Veeam Blog
Filters (Results: 368)
Results: 368
Filters (Results: 368)
  • Business Types (1)
Stay up to date on the latest tips and news
By subscribing, you are agreeing to have your personal information managed in accordance with the terms of Veeam’s Privacy Policy
You're all set!
Watch your inbox for our weekly blog updates.
OK

Top Security Tools and Services for Your AWS Environment

In an era where cloud-hosted and cloud-native application development and delivery is plagued by rampant security threats like ransomware, ensuring the protection and security of your data stored on cloud platforms like Amazon Web Services (AWS) is more critical than ever. Read more

Understanding Hybrid Cloud Management

Hybrid cloud management involves a mixed computing environment, comprising a mixture of public clouds and private clouds or on-premises infrastructure. Many organizations use a hybrid cloud architecture because it allows them to spread workloads over multiple data centers and cloud providers to extend their capabilities while retaining existing hardware and services. Read more
Sam Nicholls
Sam Nicholls

Principal, Product Marketing

Top 8 AWS Security Best Practices

Securing your cloud infrastructure is of utmost importance to protect your data and ensure the integrity and availability of your AWS resources. In this comprehensive guide, we will explore AWS security best practices to help you fortify your cloud environment. By implementing these practices, you can enhance the overall security posture of your AWS infrastructure and minimize the risk of security breaches. Read more
AWS
Julia Furst Morgado
Julia Furst Morgado

Product Strategy Technology

Roy Adiel
Roy Adiel

Comprehensive Overview of Google Cloud Security

Integrating Google Cloud security measures is crucial to enhancing the security of digital assets in the cloud. By leveraging Google Cloud's security infrastructure, businesses can ensure that their sensitive data, trade secrets, personal information, intellectual property, and financial data is well-protected. Implementing proper access controls, encryption protocols, and utilizing monitoring capabilities offered by Google Cloud can significantly reduce the risk of unauthorized access and potential data breaches. Read more
Cody Ault
Cody Ault

Staff Solutions Architect, Cloud - Product Management, Alliances

Cloud Workload Protection: Secure Your Cloud Data

These days, organizations are migrating more and more workloads to the cloud. While this may make their work more efficient, this may be seen as just another opportunity for cybercriminals. Cloud environments contain massive amounts of sensitive data, which makes them prime targets for hackers. Read more
Kelsey Teske
Kelsey Teske

Product Marketing Manager

Guide to Google Cloud Disaster Recovery

Modern companies rely on their ability to leverage their data and applications to function in almost every aspect of their business, whether it’s their website used for e-commerce, inventory databases, and industrial controls for manufacturers, sales and customer relation management systems, medical records, or payment systems. Without these capabilities, hospitals, utility companies, and emergency services can’t function and provide critical services. Companies could be unable to serve customers, take new orders, or manufacture products, causing loss of revenue and failing to meet obligations or even face regulatory penalties.   Read more
Cody Ault
Cody Ault

Staff Solutions Architect, Cloud - Product Management, Alliances