Veeam Blog
Filters (Results: 105)
Results: 105
Filters (Results: 105)
  • Business Types (1)
Stay up to date on the latest tips and news
By subscribing, you are agreeing to have your personal information managed in accordance with the terms of Veeam’s Privacy Policy
You're all set!
Watch your inbox for our weekly blog updates.
OK

Why Kubernetes Security, Compliance, and Observability Need a New Mindset

Kubernetes is everywhere; it’s the de facto orchestration layer for modern infrastructure. Thanks to its scalability, declarative management, and ability to dynamically allocate resources across heterogeneous environments, Kubernetes powers everything from cloud-native applications to virtual machines (VMs) and AI. However, as we rush to modernize our stacks, containerize all the things, and deploy our apps, are we ensuring resilience and are we built to withstand the next generation of attacks?

Unlike traditional applications, Kubernetes workloads are ephemeral, scalable, and constantly shifting. This flexibility, while powerful, also introduces significant data protection complexity. Your security and compliance strategy must keep up with continuous changes, and between misconfigurations, ransomware attacks, and compliance gaps, the stakes are higher than ever before.

Kubernetes changes the data protection ... Read more

Megan Gay
Megan Gay

Director, Global Campaigns

Bryant Schuck
Bryant Schuck

Principal Product Manager

Kubernetes in 2025: What Enterprise Leaders Need to Know

Kubernetes has moved from emerging technology to essential infrastructure. It’s no longer just a container orchestration platform — it’s the foundation of modern cloud operations and a key enabler for AI driven‑ applications. Read more
Thomas Keenan
Thomas Keenan

Senior Product Marketing Manager for Kasten by Veeam

Six Consecutive Wins, One Truth: Veeam Rules Kubernetes Resilience

The Kubernetes landscape expands every year with more clusters, more workloads, and more AI. However, one constant remains: the Veeam Kasten juggernaut. For the sixth year in a row, Veeam has been named a leader and outperformer in the newest edition of the GigaOm Radar for Kubernetes Data Protection Report, setting the standard for Kubernetes resilience Read more
Thomas Keenan
Thomas Keenan

Senior Product Marketing Manager for Kasten by Veeam

Why Veeam Kasten + Nutanix Is a Future-Ready Move for Post-VMware Modernization

Traditional type-one hypervisor customers are at a crossroads. According to a June 2025 survey by Rimini Street, 98% of organizations that currently use VMware are either actively exploring or have already adopted alternative platforms in response to evolving pricing, support models, and long-term uncertainty.

In a recent article written by Nutanix for The Register, the company introduces two distinct types of customers who are navigating this transition. The first is modernizers, who are eager to embrace cloud-native and AI-ready platforms. The second is gradualists, who opt for ... Read more

Jared Matkin
Jared Matkin

Sr. Product Marketing Manager, Cloud Native Alliances

Securing AI in Kubernetes: A Guide to Getting Started with LLMs and RAGs

Like many emerging technologies, the marketing narrative and hype for AI technology deployment on Kubernetes is ahead of reality. Survey data from industry reports show that 90 percent of enterprises expect their AI workloads on Kubernetes to grow over the next 12 months, and 54% of enterprises say they already run some AI ML workloads on Kubernetes clusters. However, a very low percentage of companies have currently deployed AI-powered systems like knowledge platforms by using Large Language Models (LLMs) and Retrieval-Augmented Generation ... Read more

Thomas Keenan
Thomas Keenan

Senior Product Marketing Manager for Kasten by Veeam

Secure Kubernetes Storage Made Easy

Earlier this year, Veeam Kasten launched support for exporting of secure snapshots to VDC Vault. This allows Kasten admins to protect their Kubernetes stateful data and take advantage of the built-in security and redundancy protection features natively provided by VDC Vault as a securely managed storage platform. The new integrated model allows Kubernetes admins to check three key application data protection and mobility requirements from their enterprise policy compliance list: ransomware protection, application migration, and cost. Read more

Resilient by Design: Protecting Hybrid and Cloud‑Native Workloads with Veeam Kasten and Red Hat OpenShift

Hybrid and cloud-native approaches are no longer experimental; they’re foundational. In fact, 73% of organizations already run a hybrid cloud strategy, and that number keeps climbing as businesses look for the flexibility to optimize cost, performance, and resilience. Read more
Jared Matkin
Jared Matkin

Sr. Product Marketing Manager, Cloud Native Alliances

The Crucial Role of Security in the Age of Quantum Computing

Robust security measures are not mere features; they are essential components of any viable product or service. Security must be ingrained in every aspect of design and operation of software. With rapid advancements in AI and the looming influence of quantum computing, the state of “secure enough” has changed dramatically. Technologies that promise groundbreaking capabilities bring along significant new vulnerabilities; they must stay ahead of the curve to protect sensitive data and maintain trust in their systems. Read more
Bryant Schuck
Bryant Schuck

Principal Product Manager

Smart Strategies for Handling Vendor Lock-In, Lock-Out, and Data Challenges

First, let’s take a quick look at the complicated nature of lock-in versus lock out. Vendor lock-In occurs when a company gets stuck relying on a specific technology or service from a particular cloud provider. This makes it difficult and expensive to switch providers or technologies. It’s a bit of a trap when you become too dependent on one company. On the other hand, vendor lock-out happens if a company loses access to its data or services supplied by a cloud provider. It can happen if there are disputes, payment issues, or problems on the vendor’s side. This situation can resemble being banned from your own digital tools and information. Read more
Leah Troscianecki
Leah Troscianecki

Principal Product Marketing Manager, Cloud