Veeam Blog
Filters (Results: 43)
Results: 43
Filters (Results: 43)
  • Business Types (1)
Stay up to date on the latest tips and news
By subscribing, you are agreeing to have your personal information managed in accordance with the terms of Veeam’s Privacy Policy
You're all set!
Watch your inbox for our weekly blog updates.
OK

7 Reasons to Move to Veeam Data Cloud for Microsoft 365

If you’re running Veeam Backup for Microsoft 365 today, you’ve already made the most important decision in SaaS protection: you built independent backups because you know “cloud” doesn’t automatically mean “recoverable”. What’s changed is the pressure on recovery itself. As Microsoft 365 environments expand and identity-driven incidents demand faster response at larger scale, the day-to-day overhead of self-managed backup grows alongside the consequences of falling behind.

Veeam Data Cloud for Microsoft 365 keeps the core principles you rely on, including independent copies, retention control, and granular recovery, while shifting the infrastructure, storage, and ongoing maintenance to a managed service run by Veeam. The result is less time babysitting backup and more confidence ... Read more

Ian Findling
Ian Findling

Sr. Content Strategy Specialist

Veeam Unveils a New Alliance Partnership with ServiceNow with the Launch of a Free App

For years, ServiceNow + Veeam have empowered users with improved visibility and accelerated incident response by automatically triggering ServiceNow incidents from Veeam ONE monitoring alerts. Now, we are excited to further expand our partnership to make the Veeam App available for free to download through the ServiceNow store. Read more

Risk Management Framework: How Veeam Strengthens Cyber Resilience

Risk is an unavoidable reality for every organization, whether it comes from cyberattacks, regulatory changes, operational failures, or natural disasters. A risk management framework gives businesses a proven structure to reduce risk by identifying vulnerabilities, implementing controls, and monitoring their effectiveness over time. The most widely adopted model, the NIST Risk Management Framework, breaks this process into clear, repeatable steps that align with global compliance standards and industry best practices. Read more
Javier Perez
Javier Perez
Rick Vanover
Rick Vanover

Vice President, Product Strategy

From Gaps to Gains: The Measurable Impact of Data Resilience Maturity

The reality is resilience is no longer just about having a backup. It’s about whether your systems and your people can perform under pressure. From ransomware to regulatory scrutiny, enterprises today are carrying more risk than ever. That’s why a maturity-based approach to data management, protection, and recovery isn’t optional anymore. It’s the difference between disruption and continuity. Read more
Leah Troscianecki
Leah Troscianecki

Principal Product Marketing Manager, Cloud

Not All Data Resilience Frameworks Are Equal: Why the Veeam Data Resilience Maturity Model (DRMM) Sets the Industry Standard

As more frameworks enter the market under the label of “resilience,” it is important to distinguish between surface-level checklists and models that help organizations change. Most are narrow in scope, focused on isolated capabilities like cyber recovery or backup maturity. Read more
Dave Russell
Dave Russell

Senior Vice President, Head of Strategy

Why You Need to Cover Your SaaS: Seven Best Practices to Protect Your Data

Software-as-a-service (SaaS) now runs core business operations: From collaboration and identity to customer data and revenue workflows. As SaaS continues its rapid growth — with market forecasts projecting 18.3% CAGR through 2030 — the impact of losing access to SaaS data or confidence in its integrity keeps rising. Read more
Shana Brewer
Shana Brewer

Director, Global Campaigns

The Organizational Structure of Ransomware Threat Actor Groups is Evolving Before Our Eyes

As we approach the one year anniversary of two prominent ransomware group collapses (Lockbit and BlackCat/ALPHV), we find the ransomware ecosystem to be as fractured and uncertain as it did in the months following these events. The Ransomware-as-a-Service (RaaS) model remains irreversibly tarnished after the groups that pioneered this framework were exposed as being fraught with infighting, deception, lost profits, and compromised anonymity for their affiliates. Joint law enforcement actions over the last year have systematically impaired the resources ransomware actors depend on to operate. In the case of domestic threats, law enforcement efforts have even put a number of bad actors behind bars. While certain groups persist and new names continue to trickle in and out of the ransom-sphere, ... Read more
Bill Siegel
Bill Siegel

CEO, Coveware by Veeam

Top 5 TTPs Targeting Enterprise Cybersecurity

As enterprises continue to strengthen their security tactics, threat actors are continuously refining their methods to sidestep them. In 2024, advanced tactics, techniques, and procedures (TTPs) evolved significantly, shaping the threat landscape with greater efficiency and effectiveness. These advancements have intensified enterprise cybersecurity threats, making proactive defense strategies more critical than ever.

With the dust now settled, let’s look at the TTPs most frequently leveraged against enterprises, which proved most impactful, and how enterprises can detect these threats before it’s too late.

TTPs Targeting Enterprises Today

1. Exfiltration

The concept behind data extortion attacks is straightforward: steal sensitive data and use it as ransom leverage. Threat actors have evolved beyond traditional encryption-based attacks, finding new avenues ... Read more

Raymond Umerley
Raymond Umerley

Field CISO

Veeam University: Empowering Your Journey in a Digital World

At Veeam, we believe in the power of education and collaboration to drive success in today’s digital landscape. The success of Veeam has always been rooted in placing the customer at the center of our efforts. Read more
Federica Saba
Federica Saba

Global Training and Certification Manager