Veeam and Kyndryl: Working together to transform cyber incident recovery

While most enterprise IT shops have a cybersecurity strategy that includes a backup policy, many have focused more on prevention than recovery, understandably. After all, the attack that fails does the least amount of damage. However, sooner than later, you may suffer a cyber incident that puts your business data and operations at risk — and an airtight cyber incident recovery solution can minimize the damage. Read more
Jo-Anne Bourne
Jo-Anne Bourne

Senior Alliance Marketing Manager

Digital Transformation Considerations

Veeam is proud to release the findings of yet another research project, the 2023 Data Protection Trends Report, which is the industry’s largest independent research on backup and data protection. This research is fully independent, representing the whole market, and not only from Veeam customers, and was conducted by a third-party research organization, with no one knowing that Veeam was involved. Read more
Jason Buffington
Jason Buffington

Vice President, Market Strategy

Dave Russell
Dave Russell

Vice President, Enterprise Strategy

Hybrid Infrastructure Trends from 2020 to 2025

Veeam is proud to release the findings of yet another research project, the 2023 Data Protection Trends Report, which is the industry’s largest independent research on backup and data protection. This research is fully independent and represents the whole market — not just from Veeam customers. It was conducted by a third-party research organization with no one knowing that Veeam was involved. Read more
Jason Buffington
Jason Buffington

Vice President, Market Strategy

Dave Russell
Dave Russell

Vice President, Enterprise Strategy

Selecting Hardware and Setting Up Environment for Veeam Hardened Repository

The Veeam Hardened Repository is Veeam’s native solution to provide trusted immutability for backups of Veeam Backup & Replication on a Linux server. By supporting generic Linux servers, Veeam ensures that customers always have a choice about their hardware without vendor lock-in. Veeam also allows customers to use their trusted Linux distribution (Ubuntu, Red Hat, SUSE) instead of being forced to use a “custom Veeam Linux”. Read more
Hannes Kasparick
Hannes Kasparick

Senior Analyst, Product Management

Announcing the Data Protection Trends Report for 2023

Veeam is proud to release the findings of yet another independent research project, the 2023 Data Protection Trends Report. For the last three years, Veeam believes that it has been breaking the record for delivering the largest research report in the history of backup and data protection. Read more
Jason Buffington
Jason Buffington

Vice President, Market Strategy

Dave Russell
Dave Russell

Vice President, Enterprise Strategy

Falkirk Council boosts data protection and improves cybersecurity with Veeam

“Veeam is a winner — it accelerated our Digital Transformation, played a pivotal role in our data center migration and elevated our cybersecurity operation. We couldn’t have accomplished what we accomplished without Veeam.” Read more
Murat Dilek
Murat Dilek

Network, Infrastructure and Cybersecurity Team Leader at Falkirk Council

Never waste a good crisis: How to handle a ransomware attack

At VNOG, we provide essential fire-fighting services and assistance in the event of accidents, disasters and crises to the 870,000 citizens of North and East Gelderland in the Netherlands. In this blog post, I’ll tell the story of my most memorable day as VNOG’s Chief Information Security Officer (CISO). Read more
Edwin Moraal
Edwin Moraal

Chief Information Security Officer, Veiligheidsregio Noord- en Oost-Gelderland

Managing Backups as Code – Configuring IAM roles in Veeam Backup for AWS with AWS CloudFormation and Lambda

One of the cornerstones of Amazon Web Services (AWS) best practices is using multiple accounts to manage your workloads. Dedicating accounts to specific business units or even specific applications provides numerous benefits that increase agility, improve security and streamline operations. This practice also helps operators follow the principle of least privilege, whereby only a minimal set of privileges required to perform a task are assigned to responsible users and services, and ideally, only for the time required to complete the task. Read more