Veeam Blog
Filters (Results: 152)
Results: 152
Filters (Results: 152)
  • Business Types (1)
Stay up to date on the latest tips and news
By subscribing, you are agreeing to have your personal information managed in accordance with the terms of Veeam’s Privacy Policy
You're all set!
Watch your inbox for our weekly blog updates.
OK

New FREE Downloadable e-book: Conversational Ransomware Defense and Survival

Veeam and Conversational Geeks collaborated to publish Conversational Ransomware Defense and Survival, an e-book that illustrates the fundamentals for ransomware preparation, protection and recovery. As the title suggests, the book is written in a conversational tone, so it’s easy to read and it addresses both the unlucky ones who have already struggled with ransomware and those who are willing to learn more about this cybersecurity threat.

Read more

Ransomware resiliency & Availability: The endpoint is a great place to start

Fighting ransomware has become a part of doing business today. Technology professionals around the world are advocating many ways to stay resilient. The most effective method is to have end-user training on how to handle and operate attachments and connectivity to the Internet. One other area to look is frequent endpoint devices: Laptops and PCs.

Read more
Rick Vanover
Rick Vanover

Senior Director, Product Strategy

FREE Veeam tools for powerful data protection

Sometimes, circumstances can vary and you need to adjust your company’s investments based on its resources. Being on a budget and reducing investments can weaken key areas of your organization, but the integrity of your data shouldn’t be affected. At Veeam, we have many FREE solutions ready to sharpen the reliability of your data. Today, I will showcase some of our free tools and explain how you can actually reach a high level of protection at no cost, for both your organization and your personal use.

Read more

Ransomware as a Service: Air gapped backups became more important than ever

I’ve heard about the "Ransomware as a Service" concept before and it was a big eye opener to me in regards to the real level of threat we could be facing soon. And last week, I found this blog post that went into detail about RaaS and new threats. Take some time to read it, because I think RaaS will change IT as we know it.

Read more
Anton Gostev
Anton Gostev

Senior Vice President, Product Management

Cloud disaster recovery models: planning and testing

Modern enterprises know that disasters are a fact of life. They also understand that disasters come in many shapes and sizes and lead to varying degrees of Availability loss and impact on business continuity. Because major wide-scale disasters occur way less often than smaller disasters from within a data center, it’s also important to plan and test cloud disaster recovery models for smaller disasters that can happen at VM, guest OS or application levels. In this article we'll talk about the importance of planning and testing your DR strategy, as well as the categories of the cloud disaster recovery models. Read more
Anthony Spiteri
Anthony Spiteri

Regional CTO APJ, Veeam Product Strategy & Lead Cloud and Service Provider Technologist

Ransomware Survey: By the Numbers

If one thing has the attention of IT decision makers worldwide, it is the risk of ransomware. We frequently see headlines on outages caused by ransomware and the reality is that this is a big problem for organizations of all shapes and sizes.

Veeam has taken ransomware seriously for a while now . We’ve incorporated features into products, as well as started recommending technical practices and designs to provide resiliency to recover, should there be an incident. We took an additional step and tried to quantify ransomware incidents and some of this information was shocking. One important issue that I’ve raised recently in regard to ransomware is for anyone who thinks it is just a PC problem: It can be a ... Read more

Rick Vanover
Rick Vanover

Senior Director, Product Strategy

7 Practical tips to prevent ransomware attacks on backup storage

The ransomware threat is real and it’s much more than just a PC problem. Here at Veeam, we see customers and partners encounter ransomware in a number of situations including the data center. One important part of being resilient to ransomware is being able to recover from backups. That’s the Availability you want when things don’t go as planned, should ransomware become an issue in your data center. Here are a number of tips I’ve prepared to incorporate into your designs, both new designs and existing designs using Veeam. Not using Veeam yet? No worries, you can take this advice and implement it accordingly.

Read more
Rick Vanover
Rick Vanover

Senior Director, Product Strategy

How to protect your data from ransomware and encryption Trojans

Media coverage on the various versions of encryption Trojans are coming fast and furious. These threats are meant to extort money out of the infected and are otherwise known as ransomware.

Trojan malware like Locky, TeslaCrypt and CryptoLocker are the variations currently used to attack companies. The breach gateways are often security loopholes in web browsers and their plugins or inadvertently opened email attachments. Once inside the company, the ransomware can spread at breakneck speeds and begin to encrypt valuable data. The FBI recommends companies implement a solid ransomware backup and recovery strategy for effective protection against data loss caused by CryptoLocker or any other Trojan.

Read more

Veeam Endpoint Backup FREE 1.5 is here!

Every time I view the latest download statistics, read through the product reviews on communities such as Reddit or Spiceworks and others, or just watch demo videos on YouTube, I am amazed with the tremendous success of Veeam Endpoint Backup FREE. To tell the truth, we are very proud of getting so much feedback from you, since it keeps us busy delivering the most-demanded functionality to your Windows-based devices.

Today, I would like to introduce our next update, Veeam Endpoint Backup FREE 1.5, and shed a little light on its new features.

Read more

Is Your Government Data Center Protected from the Zombie Horde!?!

Happy Halloween, Veeamers! In the spirit of the season, we're having some fun!

I recently participated in a video interview with Kristy Dalton, GovGirl – the topic of the discussion was how a zombie apocalypse could destroy our data center. This sounds like a tall tale, but disasters can happen to your data. Read on to see how the 3-2-1 rule and more can help your data center.

Imagine the scenario of a zombie apocalypse. The city is being overtaken by the horde, phones are ringing off the hook, it’s complete pandemonium, and all systems are down! This scenario for the IT professional definitely falls in line with the "other duties" category in the job ... Read more