Veeam Blog
Filters (Results: 41)
Results: 41
Filters (Results: 41)
  • Business Types (1)
Stay up to date on the latest tips and news
By subscribing, you are agreeing to have your personal information managed in accordance with the terms of Veeam’s Privacy Policy
You're all set!
Watch your inbox for our weekly blog updates.
OK

VEEAM AT AWS RE:INVENT 2025

Can you feel it? The neon lights, the hum of anticipation, and the unmistakable buzz of innovation—AWS re:Invent 2025 is almost here! Whether you are a seasoned AWS re:Invent explorer or about to take your first steps onto the legendary expo floor, this is more than just another conference. It’s where cloud pioneers, tech dreamers, and digital transformers unite to write the next chapter of IT. Read more
Chris Spencer
Chris Spencer

Senior Director, Product Marketing

Elevate Your Cloud Game With Veeam

Cloud adoption is at an all-time high, with nearly 98% of businesses utilizing cloud services in some capacity. This trend continues to grow as organizations store, process, and manage vast amounts of critical data in the cloud. Read more
Julia Furst Morgado
Julia Furst Morgado

Product Strategy Technology

AWS Shared Responsibility Model

The cloud certainly doesn’t come without its fair share of challenges, and one of those challenges can be determining what is your responsibility and that of AWS. Read more
Sam Nicholls
Sam Nicholls

Principal, Product Marketing

Top Security Tools and Services for Your AWS Environment

In an era where cloud-hosted and cloud-native application development and delivery is plagued by rampant security threats like ransomware, ensuring the protection and security of your data stored on cloud platforms like Amazon Web Services (AWS) is more critical than ever. Read more

Top 8 AWS Security Best Practices

Securing your cloud infrastructure is of utmost importance to protect your data and ensure the integrity and availability of your AWS resources. In this comprehensive guide, we will explore AWS security best practices to help you fortify your cloud environment. By implementing these practices, you can enhance the overall security posture of your AWS infrastructure and minimize the risk of security breaches. Read more
AWS
Julia Furst Morgado
Julia Furst Morgado

Product Strategy Technology

Roy Adiel
Roy Adiel