Veeam Blog
Filters (Results: 1600)
Results: 1600
Filters (Results: 1600)
Stay up to date on the latest tips and news
By subscribing, you are agreeing to have your personal information managed in accordance with the terms of Veeam’s Privacy Policy
You're all set!
Watch your inbox for our weekly blog updates.
OK

Introducing Agent Commander

The promise of AI Agents is staggering— intelligent systems that make decisions, use tools, automate complex workflows act as force multipliers for every knowledge worker.  But for every advanced AI Agent that makes headlines for executing complex math proofs or automating scientific research in a lab setting, there are 100s of organizations that are struggling to scale Agents. Read more

Public Sector Cybersecurity: Best Practices for U.S. Government and Defense Agencies

Public sector agencies operate in one of the most complex threat environments in the world. Every day, government IT and security teams defend critical systems, such as citizen record databases and defense networks, against adversaries and ransomware campaigns. Read more
Mark Bentkower
Mark Bentkower

Principal Technologist, Americas

Emma Lutton
Emma Lutton

Senior Federal Marketing Manager

Veeam Expands Support for Nutanix Cloud Clusters (NC2) on Google Cloud

Veeam has long-standing partnerships with both Nutanix and Google Cloud. We are excited to announce a new, collaborative solution that helps our joint enterprise customers strengthen their cyber resilience and better safeguard data from ransomware. When it comes to protecting your critical data, Veeam, Nutanix, and Google Cloud have you covered. Read more
Pete Ybarra
Pete Ybarra

Solutions Architect, NetApp/Nutanix - Product Management, Alliances

Veeam Hits Record-Breaking 25 Million Microsoft 365 Users Protected: Why It Matters

For nearly a decade, Veeam has set the standard for innovation in Microsoft 365 backup and data protection. Veeam’s unwavering commitment to data resilience and security is now proven by a landmark achievement: Over 25 million Microsoft 365 users are protected by Veeam solutions. More than any backup solution in market. This milestone cements Veeam as the undisputed leader in Microsoft 365 data protection. Read more
Edward Watson
Edward Watson

Principal Product Marketing Manager

Security Risks of Model Context Protocol: What CISOs Need to Know Before Connecting AI to Enterprise Data

Model Context Protocol (MCP) is getting attention because it makes it easier to connect AI assistants and agents to the systems where work actually happens: APIs, SaaS platforms, operational tools, and internal data sources. From a security perspective, that convenience changes the game. Once an agent can call tools, a single prompt can trigger a chain of actions across multiple systems. Read more
Zack Rossman
Zack Rossman

Tech Lead, VDC AI & Security

Compliance Requirements Every IT and Security Team Should Know About

For security leaders, compliance is no longer a distant audit event. Instead, it has become a daily operational priority. With new regulations emerging across financial, healthcare, and critical‑infrastructure sectors, understanding your regulatory compliance requirements is as important as defending against cyberattacks themselves. Read more
Kelli Hartwick
Kelli Hartwick

Senior Product Marketing Manager

Securing Kubernetes Compliance: From Risk to Resilience

Kubernetes, an open‑source platform that automates the deployment, scaling, and management of containerized applications, has become the engine of modern application delivery. It powers everything from financial services to healthcare and government workloads. As organizations scale their container environments, Kubernetes compliance has evolved from a regulatory obligation into a strategic pillar of data resilience and trust. Read more
Bryant Schuck
Bryant Schuck

Principal Product Manager

How the Compare and Restore Fields Wizard Changes Entra ID Recovery

Identity and access management  (IAM) platforms like Microsoft Entra ID now sit at the center of modern data resilience. They connect users to applications, enforce conditional access, and underpin day-to-day productivity across cloud environments. As a result, protecting Entra ID has become foundational to keeping organizations operational and secure. Read more
Kendall Gray
Kendall Gray

Product Marketing Associate