Veeam Blog
Filters (Results: 144)
Results: 144
Filters (Results: 144)
  • Business Types (1)
Stay up to date on the latest tips and news
By subscribing, you are agreeing to have your personal information managed in accordance with the terms of Veeam’s Privacy Policy
You're all set!
Watch your inbox for our weekly blog updates.
OK

VEEAM AT AWS RE:INVENT 2025

Can you feel it? The neon lights, the hum of anticipation, and the unmistakable buzz of innovation—AWS re:Invent 2025 is almost here! Whether you are a seasoned AWS re:Invent explorer or about to take your first steps onto the legendary expo floor, this is more than just another conference. It’s where cloud pioneers, tech dreamers, and digital transformers unite to write the next chapter of IT. Read more
Chris Spencer
Chris Spencer

Senior Director, Product Marketing

Why Veeam Kasten + Nutanix Is a Future-Ready Move for Post-VMware Modernization

Traditional type-one hypervisor customers are at a crossroads. According to a June 2025 survey by Rimini Street, 98% of organizations that currently use VMware are either actively exploring or have already adopted alternative platforms in response to evolving pricing, support models, and long-term uncertainty.

In a recent article written by Nutanix for The Register, the company introduces two distinct types of customers who are navigating this transition. The first is modernizers, who are eager to embrace cloud-native and AI-ready platforms. The second is gradualists, who opt for ... Read more

Turn Data Resilience into Security Intelligence with Veeam App for Microsoft Sentinel

Cyberattacks are evolving at a relentless pace, and backups have become a prime target. For security operations centers (SOCs), the backup environment is often a blind spot, even though they monitor networks, endpoints, and identities with precision. That gap leaves organizations vulnerable and forces IT and Security to work in silos when speed and coordination matter most. Read more

Veeam and Pure Storage: Cyber Resilience Delivered as-a-Service for the Modern Enterprise

Enterprises face a relentless barrage of cyber threats while grappling with growing IT complexity and data sprawl. The cost of downtime and data loss is soaring, and traditional backup alone is no longer enough. Enterprises demand true cyber resilience—continuous, automated, and verifiable protection and clean recovery that guarantees business continuity, no matter what. Read more
Mark Polin
Mark Polin

Solutions Architect, Cisco/Pure

Power in Partnership: How Veeam’s Security Ecosystem Strengthens Cyber Resilience

Modern cyberattacks are complex campaigns designed to move fast and disrupt critical operations. Security tools excel at spotting threats in production but often lack visibility into backup environments. Meanwhile, data backup platforms are built for fast recovery but have historically operated in isolation from the security operations center (SOC). Read more

Choosing Your Go-to-Market: VAR, MSP, or MSSP with Veeam Data Platform

Choosing the right business model is one of the most important decisions for today’s technology partners. Should you operate as a Value-Added Reseller (VAR), expand into a Managed Service Provider (MSP), or specialize as a Managed Security Service Provider (MSSP)? Each approach comes with unique opportunities, responsibilities, and revenue streams — especially when it comes to data protection and cyber resilience. Read more

Nutanix AHV vs. VMware ESXi: Making an Informed Decision

As IT environments become more complex, the question of which hypervisor to use – Nutanix AHV or VMware ESXi – is one many teams face. Whether you are running traditional 3-tier architecture, shifting to hyperconverged infrastructure (HCI), or building a hybrid cloud strategy, choosing the right foundation matters. Read more

Fortify Cyber Resilience Through Hyperautomation with Veeam + Torq

Cyberthreats continue to expand in frequency and complexity. They increase pressure on security operations and IT teams to preempt, detect, respond to, and recover from attacks faster, more accurately and confidently. Many organizations remain hindered by limited visibility, fragmented tools, and manual processes. These obstructions and complexities slow their ability to respond effectively to a cyber incident. Read more