I’m dusting off my cowboy boots and getting ready to head down to the Lone Star State (Texas) for Cisco’s annual partner summit in a couple weeks. The Cisco Partner Summit is their premier, invite-only partner event held annually for their top partner executives. This year’s theme is “OWN IT,” and as it rapidly approaches, I thought about how Veeam and Cisco is well on their way to OWN IT and enable their customers to do the same, together.
Ransomware attacks are not a fake threat – they are real and increasing day by day. The below insights on ransomware history can help you understand the evolution of its delivery and extortion strategies and be better prepared in case you become the victim of an attack.
Ransomware, locker or crypto-malware, has been around for a long time — decades in fact. Originally, ransomware was an annoyance and a con-trick, but today’s ransomware is considerably different and presents much more of a sophisticated threat to systems and users.
It's been nearly a year since VMware released vSphere 6.5 which marked the 12th major release of VMware's hypervisor and hypervisor management product suite. And while VMware has been focusing on more recent products like vSAN and NSX, it shouldn't be forgotten that vSphere still remains at the core of the virtualization platform on top of which all other products are consumed. Veeam has a strong history of working with and supporting vSphere features, and the 6.5 release is no different.
Downtime is not an option for modern organizations that must fulfill their customers’ needs and expectations. Different types of incidents can occur and impact your business revenue or even existence. Whether it’s a ransomware attack, a power outage, flood or simply human mistakes, these events are unpredictable, and the best thing you can do is to BE PREPARED.
Preparedness means that you should have a solid business continuity and disaster recovery (BCDR) plan. One that has been tested and that can be put in motion smoothly.
Software as a Service, and especially Microsoft Office 365, has become more and more popular in today’s world. Software as a Service brings many advantages over implementing a service on premises, but also brings forth some new challenges. Here’s a good read on Office 365-related challenges.
However, the most important question you should ask yourself is: How much does my business rely on email?
Greetings from Veeam Support and welcome to the next episode of our troubleshooting series!
In this article, we will review how to resolve an issue that might be caused by a mismatch between the block size set in your Veeam tape drive properties and the one actually supported by the tape device itself. You will learn why block size can be different and how to fix it.
And even if you’ve never come across such a problem, you may also find this post useful, as under certain circumstances changing the block size can help you increase the processing rate. This is because when you have a higher block size, the drive is supposed to write data more quickly.
We are living in times when it’s hard to imagine our lives without technology. Our center of command is sitting in our pockets, and we are just a few taps away from booking a flight, checking our bank account or reading the news about our favorite football team. Our fast pace of life demands uninterrupted access to each application on any type of device from everywhere. Therefore, organizations need not only speed and versatility, they also need what we call Availability.
Greetings fellow IT professionals! After more than 20 years of TechEd in the late spring and early summer, Microsoft will give us Microsoft Ignite (formerly TechEd) in the fall from Sept. 25 – 29, 2017 in beautiful Orlando, Florida. I am so excited to get together with 10,000 of my closest IT friends at the Orange County Convention Center and talk about the amazing emerging technologies and innovations that will change the shape of our world for the foreseeable future.
Here at Veeam, we understand how important your data is and how it can affect your organization if it’s unavailable. The link between IT systems and the success of each business, no matter the industry, is undoubtable. Unexpected disruptions come in many shapes and forms, from human error, to malicious attacks, to fire, floods or natural disasters. Having a strong Business Continuity and Disaster Recovery (BCDR) plan can prove vital.
If you were considering becoming a cybercriminal or were perhaps a traditional villain looking to upgrade your skills for the 21st century, I’m sure your business model of choice would be running a ransomware operation. You would, thanks to the simplicity of platforms like Ransomware as a Service and the willingness of victims to pay ransomware fees, be running a very successful business — albeit an illegal business — in a matter of days or weeks. Such is the ongoing success of ransomware as a means of extorting money from victims.