Data security

There are many risks to data: from the IT admins worst nightmare, ransomware, to a company's worst nightmare, a malicious admin. Data security is a huge challenge and becomes increasingly more important to understand as data grows rapidly, sprawls to different platforms and becomes more valuable. This topic is a straightforward concept, protect the data, but the many ways to go about achieving this goal make this a complex and fascinating subject.

This article will help you with your first steps in understanding what data security is, how this relates to security and compliance, and the risks and challenges you might face on this ever-expanding topic.

Read more
Karinne Bessette
Karinne Bessette

Technologist, Product Strategy

Size planning for your Office 365 backup job

Having the right account and knowing your backups’ components is a critical first step in the backup process, but you also need to know the scope of the Microsoft Office 365 environment you want to back up. Which services do you plan on including in this backup scope? Knowing the components you plan on backing up will help greatly when it comes to capacity and resource planning. Read more
Karinne Bessette
Karinne Bessette

Technologist, Product Strategy

Office 365 Backup quick start: Initial configuration

Veeam Backup for Microsoft Office 365 is responsible for backing up and restoring Exchange, OneDrive, and SharePoint online data. What most administrators don’t know is that Microsoft protects the underlying hardware where the data sits but not the data itself, meaning if someone was to modify your data through an access point, Microsoft is not responsible for restoring it back to a previous state. The following articles in this series will help you get started with the product so you can start protecting your Microsoft Office 365 environment today. Read more
Karinne Bessette
Karinne Bessette

Technologist, Product Strategy

Are you prepared when ransomware does happen?

Knowing all the options to help protect your environment is great but it’s time to put the pieces together. The question you should be asking is not "If it will happen?" but "Are you prepared when it does happen?" Are you waiting for ransomware to activate in your environment or are you taking steps to mitigate damage before it happens? This article will help you take the steps today to answer those questions and what tools we offer to make this possible. Read more
Karinne Bessette
Karinne Bessette

Technologist, Product Strategy

How VCSPs help against ransomware

Veeam understands the need for Backup as a Service (BaaS) and has offered what we call Veeam Cloud Connect (VCC). VCC is handed by reputable service providers, which we refer to as Veeam Cloud Service Provider (VCSP) partners. These service providers not only take the pressure off a business to manage their off-site backups to better meet the 3-2-1 Rule but they also provide an extra layer of protection in the case of a ransomware attack. Below we will discuss how this is possible and why you want a service provider on your side when disaster hits. Read more
Karinne Bessette
Karinne Bessette

Technologist, Product Strategy

3 storage options against ransomware

Everyday ransomware finds a new way to slip into an environment, from clicking on the wrong site to a compromised set of credentials. This leaves the very real feeling that you already are or will be infected. But there are ways to make it easier to sleep at night by implementing what we call the impenetrables – the form factors that are resilient ransomware. Veeam offers three ways to protect your data from even the nastiest ransomware attack. Let’s see how they can help give you peace of mind in the face of disaster. Read more
Karinne Bessette
Karinne Bessette

Technologist, Product Strategy

Protecting Remote Office 365 User Data

More people than ever are using these products to store business data due to its mobility, moving between computers in the office, at home, and the mobile devices in-between which has made the transition to remote workplaces tenable. With this convenience comes the problem with users' data being exposed to more endpoints and threats than it would have before. These threats not only come in the form of ransomware but misguided users updating the wrong section of a shared resource. Which is why protecting this data has never been more critical. Read more
Karinne Bessette
Karinne Bessette

Technologist, Product Strategy

What is the Gartner Magic Quadrant and why is it relevant to you

It sounds made up and when you first hear it described you think, "Does this really mean anything?" I'm sure if you are a seasoned industry guru you are now rolling your eyes at me, but for those in my boat, this article will help you get a deeper grasp of what the Gartner Magic Quadrant is and why you should care, no matter your role at your company. Read more
Karinne Bessette
Karinne Bessette

Technologist, Product Strategy