Veeam Blog
Filters (Results: 162)
Results: 162
Filters (Results: 162)
  • Business Types (1)
Stay up to date on the latest tips and news
By subscribing, you are agreeing to have your personal information managed in accordance with the terms of Veeam’s Privacy Policy
You're all set!
Watch your inbox for our weekly blog updates.
OK

Veeam Ransomware Detection Service: AI That Proactively Detects Attacks

Ransomware attacks in 2024–2025 have become far more deliberate. Attackers often spend time stealing credentials, moving laterally, and exfiltrating data before triggering encryption. When the payload finally runs, many variants use intermittent or selective encryption, encrypting only portions of files or skipping large data segments, to disguise activity and accelerate impact. Because of this, detections that rely solely on sudden resource spikes can miss early warning signs, leaving organizations unaware until recovery becomes impossible. Read more
Zack Rossman
Zack Rossman

Tech Lead, VDC AI & Security

Payam Kavousi
Payam Kavousi

Senior Software Engineer

Stop Ransomware Sooner: Introducing Veeam Ransomware Detection Service

You can’t turn on the news without hearing about a new cybersecurity, malware, or ransomware attack. These attacks are growing more frequent and smarter, leaving a devastating amount of damage to companies' profits and reputations. We no longer just talk about if an attack will happen but when and how bad. This is why Veeam is introducing advanced threat detection for ransomware and malware. In this blog, I’ll be focusing on the early ransomware detection service in Veeam Data Cloud, which aims to help organizations stop attacks sooner. At the time of this blog, the service supports Microsoft 365 workloads with more workloads to come! Read more
Karinne Bessette
Karinne Bessette

Global Technologist, Microsoft 365 Lead

Veeam at RSAC 2026: Why Data Protection and Data Security Must Converge

Security posture is measured not only by how quickly a threat or sensitive data exposure is detected and contained. It’s also calculated by how confidently an organization can recover and continue operating when something goes wrong. That’s one of the reasons why recovery is no longer a separate IT function operating alongside security. Instead, it is a critical component of security and a strategic capability that now enables AI transformation. Read more
Kelli Hartwick
Kelli Hartwick

Senior Product Marketing Manager

Why Agent Commander Changes Everything

A Solutions Architect’s Perspective on the Future of AI Trust

Veeam recently released Agent Commander. As someone who has spent the last decade building enterprise resilience architectures, and the past several years deep in AI security research, I can tell you: This is the product the industry has been waiting for without fully knowing how to ask for it.

Let me explain why.

The Problem We Have Been Solving in Pieces

For years, I have worked with enterprises across the EMEA region deploying backup, disaster recovery, and cyber resilience strategies. The conversations always followed a familiar pattern: Protect the data, recover the data, and prove compliance. The tooling was ... Read more

Ali Salman
Ali Salman

Principal Solutions Architect, EMEA

Introducing Agent Commander

The promise of AI Agents is staggering— intelligent systems that make decisions, use tools, automate complex workflows act as force multipliers for every knowledge worker.  But for every advanced AI Agent that makes headlines for executing complex math proofs or automating scientific research in a lab setting, there are 100s of organizations that are struggling to scale Agents. Read more

Public Sector Cybersecurity: Best Practices for U.S. Government and Defense Agencies

Public sector agencies operate in one of the most complex threat environments in the world. Every day, government IT and security teams defend critical systems, such as citizen record databases and defense networks, against adversaries and ransomware campaigns. Read more
Mark Bentkower
Mark Bentkower

Principal Technologist, Americas

Emma Lutton
Emma Lutton

Senior Federal Marketing Manager

Security Risks of Model Context Protocol: What CISOs Need to Know Before Connecting AI to Enterprise Data

Model Context Protocol (MCP) is getting attention because it makes it easier to connect AI assistants and agents to the systems where work actually happens: APIs, SaaS platforms, operational tools, and internal data sources. From a security perspective, that convenience changes the game. Once an agent can call tools, a single prompt can trigger a chain of actions across multiple systems. Read more
Zack Rossman
Zack Rossman

Tech Lead, VDC AI & Security