Veeam Blog
Filters (Results: 212)
Results: 212
Filters (Results: 212)
  • Business Types (1)
Stay up to date on the latest tips and news
By subscribing, you are agreeing to have your personal information managed in accordance with the terms of Veeam’s Privacy Policy
You're all set!
Watch your inbox for our weekly blog updates.
OK

Trusted by Customers, Proven by Reviews: What Third-Party Recognition Says About Veeam

Customers are at the center of how we build at Veeam. The needs you share, the challenges you face, and the feedback you give directly influence how we prioritize improvements, refine the experience, and support you daily.

That’s also why third-party review platforms matter. They don’t just reflect what a vendor says a product can do. They capture what customers experience in real environments, from reliability and recovery, to ease of use and support. In a world where data is the backbone of business, that kind of unfiltered perspective helps teams make smarter decisions and keeps us raising the bar.

We use those reviews as a feedback loop. They highlight what’s working, where we can improve, and what matters most to the ... Read more

Abigail Fish
Abigail Fish

Customer Insights Senior Associate

Data Trust and Resilience Report 2026

Digital transformation, cloud adoption, and AI have increased the value of enterprise data and expanded the attack surface around it. Data moves across clouds, applications, APIs, models, and automated systems faster than most organizations can track.  Read more
Emilee Tellez
Emilee Tellez

Field CTO, Veeam OR Director of Product Strategy

Clean Recovery and Business Continuity: Expert Insights from Veeam and Coveware

Recovery isn’t just about getting systems back online; it’s about proving that IT operations are essential to business continuity. Veeam’s Leah Troscianecki sat down with Ray Umerley, Field CISO, Coveware by Veeam, for a tactical conversation about what actually happens when ransomware hits, and how clean recovery can turn the tide from operational fire drills to strategic foresight. Read more
Leah Troscianecki
Leah Troscianecki

Principal Product Marketing Manager, Cloud

SaaS Backup Solutions: Protect Microsoft 365, Entra ID, and Salesforce

As organizations increasingly adopt and rely on Software as a Service (SaaS) for business-critical functions, it’s essential that IT operations and security professionals scrutinize the availability and integrity of the data within these posted applications. Read more
Kyle Andrise
Kyle Andrise

Product Marketing Associate for Enterprise Solutions

Veeam University: Empowering Your Journey in a Digital World

At Veeam, we believe in the power of education and collaboration to drive success in today’s digital landscape. The success of Veeam has always been rooted in placing the customer at the center of our efforts. Read more
Federica Saba
Federica Saba

Global Training and Certification Manager

Enhancing Business Continuity with the Digital Operational Resilience Act

In the digital age, cybersecurity is not just about protecting data; it’s about ensuring that the very fabric of our financial systems remain intact and resilient against threats. The introduction of the Digital Operational Resilience Act (DORA) by the European Union marks a significant milestone in the journey toward a safer and more stable financial ecosystem. The financial services sector, together with their cybersecurity and resilience structures, has witnessed firsthand the evolution of digital threats and the increasing sophistication of cyber adversaries. It is against this backdrop that we delve into the importance of DORA and its potential to redefine the landscape of financial services, cybersecurity, and resilience. Read more
Andre Troskie
Andre Troskie

EMEA Field CISO

Adam Bergh
Adam Bergh

Senior Director, Technical Alliances and GSIs

Secure by Design: Building a Safer Data Future

Cyberthreats are evolving at an unprecedented pace, and organizations must rethink their approach to data security. Traditional reactive measures are no longer sufficient. Enter Secure by Design, a proactive strategy aimed at embedding security into every stage of product development, ensuring robust defenses from day one. This blog explores the key principles, benefits, and practical applications of Secure by Design, and how organizations like Veeam are championing its adoption.

What is the Secure by Design Strategy?

The Secure by Design approach shifts the focus from reactive security such as patching vulnerabilities after deployment to integrating security measures during the development and deployment lifecycle. By prioritizing security early, organizations reduce the risk of cyber incidents and the costs associated with reactive security fixes.

Historically, ... Read more