Veeam Blog
Filters (Results: 920)
Results: 920
Filters (Results: 920)
  • Business Types (1)
Stay up to date on the latest tips and news
By subscribing, you are agreeing to have your personal information managed in accordance with the terms of Veeam’s Privacy Policy
You're all set!
Watch your inbox for our weekly blog updates.
OK

Enhancing Business Continuity with the Digital Operational Resilience Act

In the digital age, cybersecurity is not just about protecting data; it’s about ensuring that the very fabric of our financial systems remain intact and resilient against threats. The introduction of the Digital Operational Resilience Act (DORA) by the European Union marks a significant milestone in the journey toward a safer and more stable financial ecosystem. The financial services sector, together with their cybersecurity and resilience structures, has witnessed firsthand the evolution of digital threats and the increasing sophistication of cyber adversaries. It is against this backdrop that we delve into the importance of DORA and its potential to redefine the landscape of financial services, cybersecurity, and resilience. Read more
Andre Troskie
Andre Troskie

EMEA Field CISO

Adam Bergh
Adam Bergh

Technical Alliances Director, Global Systems Integrators

Understanding Disaster Recovery as a Service (DRaaS): Benefits, Use Cases, and Implementation Strategies 

Ransomware, hardware failures, and natural disasters all have one thing in common — they can stop your business in its tracks. In today’s threat landscape, recovery speed matters just as much as prevention. Disaster Recovery as a Service (DRaaS) delivers an on-demand, cloud-hosted environment to failover critical workloads and keep operations running when the unexpected strikes. Read more
Laura Maniscalco
Laura Maniscalco

Sr. Product Marketing Manager, VCSP

Secure by Design: Building a Safer Data Future

Cyberthreats are evolving at an unprecedented pace, and organizations must rethink their approach to data security. Traditional reactive measures are no longer sufficient. Enter Secure by Design, a proactive strategy aimed at embedding security into every stage of product development, ensuring robust defenses from day one. This blog explores the key principles, benefits, and practical applications of Secure by Design, and how organizations like Veeam are championing its adoption.

What is the Secure by Design Strategy?

The Secure by Design approach shifts the focus from reactive security such as patching vulnerabilities after deployment to integrating security measures during the development and deployment lifecycle. By prioritizing security early, organizations reduce the risk of cyber incidents and the costs associated with reactive security fixes.

Historically, ... Read more

5 Reasons Why You Should Be Backing Up Microsoft Entra ID

In today’s IT environments, Microsoft Entra ID (formerly Azure Active Directory) stands as the backbone of identity and access management (IAM) for most organizations.  It controls user access, secures sensitive data, and ensures smooth operations across the enterprise.  While businesses invest heavily in backing up servers and endpoints, one critical aspect often gets overlooked – backing up Entra ID.  Without a comprehensive backup strategy, organizations face a substantial amount of risk. Read more
Colin Hanks
Colin Hanks

Product Marketing Manager, SMB Velocity

Will Law Enforcement Success Against Ransomware Continue in 2025?

Throughout 2024, law enforcement agencies worldwide intensified their fight against cybercrime, leading to significant arrests and takedowns of major cybercriminal groups. Q4 alone saw a substantial flurry of actions. On Oct. 1, 2024, authorities arrested four individuals linked to the notorious LockBit ransomware gang, including a developer, a bulletproof hosting service administrator, and two other affiliates. This followed formal sanctions imposed by the U.S. Treasury Department on LockBit members, marking a major step in disrupting the group's global operations. Later in the month, on Oct. 28, Dutch law enforcement executed Operation Magnus, successfully seizing the infrastructure of Redline and Meta Infostealer, two malware-as-a-service platforms used to steal sensitive credentials. Read more
Bill Siegel
Bill Siegel

CEO & Co-founder of Coveware

Veeam is the Gold Standard for Kubernetes Data Protection; Five Years Running!

The hits keep coming! For the fifth year in a row, Veeam has been named a leader and outperformer in the newest edition of GigaOm’s Radar Report for Kubernetes Data Protection v5.0. This makes Veeam Kasten for Kubernetes the only solution to have achieved these results each year since the report’s inception. Read more

Migrating Your Data Estate from an Incumbent Hypervisor to Nutanix AHV: Key Considerations with Veeam Data Platform

Introduction

Migrating from an incumbent hypervisor to Nutanix AHV offers numerous advantages, including simplified management, enhanced security, and improved total cost of ownership (TCO). To ensure a seamless transition and robust data protection, integrating Veeam Data Platform into your migration strategy is essential. This blog outlines the critical considerations and best practices for migrating your entire data estate to Nutanix AHV with the support of Veeam Data Platform.

Understanding Nutanix AHV and Veeam Data Platform

Nutanix AHV

Nutanix AHV is a native hypervisor integrated with the Nutanix Enterprise Cloud OS. It is designed to simplify virtualization by eliminating the need for additional virtualization management tools that are typically required with other hypervisors. Key benefits of AHV include:

Simplified Management: Unified management interface ... Read more
Billy Cashwell
Billy Cashwell

Principal Product Marketing Manager

Microsoft 365 Ransomware: Your Guide to Prevention and Fast Recovery

Ransomware remains one of the most damaging cyber threats to modern businesses and Microsoft 365 environments are a leading target. With millions of users and connected services like Exchange Online, SharePoint, OneDrive, and Teams, attackers see Microsoft 365 as a direct path to an organization’s most valuable data. Read more
Edward Watson
Edward Watson

Principal, Product Marketing Manager