Veeam Blog
Filters (Results: 1599)
Results: 1599
Filters (Results: 1599)
Stay up to date on the latest tips and news
By subscribing, you are agreeing to have your personal information managed in accordance with the terms of Veeam’s Privacy Policy
You're all set!
Watch your inbox for our weekly blog updates.
OK

Veeam University: Empowering Your Journey in a Digital World

At Veeam, we believe in the power of education and collaboration to drive success in today’s digital landscape. The success of Veeam has always been rooted in placing the customer at the center of our efforts. Read more

Understanding Immutable Backups and Their Role in Cyber Resilience

To keep businesses running, a secure backup is a priority for the best data protection strategy. Data Security, one of Veeam’s core pillars for data protection, focuses on data accessibility and backup immutability. Immutability remains a hot topic, especially around ransomware, with many vendors and organizations adopting immutable technologies for cyber resiliency. So, what exactly are immutable backups and why should you use them in your data protection strategy? Read more
Emilee Tellez
Emilee Tellez

Field CTO, Veeam OR Director of Product Strategy

Crafting an Effective Incident Response Plan

No organization is immune to cyberthreats. 75% of organizations experienced at least one ransomware attack in 2023, meaning having a robust Incident Response Plan (IRP) is no longer optional  — it’s a necessity. An incident response plan acts as your organization's defense playbook, ensuring a swift, coordinated response to mitigate damage, minimize downtime, and protect sensitive data. Read more

 What’s New in Veeam Recovery Orchestrator 7.2?

In 2025, enterprises face mounting challenges in meeting new regulatory requirements and maintaining compliance. This year marks the full implementation of the Digital Operational Resilience Act (DORA) for countries part of the European Union (EU), requiring financial institutions as well as certain third-party service providers to demonstrate their ability to withstand, respond to, and recover from various disruptions and cyberthreats. Meanwhile, in the United States, the Cybersecurity, and Infrastructure Security Agency (CISA) is finalizing mandatory cyberattack reporting regulations for those organizations that fall into the category of Critical Infrastructure as defined by the Cyber Incident Reporting for Critical Infrastructure Act (CIRCIA). Read more
Emilee Tellez
Emilee Tellez

Field CTO, Veeam OR Director of Product Strategy

Enhancing Business Continuity with the Digital Operational Resilience Act

In the digital age, cybersecurity is not just about protecting data; it’s about ensuring that the very fabric of our financial systems remain intact and resilient against threats. The introduction of the Digital Operational Resilience Act (DORA) by the European Union marks a significant milestone in the journey toward a safer and more stable financial ecosystem. The financial services sector, together with their cybersecurity and resilience structures, has witnessed firsthand the evolution of digital threats and the increasing sophistication of cyber adversaries. It is against this backdrop that we delve into the importance of DORA and its potential to redefine the landscape of financial services, cybersecurity, and resilience. Read more
Andre Troskie
Andre Troskie

EMEA Field CISO

Adam Bergh
Adam Bergh

Technical Alliances Director, Global Systems Integrators

Understanding Disaster Recovery as a Service (DRaaS): Benefits, Use Cases, and Implementation Strategies 

Ransomware, hardware failures, and natural disasters all have one thing in common — they can stop your business in its tracks. In today’s threat landscape, recovery speed matters just as much as prevention. Disaster Recovery as a Service (DRaaS) delivers an on-demand, cloud-hosted environment to failover critical workloads and keep operations running when the unexpected strikes. Read more
Laura Maniscalco
Laura Maniscalco

Sr. Global Partner Marketing Manager

Secure by Design: Building a Safer Data Future

Cyberthreats are evolving at an unprecedented pace, and organizations must rethink their approach to data security. Traditional reactive measures are no longer sufficient. Enter Secure by Design, a proactive strategy aimed at embedding security into every stage of product development, ensuring robust defenses from day one. This blog explores the key principles, benefits, and practical applications of Secure by Design, and how organizations like Veeam are championing its adoption.

What is the Secure by Design Strategy?

The Secure by Design approach shifts the focus from reactive security such as patching vulnerabilities after deployment to integrating security measures during the development and deployment lifecycle. By prioritizing security early, organizations reduce the risk of cyber incidents and the costs associated with reactive security fixes.

Historically, ... Read more