Veeam Blog
Filters (Results: 28)
Results: 28
Filters (Results: 28)
  • Business Types (1)
Stay up to date on the latest tips and news
By subscribing, you are agreeing to have your personal information managed in accordance with the terms of Veeam’s Privacy Policy
You're all set!
Watch your inbox for our weekly blog updates.
OK

Vendor Fatigue: The Silent Saboteur of Cyber Resilience and How Veeam Fights Back

The world of cybersecurity is relentless. Threats often morph faster than defenses, and one overlooked adversary undermines even the strongest teams: Vendor fatigue. With 97% of organizations using multiple tools, with an average of five at once, CISOs are drowning in "solution sprawl." This isn't just administrative chaos; it's a resilience killer, turning fortified defenses into fragile webs that invite breaches and burnout. Read more
Gil Vega
Gil Vega

Chief Information Security Officer

Veeam Security: Protect Smarter, Detect Faster, Recover Clean

Data is the lifeblood of every organization. Unfortunately, with that, cyberattacks have intensified in recent times, and cyberthreats are growing more sophisticated and relentless. The challenge isn’t just to protect and back up data; it’s to protect it and bounce back . Veeam stands at the forefront of this mission, uniting data, security, and AI to deliver industry-leading cyber resilience. Veeam offers best-in-class threat detection, rapid recovery, cyber extortion readiness and response, and a robust ecosystem of security integrations. Veeam also empowers organizations to protect smarter, detect threats faster, and recover with confidence. Read more

Don’t Get Haunted by Data Loss: Salesforce Backup in the Age of AI

As the Halloween season arrives, it’s not just cobwebs and carved pumpkins that can send chills down an IT team’s spine. For organizations leveraging Salesforce—especially those embracing AI-powered automation and insights—the real fright comes from unseen risks lurking in the digital shadows. But here’s the treat: with the right approach, you can keep business running smoothly no matter what surprises the night may hold. Read more
Kelsey Teske
Kelsey Teske

Product Marketing Manager

Secure Kubernetes Storage Made Easy

Earlier this year, Veeam Kasten launched support for exporting of secure snapshots to VDC Vault. This allows Kasten admins to protect their Kubernetes stateful data and take advantage of the built-in security and redundancy protection features natively provided by VDC Vault as a securely managed storage platform. The new integrated model allows Kubernetes admins to check three key application data protection and mobility requirements from their enterprise policy compliance list: ransomware protection, application migration, and cost. Read more

Veeam Data Platform Advanced for Proxmox VE

Proxmox VE has seen remarkable growth in popularity and adoption across industries of all sizes. All organizations share a common problem: ensuring their data is protected and ready to be restored at a moment’s notice. Rapid data recovery is critical in the face of unexpected outages to the ever-present threat of ransomware. Veeam Data Platform provides Proxmox VE users with a proven solution to meet these challenges head-on. Read more

Veeam Cyber Secure: Elite Services for Full Data Resilience

Today’s cyberattacks are fast, complex, and coordinated. They are designed to encrypt backups, exfiltrate data, and bring business operations to a halt. In this environment, organizations need more than a recovery plan. They need a proactive program that strengthens their security posture, validates readiness, and guides response when stakes are highest. Read more

The Crucial Role of Security in the Age of Quantum Computing

Robust security measures are not mere features; they are essential components of any viable product or service. Security must be ingrained in every aspect of design and operation of software. With rapid advancements in AI and the looming influence of quantum computing, the state of “secure enough” has changed dramatically. Technologies that promise groundbreaking capabilities bring along significant new vulnerabilities; they must stay ahead of the curve to protect sensitive data and maintain trust in their systems. Read more

The Overlooked Risk in Your Microsoft 365 Defense: Why Identity Protection Matters More Than Ever

Cybersecurity is a moving target, and as organizations increasingly rely on Microsoft 365, Entra ID has become the latest battleground in the war on information security. In our recent webinar, “The Overlooked Risk in Your Microsoft 365 Defense: Identity Protection”, Veeam expert Karinne Bessette and industry leader Joseph Carson explored the real-world risks organizations face, including why identity is under attack and how resilience backup strategies play a vital role in modern defense. Read more
Karinne Bessette
Karinne Bessette

Technologist, Product Strategy

Data Resilience Maturity Model: Your Questions Answered

Data resilience should be a top priority for all organizations. But what does true resilience look like, and how can companies objectively measure and improve it? Enter the Data Resilience Maturity Model (DRMM), a comprehensive framework designed to help businesses assess their current capabilities, benchmark themselves against industry best practices, and build a roadmap toward greater stability and security. Read more
Leah Troscianecki
Leah Troscianecki

Product Marketing Manager, Cloud Product Marketing