Veeam Blog
Filters (Results: 1597)
Results: 1597
Filters (Results: 1597)
Stay up to date on the latest tips and news
By subscribing, you are agreeing to have your personal information managed in accordance with the terms of Veeam’s Privacy Policy
You're all set!
Watch your inbox for our weekly blog updates.
OK

Introducing Veeam Vault to the One UI: Secure Cloud Storage Made Easy

Veeam Vault joins our all-new unified OneUI, alongside our Veeam Data Cloud workloads for Microsoft 365, Entra ID, Salesforce, and more. This integration brings our fully managed and pre-secured cloud storage solution front and center, making it even easier for organizations to protect, manage, and recover their most critical data all from a single interface. Read more

Smart Strategies for Handling Vendor Lock-In, Lock-Out, and Data Challenges

First, let’s take a quick look at the complicated nature of lock-in versus lock out. Vendor lock-In occurs when a company gets stuck relying on a specific technology or service from a particular cloud provider. This makes it difficult and expensive to switch providers or technologies. It’s a bit of a trap when you become too dependent on one company. On the other hand, vendor lock-out happens if a company loses access to its data or services supplied by a cloud provider. It can happen if there are disputes, payment issues, or problems on the vendor’s side. This situation can resemble being banned from your own digital tools and information. Read more
Leah Troscianecki
Leah Troscianecki

Principal Product Marketing Manager, Cloud

How Higher Education Institutions Can Strengthen Cyber Resilience with Modern Data Protection

Education sector IT teams are facing unprecedented cybersecurity threats and compliance demands. For colleges and universities, cyber resilience is the ability to withstand, recover from, and adapt to cyberattacks and IT disruptions, without losing access to critical systems and data. Read more
Kellen Flood
Kellen Flood

Director of Public Sector

Locking Down Public-Sector Data: My Perspective on Why Veeam Data Cloud Vault Sets the New Standard

As director of public sector sales for Veeam in the U.S., I spend my days talking with state agencies, county CIOs, school districts, and federal program managers who are under relentless pressure. Ransomware actors see public services as soft targets, compliance mandates tighten every budget cycle, and legacy infrastructure isn’t aging gracefully. When 911 dispatch, election platforms, or student information systems go dark, it’s front-page news and citizens feel it instantly. Read more
Kellen Flood
Kellen Flood

Director of Public Sector

Safeguarding Public Sector Data: Veeam’s Blueprint for SLED Resilience

In my role at Veeam, I have the privilege of working closely with state, local, and education (SLED) organizations across the U.S. Every day, I hear first-hand the challenges IT teams face including tight budgets, aging infrastructure, rising cyberthreats, and the constant pressure to meet compliance mandates. It's not easy. In fact, with 87% of U.S. state and local governments reporting at least one cyber incident in the past two years, the stakes have never been higher. Read more
Kellen Flood
Kellen Flood

Director of Public Sector

Dangerous Tools in Clumsy Hands: Lessons from the VanHelsing Ransomware Leak

For many organizations, this is the nightmare scenario: you think you’ve negotiated your way out of a ransomware attack, you’ve paid the ransom demanded, and you’ve waited for the promised decryption tool. But when you think your data is safe and the ordeal is finished, you discover your data is still lost. Read more
Ian Findling
Ian Findling

Sr. Content Strategy Specialist

Minimum Viable Business and Minimum Viable Company for Cyber Resilience: What You Need to Know

MVB or MVC refers to the minimum possible version of an organization that can still operate should an incident bring down systems and operations. They are critical concepts in cyber resilience planning and response. They define the bare minimum operations, processes, systems, and data an organization must restore to remain functional after a cyberattack. Read more

The Overlooked Risk in Your Microsoft 365 Defense: Why Identity Protection Matters More Than Ever

Cybersecurity is a moving target, and as organizations increasingly rely on Microsoft 365, Entra ID has become the latest battleground in the war on information security. In our recent webinar, “The Overlooked Risk in Your Microsoft 365 Defense: Identity Protection”, Veeam expert Karinne Bessette and industry leader Joseph Carson explored the real-world risks organizations face, including why identity is under attack and how resilience backup strategies play a vital role in modern defense. Read more
Karinne Bessette
Karinne Bessette

Global Technologist, Microsoft 365 Lead