Veeam Blog
Filters (Results: 585)
Results: 585
Filters (Results: 585)
  • Business Types (1)
Stay up to date on the latest tips and news
By subscribing, you are agreeing to have your personal information managed in accordance with the terms of Veeam’s Privacy Policy
You're all set!
Watch your inbox for our weekly blog updates.
OK

How Veeam Addresses VM Migration Challenges

In today’s rapidly evolving IT landscape, the ability to efficiently migrate virtual machines (VMs) is crucial for businesses aiming to enhance infrastructure performance and scalability. VM migration enables organizations to move workloads between different environments, whether it's on-premises, to the cloud, or between different hypervisors. Read more
Billy Cashwell
Billy Cashwell

Principal Product Marketing Manager

Salesforce Disaster Recovery Plan

Salesforce is a critical system for managing customer data and business operations. Protecting this data against threats such as accidental deletions, cyberattacks, and system failures is essential. Implementing an effective Salesforce disaster recovery plan ensures business continuity and data integrity. Read more
Alison Connor
Alison Connor

Senior Product Marketing Manager

What is WORM (Write Once, Read Many)?

As data privacy and retention laws tighten across industries, navigating compliance can seem like a daunting task. Enter "write once, read many" (WORM) storage: a straightforward solution that’s designed to anchor your data securely in place and protect it from accidental changes and deliberate threats.   Read more
Alexey Strygin
Alexey Strygin
Marco Escobar
Marco Escobar

Solutions Architect

Veeam Kasten V7.0 is FIPS 140-3 Compliant

The announcement of Veeam Kasten for Kubernetes V7.0 at Red Hat Summit 2024 brings over 30 new features and enhancements, including the addition of Federal Information Protection Standard (FIPS) for federal sector customers. Read more

Planning for the Future: Veeam and Microsoft 365 Backup Storage

As data within Microsoft 365 continues to grow exponentially, businesses face numerous challenges in securing and protecting their critical information. With over two billion files created daily in Microsoft 365 and some tenants experiencing petabytes of growth each month, it is evident that protecting Microsoft 365 data has become a pressing consideration. Read more
Edward Watson
Edward Watson

Principal, Product Marketing Manager

A Guide to Implementing Effective Data Retention in Microsoft 365

As a business leader or IT professional, you know that effective data retention is essential for maintaining regulatory compliance, optimizing storage costs, and securing your organization's Microsoft 365 data. However, implementing and managing retention policies across Exchange, SharePoint, Teams, and other Microsoft 365 services can be complex. Read more
Alison Connor
Alison Connor

Senior Product Marketing Manager

Understanding Virtualization and Containerization

As technology continues to advance, optimizing resources by balancing investment between infrastructure and application deployment becomes increasingly important. Two leading methods for addressing these challenges are virtualization and containerization. Read more

Azure Security Cloud Strategy 

As an IT professional, you know that security is paramount when migrating your systems and data to the cloud. Microsoft Azure provides a comprehensive set of built-in security capabilities to protect your cloud environment, but fully optimizing these features requires forethought and diligence. Read more