Veeam Blog
Filters (Results: 646)
Results: 646
Filters (Results: 646)
  • Business Types (1)
Stay up to date on the latest tips and news
By subscribing, you are agreeing to have your personal information managed in accordance with the terms of Veeam’s Privacy Policy
You're all set!
Watch your inbox for our weekly blog updates.
OK

Veeam Expands Support for Nutanix Cloud Clusters (NC2) on Google Cloud

Veeam has long-standing partnerships with both Nutanix and Google Cloud. We are excited to announce a new, collaborative solution that helps our joint enterprise customers strengthen their cyber resilience and better safeguard data from ransomware. When it comes to protecting your critical data, Veeam, Nutanix, and Google Cloud have you covered. Read more
Pete Ybarra
Pete Ybarra

Solutions Architect, NetApp/Nutanix - Product Management, Alliances

Veeam Hits Record-Breaking 25 Million Microsoft 365 Users Protected: Why It Matters

For nearly a decade, Veeam has set the standard for innovation in Microsoft 365 backup and data protection. Veeam’s unwavering commitment to data resilience and security is now proven by a landmark achievement: Over 25 million Microsoft 365 users are protected by Veeam solutions. More than any backup solution in market. This milestone cements Veeam as the undisputed leader in Microsoft 365 data protection. Read more
Edward Watson
Edward Watson

Principal Product Marketing Manager

Compliance Requirements Every IT and Security Team Should Know About

For security leaders, compliance is no longer a distant audit event. Instead, it has become a daily operational priority. With new regulations emerging across financial, healthcare, and critical‑infrastructure sectors, understanding your regulatory compliance requirements is as important as defending against cyberattacks themselves. Read more
Kelli Hartwick
Kelli Hartwick

Senior Product Marketing Manager

Securing Kubernetes Compliance: From Risk to Resilience

Kubernetes, an open‑source platform that automates the deployment, scaling, and management of containerized applications, has become the engine of modern application delivery. It powers everything from financial services to healthcare and government workloads. As organizations scale their container environments, Kubernetes compliance has evolved from a regulatory obligation into a strategic pillar of data resilience and trust. Read more
Bryant Schuck
Bryant Schuck

Principal Product Manager

How the Compare and Restore Fields Wizard Changes Entra ID Recovery

Identity and access management  (IAM) platforms like Microsoft Entra ID now sit at the center of modern data resilience. They connect users to applications, enforce conditional access, and underpin day-to-day productivity across cloud environments. As a result, protecting Entra ID has become foundational to keeping organizations operational and secure. Read more
Kendall Gray
Kendall Gray

Product Marketing Associate

Data Sovereignty in SaaS: Building Resilience and Compliance for Microsoft 365

If there’s one digital operations theme that has received C-suite attention as much as generative and agentic AI in 2025, it is data sovereignty. This is thanks to the growing value of business-critical data, the high concentration of data that resides outside the traditional IT perimeter, and geopolitical uncertainties. Read more

Why Kubernetes Security, Compliance, and Observability Need a New Mindset

Kubernetes is everywhere; it’s the de facto orchestration layer for modern infrastructure. Thanks to its scalability, declarative management, and ability to dynamically allocate resources across heterogeneous environments, Kubernetes powers everything from cloud-native applications to virtual machines (VMs) and AI. However, as we rush to modernize our stacks, containerize all the things, and deploy our apps, are we ensuring resilience and are we built to withstand the next generation of attacks?

Unlike traditional applications, Kubernetes workloads are ephemeral, scalable, and constantly shifting. This flexibility, while powerful, also introduces significant data protection complexity. Your security and compliance strategy must keep up with continuous changes, and between misconfigurations, ransomware attacks, and compliance gaps, the stakes are higher than ever before.

Kubernetes changes the data protection ... Read more

Megan Gay
Megan Gay

Director, Global Campaigns

Bryant Schuck
Bryant Schuck

Principal Product Manager

Identity Management Explained: Common Vulnerabilities and How Attacks Happen

Every day, more than 600 million identity‑based attacks target users across cloud and SaaS environments, and an increasing number of breaches now begin with compromised credentials. Attackers now log in instead of breaking in, which makes Identity and Access Management (IAM) the new perimeter of defense. Read more
Kendall Gray
Kendall Gray

Product Marketing Associate

Kubernetes in 2025: What Enterprise Leaders Need to Know

Kubernetes has moved from emerging technology to essential infrastructure. It’s no longer just a container orchestration platform — it’s the foundation of modern cloud operations and a key enabler for AI driven‑ applications. Read more
Thomas Keenan
Thomas Keenan

Senior Product Marketing Manager for Kasten by Veeam

Six Consecutive Wins, One Truth: Veeam Rules Kubernetes Resilience

The Kubernetes landscape expands every year with more clusters, more workloads, and more AI. However, one constant remains: the Veeam Kasten juggernaut. For the sixth year in a row, Veeam has been named a leader and outperformer in the newest edition of the GigaOm Radar for Kubernetes Data Protection Report, setting the standard for Kubernetes resilience Read more
Thomas Keenan
Thomas Keenan

Senior Product Marketing Manager for Kasten by Veeam