Get the most out of VeeamON 2022

With less than a week until VeeamON 2022, it’s already shaping up to be an event you don’t want to miss. There’s plenty of event options so each attendee can get the most out of their experience no matter what their interests are. Want an in-depth product demo or to try it yourself in a hands-on lab? You got it. Curious what the Veeam team has to say about IT best practices or where industry trends seem to be taking us? No problem. There’s something for everyone. Read more
Anthony Spiteri
Anthony Spiteri

Senior Technologist, Product Strategy

Veeam’s Actions in Support of Ukraine

Veeam stands with all those who are impacted in Ukraine. We will continue to actively support our community, work closely with our government partners, and make future business decisions based on the evolving situation. Read more
Anand Eswaran
Anand Eswaran

Chief Executive Officer

Cybersecurity threats in 2022 – Here’s what you need to know

Cybersecurity threats are threats that focus on gaining access to an organization's digital environment. Unfortunately, it is called a threat for a reason. Attackers generally don't want to get inside to do good things to your computers and data. There are many different ways and reasons that attackers want to get into an IT environment, so let's take a closer look.  Read more
Melissa Palmer
Melissa Palmer

Team Lead/Senior Technologist, Product Strategy

Veeam Backup & Replication: Migrate existing repository volumes of a lost server to a new one

We’ll dive into a disaster scenario in which a Veeam repository server cannot be recovered, but the block storage, used for storing the backups, is still intact and consistent. As an example, a classic situation would be a physical server with hardware that is defective, but the disc shelves or fibre-channel sub-storage system is not affected by the hardware failure. Read more

Why Ransomware Attacks Work and What You Can Do Besides Pay the Ransom

Television and movies would have us believe cybercriminals have to execute complex plans that involve rappelling from rooftops and avoiding lasers to break into our networks. In reality, it only takes a well-crafted email and a distracted person to start a chain of events that can cost millions of dollars to repair. While that seems like a simple problem to solve, multiple layers of security controls needed to fail for the ransomware attack to succeed.  Read more
Chris Hoff
Chris Hoff

Security & Data Protection Marketing Manager

Defend your company against phishing attacks

Phishing scams are attempts by cybercriminals to trick users into performing some type of action like clicking on a link, entering credentials, opening an attachment or even making changes to a company’s process. These scams are most commonly delivered as malicious emails but can also take other forms. They can result in ransomware, installation of malicious software (viruses, Trojans, worms), stolen credentials, theft of money, data loss or even identity theft. Phishers exploit common human traits, like trusting people you know, to trick you into doing something that you normally wouldn’t. Read more
Gil Vega
Gil Vega

Chief Information Security Officer

Guide for updating Veeam Backup for Microsoft 365

Updating anything in an environment can be a very stressful process and is easily the least favorite task of any IT team. This is in large part due to the unknowns that can happen while updating any products or components. No one wants to modify something that is currently working, bringing on the mentality of “if it’s not broke, don’t fix it”. This common rule can be a double edge sword that leaves your environment open to security vulnerabilities and dated product features. Considering this problem, I think Grace Hopper said it best, “The most dangerous phrase in the language is, ‘we’ve always done it this way’”. This post serves as a guide for the reasons why you should update ... Read more

Karinne Bessette
Karinne Bessette

Technologist, Product Strategy

Veeam Continues to Lead for the 4th Consecutive Year Thanks to Customers’ Feedback

We get great pride from the continued support of our loyal customers, one of our greatest assets — together with our employees and our ecosystem of partners. The North Star of every Veeamer — both employees and partners — is to make our customers’ life more efficient with excellent products and great support. The customers feel that they are at the core of our strategy, they take notice and find every opportunity to reward us with their clear and resounding message: we deliver the best solution in the data protection market. Read more
John Jester
John Jester

Chief Revenue Officer

How Should Companies Handle Ransomware?

According to the Veeam 2022 Data Protection Trends Report, 76% of companies admitted to being attacked by ransomware in 2021. If we broaden the question and asked how many companies experienced a cyberattack, the number would be closer to 100%. Some of the main reasons ransomware has been so successful include the low cost of entry and high return on investment for the attackers.  Read more
Chris Hoff
Chris Hoff

Security & Data Protection Marketing Manager

VMware Explore 2022 (former VMworld) – Veeam

A lot has changed since our last VMworld update. Firstly, Broadcom has acquired VMware, and secondly VMworld is no longer called VMworld, (now VMware Explore). One thing, though, remains the same: the need for simple, flexible, reliable and powerful data protection. Read more
Andy Sturniolo
Andy Sturniolo

Solutions Architect

Veeam ONE Reports by Category: Veeam Data Protection Summary, Compliance & Operations

This document helps navigate the pre-defined Veeam One v11a reports, relevant to VMware, based on two categories.  Reports listed in the first section below are recommended for documenting the backup infrastructure and design, and planning for growth. Reports in the second section are recommended for compliance reports on data protection or internal service level agreement auditing.  Read more
Randy Weis
Randy Weis

Senior Systems Engineer, Strategic Enterprise Accounts

Enhancing the Protection Red Hat Virtualization

There is no doubt that there's been a shakeup in the world of virtualization, for the better part of this century, there has been no doubting the clear choice for organizations to place their virtual workloads on. The market dominance of VMware cannot be disputed and Veeam would not be in existence if it wasn’t for the infrastructure revolution that VMware created. That said, some momentum has shifted and now there is more choice when it comes to organizations  choosing their virtualization platform. Read more
Anthony Spiteri
Anthony Spiteri

Senior Technologist, Product Strategy