Protecting VMware vCenter by Using a “Least Privilege Model”

Third-party software that interacts with VMware vCenter must store credentials somewhere. These credentials are the target of attackers as they often provide high privileges on one of the central components of a busines IT infrastructure. This blog post shows how a “least privilege model” implementation with Veeam Backup & Replication can work. Read more
Hannes Kasparick
Hannes Kasparick

Senior Analyst, Product Management

Cloud Object Storage Deep Dive – Part One, Comparison

Today we’re going to explore the big three (Microsoft Azure, Amazon Web Services and Google Cloud Platform), how their pricing models are similar and differ, and how to make the most of them when designing a backup strategy that incorporates any of them. These three aren’t the only object storage providers that Veeam integrate with, and most of the lessons within this blog will be applicable to any storage vendor. Read more
Michael Paul
Michael Paul

Guest author, Veeam Legend

Veeam resources you need to be aware of

Periodically when I’m talking with customers, they may ask a question, and my response is, “Did you know about…” or “The answer can be found…”. Often, the customer will indicate they were not aware of that specific resource, and it got me thinking. It would be great to share some of the best Veeam resources that you may have never heard of. Read more
Chris McDonald
Chris McDonald

Senior Systems Engineer

What is the 3-2-1 backup rule?

The 3-2-1 Rule is a rule to live by. Here at Veeam, we have been advocating this rule for many years to help organizations ensure recoverability when it is needed most. In this blog post I’m going to explain the 3-2-1 Rule and show you the way to upgrade it to a more modern and resilient way of thinking! Read more
Rick Vanover
Rick Vanover

Senior Director, Product Strategy

How do I protect my data contained within Amazon RDS instances?

With the explosive growth of AWS, more and more people are turning to Amazon RDS (Amazon Relational Database Service) for database services. With Amazon RDS instances, you can deploy databases without having any of the overhead of managing the actual database service or underlying operating system. Now, because of this growth in Amazon RDS, a new challenge faces consumers of this service. Read more
David Hill
David Hill

Technologist, Product Strategy

How to automate adding Veeam Backup for Microsoft Office 365 Auxiliary accounts

Veeam Backup for Microsoft Office 365 is subject to throttling rules placed on SharePoint sites. These rules limit traffic speed for any item downloaded per user from any SharePoint site or OneDrive for Business on Microsoft servers. These throttling rules generally go unnoticed in day-to-day use of the cloud product but can drastically limit backup recovery point objectives. Veeam has a solution to this problem in the way of Auxiliary backup accounts. Read more
Karinne Bessette
Karinne Bessette

Technologist, Product Strategy

Defend your company against phishing attacks

Phishing scams are attempts by cybercriminals to trick users into performing some type of action like clicking on a link, entering credentials, opening an attachment or even making changes to a company’s process. These scams are most commonly delivered as malicious emails but can also take other forms. They can result in ransomware, installation of malicious software (viruses, Trojans, worms), stolen credentials, theft of money, data loss or even identity theft. Phishers exploit common human traits, like trusting people you know, to trick you into doing something that you normally wouldn’t. Read more
Gil Vega
Gil Vega

Chief Information Security Officer