Veeam Blog
Filters (Results: 488)
Results: 488
Filters (Results: 488)
Stay up to date on the latest tips and news
By subscribing, you are agreeing to have your personal information managed in accordance with the terms of Veeam’s Privacy Policy
You're all set!
Watch your inbox for our weekly blog updates.
OK

Installing Ubuntu Linux for Veeam Hardened Repository

In this second part (the first part can be found here) of setting up and hardening a Veeam “hardened repository,” I will cover how to set up Ubuntu 20.04 in a secure way. While it’s “just a minimal installation,” I have seen many questions on this topic, so let’s clear some things up. Read more
Hannes Kasparick
Hannes Kasparick

Director, Product Management

Selecting Hardware and Setting Up Environment for Veeam Hardened Repository

The Veeam Hardened Repository is Veeam’s native solution to provide trusted immutability for backups of Veeam Backup & Replication on a Linux server. By supporting generic Linux servers, Veeam ensures that customers always have a choice about their hardware without vendor lock-in. Veeam also allows customers to use their trusted Linux distribution (Ubuntu, Red Hat, SUSE) instead of being forced to use a “custom Veeam Linux”. Read more
Hannes Kasparick
Hannes Kasparick

Director, Product Management

Using Ansible to Manage Kubernetes Data Protection

In this blog we will be sharing some information about Ansible and then diving into how you can use Ansible to deploy Kasten K10 in a desired state either at scale for many Kubernetes clusters or a repeatable way to automate the deployment removing the human error factor, or it could be both. Read more
Michael Cade
Michael Cade

Field CTO / Director of Product Strategy

VMware vSphere Data Protection Guide

VMware’s vSphere has been the predominant hypervisor in datacenters for the better part of two decades. With its increased adoption over time, we’ve seen staggering growth in the number of workloads that are housed within datacenters. Read more
Matt Crape
Matt Crape

Senior Technical Product Marketing Manager

How to Recover Quickly From a Ransomware Attack

Ransomware attacks need to be viewed under the same category as power outages and natural disasters. The requirement to recover quickly is a necessity. Recently, I'm seeing many vendors in the data protection industry advertise immutability and ransomware detection features. Both of which should absolutely be part of a company's ransomware strategy, but an immutable copy coming from spinning disk or tape can result in too much downtime for the business. It's an easy decision for a CEO or CFO if an attacker's ransom is $100,000 and the cost of downtime for a day is $500,000. The only question at that point becomes how do we make a Coinbase account to transfer Bitcoin? Read more
Brad Linch
Brad Linch

Director of Enterprise Strategy

How to Scan Backups for Ransomware

Protect, Detect and Recover! The three key pillars a backup vendor is expected to offer when it comes to the NIST Cybersecurity Framework. The top priority on that list is protecting your data. A secure backup both on premises and in a private or public cloud offers immense protection. This can protect data from both a hacker accessing the backup server as well as the backup repository. Secondly, the ability to recovery quickly is crucial. Read more
Brad Linch
Brad Linch

Director of Enterprise Strategy

Veeam Backup for Microsoft 365 v6 Data Recovery Scenarios

Veeam Backup for Microsoft 365 is a solution that allows you to back up and restore Microsoft 365 data: Exchange Online, OneDrive for business, SharePoint Online, Teams. You can also protect data managed by this on-premises installations: Microsoft Exchange Server, Microsoft SharePoint Server. The purpose of this article is to illustrate how to restore access to your backup data in case of a disaster that impacted Veeam Backup for Microsoft 365 server. Read more
Raffaele Valensise
Raffaele Valensise

Advisory Systems Engineer