Veeam Blog
Filters (Results: 152)
Results: 152
Filters (Results: 152)
  • Business Types (1)
Stay up to date on the latest tips and news
By subscribing, you are agreeing to have your personal information managed in accordance with the terms of Veeam’s Privacy Policy
You're all set!
Watch your inbox for our weekly blog updates.
OK

The 3-2-1 rule for ransomware protection

Now that your Veeam server is better protected, let’s move on to the 3-2-1 Rule. You may ask yourself what is “The 3-2-1 Rule” and why do I care when it comes to ransomware? It's an industry standard for how to protect data and it is your ultimate line of defense system in the fight against ransomware. Read more
Karinne Bessette
Karinne Bessette

Technologist, Product Strategy

First step to protecting your backups from ransomware

Here is something you don’t always think about — protecting your Veeam Backup & Replication console. But even the server backing up your environment needs to be protected from attacks like ransomware and people with the best or malicious intent. This article will discuss some simple ways to lock down your Veeam server to help protect it from internal and external forces. Read more
Karinne Bessette
Karinne Bessette

Technologist, Product Strategy

v10: The next iteration of Veeam Cloud Tier

With the release of Veeam Backup & Replication 9.5 Update 4 in 2019, we introduced the Veeam Cloud Tier which enabled customers to take advantage of Object Storage. Due to its increasing popularity, infinite scale-out capacity and lower cost for long term retention, Object Storage offers many advantages over traditional block and file-based storage systems. We have witnessed an overwhelming adoption of Object Storage despite the fact that in Update 4, the Cloud Tier was only capable of offloading older data to help to reduce the costs of long-term archival. And now v10 brings more! Read more
Anthony Spiteri
Anthony Spiteri

Regional CTO APJ, Veeam Product Strategy & Lead Cloud and Service Provider Technologist

5 Key Encryption Best Practices For Data Security

Experience has shown that different configurations and constellations regarding the encryption of data have certain influences on the environment. Therefore, I have brought together these five key lessons and experience values that one should consider in any case if it concerns the topic encryption. Read more

Detecting Potential Ransomware Activity With Veeam One

From time to time, I'd like to highlight certain Veeam ONE features you can leverage to be proactive when it comes to identifying threats that could significantly impact the integrity of your data. In particular, one of the most common threats that is the catalyst for many sleepless nights of datacenter professionals today ― ransomware. Read more
Kirsten Stoner
Kirsten Stoner

Technologist, Product Strategy

How to manage Office 365 backup data

As companies grow, data grows and so does the backup data. Managing data is always an important aspect of the business. A common question we get around Veeam Backup for Microsoft Office 365 is how to manage the backup data in case something changes. Let's discuss the needs of data management and how we can help. Read more
Niels Engelen
Niels Engelen

Principal Analyst

How to avoid vendor lock-in with Community Edition

At Veeam, every day we wake up thinking about data… your data! We’re constantly thinking about the unique ways we can protect that data better; how we can do it more efficiently; how we can make restore times even faster, and even where tomorrow’s data will reside.

We have the ability to look forward because of the way Veeam backup files are created and have been created from day one — with you being in full control of your data at all times.

Read more
Michael Cade
Michael Cade

Senior Technologist, Product Strategy

5 pro tips for recovering applications quickly and reliably

Today’s apps consist of multiple component tiers with dependencies both inside the app and outside (on other applications). While separating these apps into logical operational layers yields many benefits, it also introduces a challenge: complexity.

I wanted to share with you some tips, tricks, best practices and some of the tools that will help you be more successful and efficient when building and executing a DR plan that will recover entire apps quickly and reliably. Read more

Sam Nicholls
Sam Nicholls

Principal, Product Marketing

Compliant data recovery with Veeam DataLabs Staged Restore

It’s safe to argue that, to date, the May 2018 implementation of the General Data Protection Regulation (GDPR) in the European Union, as well as the two-year ramp-up period that lead to the activation date, has elevated the status and industry press coverage of compliance-related issues more than any other data protection and compliance standard set by governing bodies. Veeam can help you stay compliant with ease. Read more
Michael Cade
Michael Cade

Senior Technologist, Product Strategy