The Latest and Greatest Veeam Backup & Replication v11

When Veeam Backup & Replication v11 went available in February of this year, I had no idea how much of an impact this release would have on the market. V11 came in my 11th year here are Veeam, and while I knew it was the biggest release we’ve ever had — call me impressed! Read more
Rick Vanover
Rick Vanover

Senior Director, Product Strategy

Best practices for data protection

With total enterprise data volumes projected to exceed 2.02 petabytes by 2022, smart safeguards must be implemented to keep it protected. Those strategies themselves are changing in lockstep industry trends. Now that hybrid and full-cloud deployments are dominant, multiple external variables can impact how data is stored and preserved. Additionally, over one quarter of Cloud Vision 2020’s survey respondents could shift 95% of critical workloads cloudward by 2025. Read more
Adam Bertram
Adam Bertram

Guest author

Protecting VMware vCenter by Using a “Least Privilege Model”

Third-party software that interacts with VMware vCenter must store credentials somewhere. These credentials are the target of attackers as they often provide high privileges on one of the central components of a busines IT infrastructure. This blog post shows how a “least privilege model” implementation with Veeam Backup & Replication can work. Read more
Hannes Kasparick
Hannes Kasparick

Senior Analyst, Product Management

What is the 3-2-1 backup rule?

The 3-2-1 Rule is a rule to live by. Here at Veeam, we have been advocating this rule for many years to help organizations ensure recoverability when it is needed most. In this blog post I’m going to explain the 3-2-1 Rule and show you the way to upgrade it to a more modern and resilient way of thinking! Read more
Rick Vanover
Rick Vanover

Senior Director, Product Strategy

How to protect your organization from ransomware attacks

One thing that all CIOs have had on their minds the last couple of years is if their infrastructure and services are safe from ransomware attacks. So far in 2021 we have seen a surge of ransomware attacks that have targeted even large enterprises like Colonial Pipeline which supply 45% of the East Coast's supply of diesel, petrol and jet fuel and ended up paying 5 million for getting back access to their data. The latest statistics show that there is a ransomware attack every 11 seconds, where the attackers utilize different attack vectors to try to get access. So how can we protect ourselves or at least reduce the risk from these types of attacks? Read more
Marius Sandbu
Marius Sandbu

Guest author, Guild Lead for Public Cloud at TietoEVRY

Recovery from Ransomware? Let’s look at Pure Storage and Veeam

May was a busy month! I had the opportunity to present at Pure//Accelerate again this year and we just wrapped up VeeamON 2021. By the way, both events now have content up for replay, so it’s the perfect time to catch up! wOne of the common themes that I had for both events was some perspective around ensuring reliable data recovery from a ransomware incident. With the current threat atmosphere today, this is the opportunity to shine for backup software as well as modern storage systems. Read more
Rick Vanover
Rick Vanover

Senior Director, Product Strategy

Veeam wins a 2021 Top Rated Award from TrustRadius

TrustRadius is a third-party review platform focused on business technology for companies and customers to read real, unbiased user reviews. And thanks to incredible high-score reviews from our customers, we have been recognized as a “Top Rated” company for above-average satisfaction for business technology. The other honor, the TRUE Certification, is a testament to our determination to be transparent, responsive, unbiased and ethical in sourcing and using customer reviews. Read more
Jim Kruger
Jim Kruger

Chief Marketing Officer

Cybersecurity threats in 2021 – Here’s what you need to know

Cybersecurity threats are threats that focus on gaining access to an organization's digital environment. Unfortunately, it is called a threat for a reason. Attackers generally don't want to get inside to do good things to your computers and data. There are many different ways and reasons that attackers want to get into an IT environment, so let's take a closer look.  Read more
Melissa Palmer
Melissa Palmer

Team Lead/Senior Technologist, Product Strategy