Veeam Blog
Filters (Results: 406)
Results: 406
Filters (Results: 406)
  • Virtual (0)
  • Cloud (0)
  • Physical (0)
  • Applications (0)
  • Storage Integrations (0)
  • Data Security and Compliance (0)
Stay up to date on the latest tips and news
By subscribing, you are agreeing to have your personal information managed in accordance with the terms of Veeam’s Privacy Policy
You're all set!
Watch your inbox for our weekly blog updates.
OK

Comprehensive Overview of Google Cloud Security

Integrating Google Cloud security measures is crucial to enhancing the security of digital assets in the cloud. By leveraging Google Cloud's security infrastructure, businesses can ensure that their sensitive data, trade secrets, personal information, intellectual property, and financial data is well-protected. Implementing proper access controls, encryption protocols, and utilizing monitoring capabilities offered by Google Cloud can significantly reduce the risk of unauthorized access and potential data breaches. Read more
Cody Ault
Cody Ault

Staff Solutions Architect, Cloud - Product Management, Alliances

Highlight Threats and Reduce Risk With Veeam Threat Center

Veeam Data Platform is continuously evolving to provide users with the tools they need for ultimate data protection and resilience. It provides a holistic solution for data protection with monitoring and orchestration capabilities that help ensure compliance and cyber resilience. Read more
Kirsten Stoner
Kirsten Stoner

Technologist, Product Strategy

Guide to Google Cloud Disaster Recovery

Modern companies rely on their ability to leverage their data and applications to function in almost every aspect of their business, whether it’s their website used for e-commerce, inventory databases, and industrial controls for manufacturers, sales and customer relation management systems, medical records, or payment systems. Without these capabilities, hospitals, utility companies, and emergency services can’t function and provide critical services. Companies could be unable to serve customers, take new orders, or manufacture products, causing loss of revenue and failing to meet obligations or even face regulatory penalties.   Read more
Cody Ault
Cody Ault

Staff Solutions Architect, Cloud - Product Management, Alliances

What’s New in Veeam Recovery Orchestrator 7?

Veeam Recovery Orchestrator (Orchestrator), part of Veeam Data Platform, enhances the user recovery experience by ensuring that businesses can define, test, and plan for data outages. Having the ability to choose which type of recovery method you want to use is crucial, especially when it comes to cyberthreats. There were some major enhancements and new features added into this version of Veeam Data Platform that compliments the robust functionality of Orchestrator version 6. Let’s discuss what new features you can see from the updated Veeam Recovery Orchestrator v7. Read more

What is the 3-2-1 backup rule?

The 3-2-1 Rule is a rule to live by. Here at Veeam, we have been advocating this rule for many years to help organizations ensure recoverability when it is needed most. In this blog post I’m going to explain the 3-2-1 Rule and show you the way to upgrade it to a more modern and resilient way of thinking! Read more
Rick Vanover
Rick Vanover

Senior Director, Product Strategy

Introduction to Key Management Systems (KMS)

When it comes to managing encryption, keys needed for secure data encryption and decryption – the essential tools for encoding and decoding data – Key Management Systems (KMS) are crucial. KMS provides a secure environment for handling these keys, ensuring they are accessible only to authorized systems and individuals. KMS is vital for protecting the confidentiality and integrity of sensitive data, particularly in complex IT environments. Read more
Ivan Cioffi
Ivan Cioffi

Technical Advisor, GSI - Product Management, Alliances

Expand Security with SIEM Integration and Backup

SIEM integration involves consolidating a variety of cybersecurity tools, including firewalls, intrusion detection systems, antivirus solutions, IAM (Identity and Access Management), Endpoint security, and Cloud security, into a unified platform. This modernization encompasses a broader range of security measures, moving beyond the older solutions. Read more
Matt Crape
Matt Crape

Senior Technical Product Marketer

Microsoft 365 Native Security: Unlocking Compliance and Monitoring Features

No business is exempt from meeting some kind of compliance or governing regulation. These controls are put in place (generally speaking) to help ensure trust and consistency when dealing with goods and services. When it comes to “as a Service” offerings, these regulations can enter grey areas and offer misconceptions of who is responsible — and at fault — if there is a violation. Read more
Karinne Bessette
Karinne Bessette

Technologist, Product Strategy

Securing Kubernetes Networking: A Practical Guide

Kubernetes has become the go-to solution for container orchestration, enabling organizations to efficiently deploy, manage, and scale containerized applications. However, as Kubernetes environments grow in complexity, securing them becomes increasingly important. One of the critical areas that require attention is Kubernetes networking. Read more
David Cackowski
David Cackowski

Product Marketing Manager, Kasten