Veeam Blog
Filters (Results: 488)
Results: 488
Filters (Results: 488)
Stay up to date on the latest tips and news
By subscribing, you are agreeing to have your personal information managed in accordance with the terms of Veeam’s Privacy Policy
You're all set!
Watch your inbox for our weekly blog updates.
OK

Migrating VMware to OpenShift: Some Practical Guidance and Best Practices

Migrating and/or replatforming can be intimidating. And for good reason — there are often many complex and disparate systems with varying levels of tech debt, multiple teams, stakeholders, and business units involved. They need to be consulted, assist with pre- and post-migration activities, and often have aggressive timelines with little flexibility in terms of downtime or maintenance windows. Read more

From Leak to Lockdown: Recommendations for Cyber Resilience

Credential leakage remains a critical vulnerability in cybersecurity, directly fueling the rise of ransomware attacks. With infostealer malware driving a surge in stolen credentials, organizations must implement robust security measures and proactively monitor the dark web to prevent exploitation. This blog outlines a framework for enhancing cyber resilience through prevention, early detection, and recovery strategies. Read more
Conner Reznicek
Conner Reznicek

Lead Solutions Engineer

Kelli Hartwick
Kelli Hartwick

Senior Product Marketing Manager

Veeam Data Cloud for Microsoft Azure: The SaaS Solution You’ve Been Searching For Secure Backup with No Surprises

Are you ready for a data protection experience that’s truly effortless, scalable, and built for the future? Look no further—Veeam Data Cloud for Microsoft Azure is the SaaS solution you’ve been waiting for. Today, we’re thrilled to announce that Veeam Data Cloud for Microsoft Azure is joining our unified One UI platform, making it easier than ever for organizations to safeguard their critical workloads across the cloud with powerful backup, management, and recovery tools—all from a single dashboard. Read more
Karinne Bessette
Karinne Bessette

Global Technologist, Microsoft 365 Lead

Dangerous Tools in Clumsy Hands: Lessons from the VanHelsing Ransomware Leak

For many organizations, this is the nightmare scenario: you think you’ve negotiated your way out of a ransomware attack, you’ve paid the ransom demanded, and you’ve waited for the promised decryption tool. But when you think your data is safe and the ordeal is finished, you discover your data is still lost. Read more

Putting the Replication in Veeam Backup & Replication

When someone says, "data protection," one of the first things that comes to mind is backup. Whether we’re up against the ever-evolving threat of ransomware or dealing with the simple mistake of an employee clicking a malicious link, backups serve as a kind of magical rewind button. For many organizations, this is enough to meet their recovery point objectives (RPOs). Read more
Brandon McCoy
Brandon McCoy

Solutions Architect

Top 10 Azure Security Tools & Features

It’s safe to say many organizations have embraced some form of cloud strategy. Some have adopted a hybrid cloud model, while others have chosen a multi-cloud model with Software as a Service, Platform as a Service, or Infrastructure as a Service. Regardless of the infrastructure choice, businesses must protect and secure these environments. Microsoft Azure offers a range of cloud services and tools to help secure your environment and data. However, it's crucial to be aware of the critical gaps in Azure's security tools and features. Let’s dive into Azure’s security tools, their capabilities, and later we will reinforce the areas where we can make improvements. Read more
Emilee Tellez
Emilee Tellez

Field CTO, Veeam OR Director of Product Strategy

How Malware Protection by Veeam Safeguards Your Workloads from Threats

Ransomware attacks are more sophisticated than ever, targeting cloud-based workloads and posing significant risks to organizations. These cyberthreats can encrypt critical data, disrupt business operations, and demand hefty ransoms. Tactics such as double extortion and data theft amplify this potential damage, so a solid defense strategy is essential for safeguarding your cloud workloads. Read more
Brad Linch
Brad Linch

Director of Enterprise Strategy

Recon Scanner Detects Malicious Activity & Prevents Cyberattack

Local governments, just like any private organization, rely heavily on digital infrastructure for nearly every aspect of operation — from managing tax systems to safeguarding financial records and online services. This reliance however added to restricted IT and security budgets makes them prime targets for cyberattacks. Read more

Why Veeam Kasten Leads in Kubernetes Data Protection

As Kubernetes is increasingly used in modern application deployments, organizations are encountering challenges with protecting containerized workloads. Traditional backup and recovery solutions are often not sufficient to manage the complexity and dynamic nature of Kubernetes environments. Read more