Veeam Blog
Filters (Results: 1600)
Results: 1600
Filters (Results: 1600)
Stay up to date on the latest tips and news
By subscribing, you are agreeing to have your personal information managed in accordance with the terms of Veeam’s Privacy Policy
You're all set!
Watch your inbox for our weekly blog updates.
OK

Using orchestration to minimize downtime and maximize compliance

It seems like it’s almost every day that the news reports another major company outage and as a result, the massive operational, financial and reputational consequences experienced, both short- and long-term. Widespread systemic outages first come to mind when considering disasters and threats to business and IT service continuity. But oftentimes, it’s the overlooked, “smaller” threats that regularly occur. Human error, equipment failure, power outages, malicious threats and data corruption can too bring an entire organization to a complete standstill.

Read more
Sam Nicholls
Sam Nicholls

Principal, Product Marketing

Veeam receives 2018 Gartner Peer Insights Customers’ Choice for Data Center Backup and Recovery Software recognition

Every person at Veeam is fanatical about delivering the very best for our customers.

Customer satisfaction is at the heart of everything we do. It’s in our DNA, at every level of the organization, and we know this ethos is working. Why? Because our users keep telling everyone who will listen exactly what they think of us, and what they say about Veeam is fantastic!

I’m honored that, this week, end users on Gartner Peer Insights recognized Veeam with the 2018 Gartner Peer Insights Customers' Choice for Data Center Backup and Recovery Software recognition. As of 2/16/2018, Veeam has a rating of 4.6 out of 5 stars from ... Read more

Peter McKay
Peter McKay

Former Co-CEO, President and member of the Board of Directors

GDPR: Lessons 4 & 5, Document-Comply-Improve

Throughout our journey, we learned about the breadth, scope and location of our data, we started to manage it, and we validated that it was protected and secured. However, completing these tasks still did not ensure compliance.

This only encompassed the first 3 principles of the 5 lessons which we learned.

Know your dataManage the dataProtect the dataDocumentation and complianceContinuous improvement

This journey brought us to the final two principles: Documentation and Compliance, as well as Continuous Improvement.

Lesson 4 and 5 can be brought together. Everything you do today for documentation, and that is automated, can also be used for continuous improvement.

First, it is important that each process in your environment is documented. The data itself might be classified and secure, ... Read more

Danny Allan
Danny Allan

Chief Technology Officer (CTO) and Senior Vice President (SVP), Product Strategy

Why I chose Veeam

I love data protection within IT— so much so that I am starting my 30th year focused on DP by leaving the analyst world and going back to the vendor world at Veeam. Here's why:

The state of the data protection industry

After seven blessed years as the Principal Analyst at ESG covering data protection, I've never been more amazed at the amount of innovation occurring to solve the ever-changing challenge of DP. Notice that I didn’t say “never-ending problem”. The greatest challenge here isn't that "backup is perpetually broken". It’s the expectations of users and the requirements of organizations that continue to heighten. This means that technologies that aren't visionary and innovative become lethargic ... Read more

Jason Buffington
Jason Buffington

Vice President, Market Strategy

Azure Stack hybrid cloud consistency protection with Veeam

In recent years we have all been hearing about cloud transformation. Many organizations already adopt such a strategy, but we still don’t see the large organizations move to all or full cloud strategies.

For some businesses, cloud is a cost saver when they move or run the workload from the cloud. For many other organizations, especially the large ones, an all-cloud strategy is not the best fit. Many things force them to keep and run most of their workload from an on-premises data center. If we look at today’s data centers, we realize that the data center is mostly running on top of a virtualization layer which introduces the basics of the hybrid cloud.

Read more

GDPR: Lesson 3, PROTECT Your Data

After the general overview and the delving into the first and second principles in our GDPR journey, it is time to look at the third principle: Protect the data. As a reminder, below are Veeam’s 5 lessons or 5 key principles in the GDPR journey:

Know your dataManage the dataProtect the dataDocumentation and complianceContinuous improvement

There are many Information Security articles about protecting your data. Implementing and ensuring data protection heavily relies on tools and technology. While tools and technology are essential in protecting data, it is not sufficient. Protecting your data comes ... Read more

Danny Allan
Danny Allan

Chief Technology Officer (CTO) and Senior Vice President (SVP), Product Strategy

Backup Tape Storage Best Practices

One of the most popular choices for backup archival is tape. It is cheap, reliable and offers protection against crypto viruses and hacker attacks. Additionally, it’s offline when not in a tape loader. With Veeam, IT administrators can use flexible options to create copies of backups and store them on a different media, following the 3-2-1 Rule for the backup and disaster recovery. This blog post provides advice and considerations that will help you create a robust tape archival infrastructure. Read more
Evgenii Ivanov
Evgenii Ivanov

Senior Team Leader, Advanced Technical Support, VBR

GDPR: Lesson 2, MANAGE Your Data

Let’s continue our journey that we started in the previous two blogs. In the first post, we gave a general overview of Veeam’s journey to GDPR compliance and shared our 5 lessons learned. In the second post, we went deeper in the first of those five principles.

Know your dataManage the dataProtect the dataDocumentation and complianceContinuous improvement

Let’s look closer at the second principle: Manage the data.

If you finished the tasks from the first principle and identified the personally identifiable information (PII) you own and where it resides, you can now start the process of establishing rules and processes to access and use that PII data.

The key questions here are: ... Read more

Danny Allan
Danny Allan

Chief Technology Officer (CTO) and Senior Vice President (SVP), Product Strategy

Why is ransomware still so successful?

There’s no end to ransomware in sight. It’s a simple enough attack — install malware, encrypt data/system, and ask for the ransom — so why aren’t we stopping ransomware?  Security vendors are keenly aware of the issue, as well as the attack vectors and methods, but can’t seem to stay a step ahead, causing ransomware to grow from $1 billion in damages in 2016 to an estimated $5 billion in 2017. There are two basic reasons ransomware continues to be a “success” for cyber criminals.

Read more

Step-by-step guide to deploy different OSes through Windows Deployment Services

Windows Deployment Services (WDS) is a great addition to the Windows product set. Out of the box, it’s able to deploy Windows VMs, and with a couple of small tweaks, it’s possible to have WDS build Linux and VMware servers, all from a selectable Preboot eXecution Environment (PXE) boot menu. In order for it to deploy Windows and Linux systems it requires some changes which we'll explore in this article. Read more