Version 10 – Better Backup! Faster. Stronger. Smarter.
We take big step forward with Google in our first collaboration
Veeam receives two 2020 Tech Innovator Awards
Veeam Backup & Replication v11: Accelerate Your Journey
Recovery fundamentals in the event of a worldwide ransomware cyber-attack
The event that has been named the “largest hacking in history,” where more than 100,000 ransomware attacks affected 150 countries last Friday, reads very much like a script from a Hollywood blockbuster. However, these events occurred and had very real effects on the victims.
The attacks have been stopped since writing this post, but the experts warn that “copy cats” could be encouraged to try this again.
While the majority of focus has been on the source of the vulnerability and the group responsible for these attacks, organizations need to consider what should be done to ensure that these kinds of attacks cause minimal disruption to their applications and systems if they happen again.
As with all malware and ... Read more
Revving up Data Resilience for the Future With Formula 1’s Pat Symonds
12 (More) Reasons Why Veeam Keeps Your Business Running
GDPR one year out — Considerations for the next 12 months
Here we are, one year out. Just 365 days separate us from the enforcement of the General Data Protection Regulation (GDPR), one of the biggest changes to how personal data is handled and managed in the last 20 years. If you’re reading this blog, you’re likely affected by it either as an employee of a business with customers in the EU, as a EU citizen yourself or perhaps both.
At Veeam, we believe in rules that protect the rights of consumers, and have welcomed GDPR since it was adopted by the European Council some 14 months ago.
What is it all about, and why now?
In short, GDPR strengthens and gives new rights to individuals over their personal data such as: Who can ... Read more
Why in the age of ransomware cyber insurance & minimized recovery times are critical
There is no question that ransomware attacks are becoming increasingly prevalent. In fact, some have proposed that 2017 is the Year of Ransomware. The WannaCry attack led to the infection of more than 230,000 computers and more recently, the Petya outbreak on June 27, 2017 led to a second global spread of ransomware. While traditional methods of data protection are essential, they are not sufficient.
Traditional data protection strategies have centered around the three foundational components of IT: people, process and technology. Data protection with people begins with education and a continuous focus on making employees aware of the most ... Read more