Veeam Blog
Filters (Results: 368)
Results: 368
Filters (Results: 368)
  • Business Types (1)
Stay up to date on the latest tips and news
By subscribing, you are agreeing to have your personal information managed in accordance with the terms of Veeam’s Privacy Policy
You're all set!
Watch your inbox for our weekly blog updates.
OK

Understanding Hybrid Cloud Management

Hybrid cloud management involves a mixed computing environment, comprising a mixture of public clouds and private clouds or on-premises infrastructure. Many organizations use a hybrid cloud architecture because it allows them to spread workloads over multiple data centers and cloud providers to extend their capabilities while retaining existing hardware and services. Read more
Sam Nicholls
Sam Nicholls

Principal, Product Marketing

Top 8 AWS Security Best Practices

Securing your cloud infrastructure is of utmost importance to protect your data and ensure the integrity and availability of your AWS resources. In this comprehensive guide, we will explore AWS security best practices to help you fortify your cloud environment. By implementing these practices, you can enhance the overall security posture of your AWS infrastructure and minimize the risk of security breaches. Read more
AWS
Julia Furst Morgado
Julia Furst Morgado

Product Strategy Technology

Roy Adiel
Roy Adiel

Cloud Solutions Architect

Comprehensive Overview of Google Cloud Security

Integrating Google Cloud security measures is crucial to enhancing the security of digital assets in the cloud. By leveraging Google Cloud's security infrastructure, businesses can ensure that their sensitive data, trade secrets, personal information, intellectual property, and financial data is well-protected. Implementing proper access controls, encryption protocols, and utilizing monitoring capabilities offered by Google Cloud can significantly reduce the risk of unauthorized access and potential data breaches. Read more
Cody Ault
Cody Ault

Staff Solutions Architect

Cloud Workload Protection: Secure Your Cloud Data

These days, organizations are migrating more and more workloads to the cloud. While this may make their work more efficient, this may be seen as just another opportunity for cybercriminals. Cloud environments contain massive amounts of sensitive data, which makes them prime targets for hackers. Read more
Kelsey Teske
Kelsey Teske

Product Marketing Manager

Guide to Google Cloud Disaster Recovery

Modern companies rely on their ability to leverage their data and applications to function in almost every aspect of their business, whether it’s their website used for e-commerce, inventory databases, and industrial controls for manufacturers, sales and customer relation management systems, medical records, or payment systems. Without these capabilities, hospitals, utility companies, and emergency services can’t function and provide critical services. Companies could be unable to serve customers, take new orders, or manufacture products, causing loss of revenue and failing to meet obligations or even face regulatory penalties.   Read more
Cody Ault
Cody Ault

Staff Solutions Architect

The State of Enterprise Kubernetes

As we kick off the new year, it’s the perfect time for a fresh start and a shift in perspectives. With this in mind, in the latter part of 2023 we joined forces with Dzone and surveyed software developers, architects, and other IT pros seeking to refresh our understanding of the state of Kubernetes adoption across enterprises. The result? Our comprehensive report, Kubernetes in the Enterprise. Read more
Thomas Keenan
Thomas Keenan

Senior Product Marketing Manager for Kasten by Veeam