that even with best-in-class defensive tools, you won’t have 100% prevention. A cyber resilient strategy allows organizations to mitigate an attack while also protecting data integrity and enabling recovery to normal business operations. Read more
Chris Hoff
Chris Hoff

Security & Data Protection Marketing Manager