Veeam Blog
Filters (Results: 1161)
Results: 1161
Filters (Results: 1161)
  • Virtual (0)
  • Cloud (0)
  • Physical (0)
  • Applications (0)
  • Storage Integrations (0)
  • Data Security and Compliance (0)
Stay up to date on the latest tips and news
By subscribing, you are agreeing to have your personal information managed in accordance with the terms of Veeam’s Privacy Policy
You're all set!
Watch your inbox for our weekly blog updates.

#EmpowHerVMCE a Step in the Right Direction for Inclusion 

Technology and technology-related jobs are growing exponentially but are lacking diversity, which is what helps innovation to flourish. According to Gartner, half of the global workforce is represented by women, however, women only make up 26% of people who work in IT. What is more staggering is that this percentage is lower than the original study that was done in 2018, where we saw female representation at 31%. Many studies that have tried investigating why women leave this profession showed there is no single reason but a combination of them that cultivate the decline of women in this line of work. Read more

6 Best Practices for Kubernetes Disaster Recovery

Kubernetes adoption is accelerating as businesses become familiar with its many benefits. The platform offers portability and scalability, cost efficiency and productivity gains, which is why more than 5.6 billion developers use it today. Unfortunately, cyber-attacks and the potential for downtime are very real risks for cloud native environments, so backup and disaster recovery (DR) are critical components of any Kubernetes environment. This is especially true as the number of stateful applications such as databases are being deployed in Kubernetes.  Read more
Michael Cade
Michael Cade

Senior Technologist, Product Strategy

Guide to Identity and Access Management (IAM)

Adopting Identity and Access Management (IAM) best practices is an important part of proactive defense against ransomware and other cyber threats, allowing you to quickly and effectively control – and limit – who has access to the files and data within your company. Identity and Access Management focuses on verifying user identities, computers, Internet of Things (IoTs), and other devices that want or need to be able to access data, information, and systems. Once verification is complete, IAM only grants access to resources the user (or device) needs to perform their tasks and rejects unauthorized or unrecognized requests. IAM also is helpful for regulatory compliance for standards like GDPR and HIPPA and can be an essential part of digital transformation ... Read more
Jackie Ostlie
Jackie Ostlie

Sr. Product Marketing Manager

Microsoft 365 Native Security: Unlocking Compliance and Monitoring Features

No business is exempt from meeting some kind of compliance or governing regulation. These controls are put in place (generally speaking) to help ensure trust and consistency when dealing with goods and services. When it comes to “as a Service” offerings, these regulations can enter grey areas and offer misconceptions of who is responsible — and at fault — if there is a violation. Read more
Karinne Bessette
Karinne Bessette

Technologist, Product Strategy

SaaS Backup Guide: Empowering Resellers

The surge in Software-as-a-Service (SaaS) applications, in an era where data is the lifeblood of business, has been nothing short of revolutionary. The move to cloud and hybrid-cloud business models continues to exponentiate, with a 17% increase in enterprise SaaS spending from 2022 to 2023, and with cloud investment rising even faster with a 23% increase. This remarkable growth underscores a pivotal shift in how companies operate and manage their digital assets. With more data stored and processed in the cloud, the importance of robust, reliable SaaS backup solutions becomes increasingly paramount — which, in this domain, reveals potential growth that is as exciting as it is immense. Read more

Developing a Passion for Data Protection: My Journey to Delivering Radical Resilience for Dedalus

Many of us rely on data more than we know. Beyond the IT applications we may use at work, there’s the holiday snaps we share, the news we read each morning, the online orders we place. We often take it for granted that data will be available as and when we need it. But of course, especially at enterprise scale, this is only possible with proactive data protection. Here’s the story of how I recognized the importance of protecting data and became a champion of radical resilience. Read more
Thorsten Schwarz
Thorsten Schwarz

Technical Competence & Solution Architect Backup at Dedalus

The Comprehensive Guide to Salesforce Data Retention Policies

In the digital age, data is often considered the lifeblood of a business. It informs decisions, drives strategies, and can be the difference between success and failure. However, with great power comes great responsibility. The responsibility of managing this data is not just a technical requirement but a legal and ethical one. This is where the concept of data retention comes into play, especially for businesses leveraging Salesforce, a leading customer relationship management (CRM) platform. Read more
Alison Connor
Alison Connor

Senior Product Marketing Manager