Veeam Blog
Filters (Results: 74)
Results: 74
Filters (Results: 74)
  • Virtual (0)
  • Cloud (0)
  • Physical (0)
  • Applications (0)
  • Storage Integrations (0)
  • Data Security and Compliance (0)
Stay up to date on the latest tips and news
By subscribing, you are agreeing to have your personal information managed in accordance with the terms of Veeam’s Privacy Policy
You're all set!
Watch your inbox for our weekly blog updates.
OK

What’s New in Veeam Recovery Orchestrator 7?

Veeam Recovery Orchestrator (Orchestrator), part of Veeam Data Platform, enhances the user recovery experience by ensuring that businesses can define, test, and plan for data outages. Having the ability to choose which type of recovery method you want to use is crucial, especially when it comes to cyberthreats. There were some major enhancements and new features added into this version of Veeam Data Platform that compliments the robust functionality of Orchestrator version 6. Let’s discuss what new features you can see from the updated Veeam Recovery Orchestrator v7. Read more

What is the 3-2-1 backup rule?

The 3-2-1 Rule is a rule to live by. Here at Veeam, we have been advocating this rule for many years to help organizations ensure recoverability when it is needed most. In this blog post I’m going to explain the 3-2-1 Rule and show you the way to upgrade it to a more modern and resilient way of thinking! Read more
Rick Vanover
Rick Vanover

Senior Director, Product Strategy

Introduction to Key Management Systems (KMS)

When it comes to managing encryption, keys needed for secure data encryption and decryption – the essential tools for encoding and decoding data – Key Management Systems (KMS) are crucial. KMS provides a secure environment for handling these keys, ensuring they are accessible only to authorized systems and individuals. KMS is vital for protecting the confidentiality and integrity of sensitive data, particularly in complex IT environments. Read more
Ivan Cioffi
Ivan Cioffi

Technical Advisor, GSI - Product Management, Alliances

Why Essential Eight is Critical to Tackling the Future of Cybersecurity – Embracing the Path to Cyber Resiliency 

In the past 12 months, Australia has witnessed several major cybersecurity incidents, such as the Latitude Financial, Optus, and Medibank cyberattacks. Veeam’s 2023 Ransomware Trends Report revealed that 85% of  organizations suffered at least one attack in the past 12 months, a sharp increase from 76% in the year prior. This signals an urgent need for businesses to keep up with the dynamic cybersecurity landscape and ensure cyber resiliency. Read more
John Wood
John Wood

Vice President, Systems Engineer - Asia Pacific & Japan

Guide to Identity and Access Management (IAM)

Adopting Identity and Access Management (IAM) best practices is an important part of proactive defense against ransomware and other cyber threats, allowing you to quickly and effectively control – and limit – who has access to the files and data within your company. Identity and Access Management focuses on verifying user identities, computers, Internet of Things (IoTs), and other devices that want or need to be able to access data, information, and systems. Once verification is complete, IAM only grants access to resources the user (or device) needs to perform their tasks and rejects unauthorized or unrecognized requests. IAM also is helpful for regulatory compliance for standards like GDPR and HIPPA and can be an essential part of digital transformation ... Read more
Jackie Ostlie
Jackie Ostlie

Sr. Product Marketing Manager

The Cyber Battlefield: A Tactical Guide To Preparing For, Engaging in and Triumphing Over Cyberattacks

In the digital age, where information is power, and the battle for data integrity rages on, cyber threats loom like shadowy adversaries, ready to pounce on unsuspecting organizations. These stealthy assailants are relentless, exploiting every vulnerability to breach digital fortresses, wreak havoc and compromise the integrity of business-critical data. In the ever-evolving landscape of cyber warfare, organizations must be fully equipped, prepared for the subduing incursion and swift in their response to emerge victorious. Read more
Karinne Bessette
Karinne Bessette

Technologist, Product Strategy