Veeam Blog
Filters (Results: 1219)
Results: 1219
Filters (Results: 1219)
  • Virtual (0)
  • Cloud (0)
  • Physical (0)
  • Applications (0)
  • Storage Integrations (0)
  • Data Security and Compliance (0)
Stay up to date on the latest tips and news
By subscribing, you are agreeing to have your personal information managed in accordance with the terms of Veeam’s Privacy Policy
You're all set!
Watch your inbox for our weekly blog updates.
OK

Understanding Hybrid Cloud Management

Hybrid cloud management involves a mixed computing environment, comprising a mixture of public clouds and private clouds or on-premises infrastructure. Many organizations use a hybrid cloud architecture because it allows them to spread workloads over multiple data centers and cloud providers to extend their capabilities while retaining existing hardware and services. Read more
Sam Nicholls
Sam Nicholls

Principal, Product Marketing

AWS Security Best Practices: A Comprehensive Guide

Securing your cloud infrastructure is of utmost importance to protect your data and ensure the integrity and availability of your AWS resources. In this comprehensive guide, we will explore AWS security best practices to help you fortify your cloud environment. By implementing these practices, you can enhance the overall security posture of your AWS infrastructure and minimize the risk of security breaches. Read more
AWS
Julia Furst Morgado
Julia Furst Morgado

Product Strategy Technology

Roy Adiel
Roy Adiel

SharePoint Backup: Methods and Best Practices

SharePoint's native integration with Microsoft 365 makes it a popular tool for collaboration and content sharing. Organizations often find themselves storing, organizing, and sharing significant amounts of data on SharePoint Online or an on-premises SharePoint server, making it crucial to regularly back up the platform. Read more
Edward Watson
Edward Watson

Senior Manager, Product Marketing

Comprehensive Overview of Google Cloud Security

Integrating Google Cloud security measures is crucial to enhancing the security of digital assets in the cloud. By leveraging Google Cloud's security infrastructure, businesses can ensure that their sensitive data, trade secrets, personal information, intellectual property, and financial data is well-protected. Implementing proper access controls, encryption protocols, and utilizing monitoring capabilities offered by Google Cloud can significantly reduce the risk of unauthorized access and potential data breaches. Read more
Cody Ault
Cody Ault

Staff Solutions Architect, Cloud - Product Management, Alliances

Highlight Threats and Reduce Risk With Veeam Threat Center

Veeam Data Platform is continuously evolving to provide users with the tools they need for ultimate data protection and resilience. It provides a holistic solution for data protection with monitoring and orchestration capabilities that help ensure compliance and cyber resilience. Read more
Kirsten Stoner
Kirsten Stoner

Technologist, Product Strategy

Guide to Google Cloud Disaster Recovery

Modern companies rely on their ability to leverage their data and applications to function in almost every aspect of their business, whether it’s their website used for e-commerce, inventory databases, and industrial controls for manufacturers, sales and customer relation management systems, medical records, or payment systems. Without these capabilities, hospitals, utility companies, and emergency services can’t function and provide critical services. Companies could be unable to serve customers, take new orders, or manufacture products, causing loss of revenue and failing to meet obligations or even face regulatory penalties.   Read more
Cody Ault
Cody Ault

Staff Solutions Architect, Cloud - Product Management, Alliances