Veeam Data Cloud for Microsoft Azure: The SaaS Solution You’ve Been Searching For Secure Backup with No Surprises

Are you ready for a data protection experience that’s truly effortless, scalable, and built for the future? Look no further—Veeam Data Cloud for Microsoft Azure is the SaaS solution you’ve been waiting for. Today, we’re thrilled to announce that Veeam Data Cloud for Microsoft Azure is joining our unified One UI platform, making it easier than ever for organizations to safeguard their critical workloads across the cloud with powerful backup, management, and recovery tools—all from a single dashboard. Read more
Karinne Bessette
Karinne Bessette

Technologist, Product Strategy

The Overlooked Risk in Your Microsoft 365 Defense: Why Identity Protection Matters More Than Ever

Cybersecurity is a moving target, and as organizations increasingly rely on Microsoft 365, Entra ID has become the latest battleground in the war on information security. In our recent webinar, “The Overlooked Risk in Your Microsoft 365 Defense: Identity Protection”, Veeam expert Karinne Bessette and industry leader Joseph Carson explored the real-world risks organizations face, including why identity is under attack and how resilience backup strategies play a vital role in modern defense. Read more
Karinne Bessette
Karinne Bessette

Technologist, Product Strategy

Understanding Microsoft 365 Security & Compliance

Microsoft 365 is the cornerstone of business communication worldwide, containing invaluable intellectual property and business-critical applications. It is vital to understand the threats to this landscape and how to mitigate the risks with native security and monitoring tools. In this blog, we will take a deeper look at these challenges, some steps you can take today to ensure these assets are protected, and some of the potential risks accepted by not acting. Lastly, we’ll cover how Veeam’s backup service can help with Microsoft 365 compliance needs. Read more
Karinne Bessette
Karinne Bessette

Technologist, Product Strategy

Veeam Backup for Microsoft 365 v8: Comprehensive Immutability and Enterprise Scale

Great news — Veeam Backup for Microsoft 365 v8 is out and generally available today! There are many great things to love in this build, including but not limited to, enhanced security features, expanded proxy capabilities and shared and private Teams channel support. Read more
Karinne Bessette
Karinne Bessette

Technologist, Product Strategy

Microsoft 365 Native Security: Unlocking Compliance and Monitoring Features

No business is exempt from meeting some kind of compliance or governing regulation. These controls are put in place (generally speaking) to help ensure trust and consistency when dealing with goods and services. When it comes to “as a Service” offerings, these regulations can enter grey areas and offer misconceptions of who is responsible — and at fault — if there is a violation. Read more
Karinne Bessette
Karinne Bessette

Technologist, Product Strategy

Top Threats in Microsoft 365 Security

Microsoft 365 is a cornerstone for businesses worldwide containing invaluable intellectual property and business-critical applications. It is vital to understand the threats facing this landscape and how to mitigate the risks with security considerations and monitoring. In this blog, we will take a deeper look at these challenges, some steps you can take today to ensure these assets are protected and some of the potential risks accepted by not acting. Read more
Karinne Bessette
Karinne Bessette

Technologist, Product Strategy

The Cyber Battlefield: A Tactical Guide To Preparing For, Engaging in and Triumphing Over Cyberattacks

In the digital age, where information is power, and the battle for data integrity rages on, cyber threats loom like shadowy adversaries, ready to pounce on unsuspecting organizations. These stealthy assailants are relentless, exploiting every vulnerability to breach digital fortresses, wreak havoc and compromise the integrity of business-critical data. In the ever-evolving landscape of cyber warfare, organizations must be fully equipped, prepared for the subduing incursion and swift in their response to emerge victorious. Read more
Karinne Bessette
Karinne Bessette

Technologist, Product Strategy