Veeam Blog
Filters (Results: 1597)
Results: 1597
Filters (Results: 1597)
Stay up to date on the latest tips and news
By subscribing, you are agreeing to have your personal information managed in accordance with the terms of Veeam’s Privacy Policy
You're all set!
Watch your inbox for our weekly blog updates.
OK

Understanding Disaster Recovery as a Service (DRaaS): Benefits, Use Cases, and Implementation Strategies 

Ransomware, hardware failures, and natural disasters all have one thing in common — they can stop your business in its tracks. In today’s threat landscape, recovery speed matters just as much as prevention. Disaster Recovery as a Service (DRaaS) delivers an on-demand, cloud-hosted environment to failover critical workloads and keep operations running when the unexpected strikes. Read more
Laura Maniscalco
Laura Maniscalco

Sr. Global Partner Marketing Manager

Secure by Design: Building a Safer Data Future

Cyberthreats are evolving at an unprecedented pace, and organizations must rethink their approach to data security. Traditional reactive measures are no longer sufficient. Enter Secure by Design, a proactive strategy aimed at embedding security into every stage of product development, ensuring robust defenses from day one. This blog explores the key principles, benefits, and practical applications of Secure by Design, and how organizations like Veeam are championing its adoption.

What is the Secure by Design Strategy?

The Secure by Design approach shifts the focus from reactive security such as patching vulnerabilities after deployment to integrating security measures during the development and deployment lifecycle. By prioritizing security early, organizations reduce the risk of cyber incidents and the costs associated with reactive security fixes.

Historically, ... Read more

5 Reasons Why You Should Be Backing Up Microsoft Entra ID

In today’s IT environments, Microsoft Entra ID (formerly Azure Active Directory) stands as the backbone of identity and access management (IAM) for most organizations.  It controls user access, secures sensitive data, and ensures smooth operations across the enterprise.  While businesses invest heavily in backing up servers and endpoints, one critical aspect often gets overlooked – backing up Entra ID.  Without a comprehensive backup strategy, organizations face a substantial amount of risk. Read more
Colin Hanks
Colin Hanks

Senior Product Marketing Manager

Will Law Enforcement Success Against Ransomware Continue in 2025?

Throughout 2024, law enforcement agencies worldwide intensified their fight against cybercrime, leading to significant arrests and takedowns of major cybercriminal groups. Q4 alone saw a substantial flurry of actions. On Oct. 1, 2024, authorities arrested four individuals linked to the notorious LockBit ransomware gang, including a developer, a bulletproof hosting service administrator, and two other affiliates. This followed formal sanctions imposed by the U.S. Treasury Department on LockBit members, marking a major step in disrupting the group's global operations. Later in the month, on Oct. 28, Dutch law enforcement executed Operation Magnus, successfully seizing the infrastructure of Redline and Meta Infostealer, two malware-as-a-service platforms used to steal sensitive credentials. Read more
Bill Siegel
Bill Siegel

CEO, Coveware by Veeam

Veeam is the Gold Standard for Kubernetes Data Protection; Five Years Running!

The hits keep coming! For the fifth year in a row, Veeam has been named a leader and outperformer in the newest edition of GigaOm’s Radar Report for Kubernetes Data Protection v5.0. This makes Veeam Kasten for Kubernetes the only solution to have achieved these results each year since the report’s inception. Read more
Thomas Keenan
Thomas Keenan

Senior Product Marketing Manager for Kasten by Veeam

Migrating Your Data Estate from an Incumbent Hypervisor to Nutanix AHV: Key Considerations with Veeam Data Platform

Introduction

Migrating from an incumbent hypervisor to Nutanix AHV offers numerous advantages, including simplified management, enhanced security, and improved total cost of ownership (TCO). To ensure a seamless transition and robust data protection, integrating Veeam Data Platform into your migration strategy is essential. This blog outlines the critical considerations and best practices for migrating your entire data estate to Nutanix AHV with the support of Veeam Data Platform.

Understanding Nutanix AHV and Veeam Data Platform

Nutanix AHV

Nutanix AHV is a native hypervisor integrated with the Nutanix Enterprise Cloud OS. It is designed to simplify virtualization by eliminating the need for additional virtualization management tools that are typically required with other hypervisors. Key benefits of AHV include:

Simplified Management: Unified management interface ... Read more
Billy Cashwell
Billy Cashwell

Principal Product Marketing Manager

Microsoft 365 Ransomware: Your Guide to Prevention and Fast Recovery

Ransomware remains one of the most damaging cyber threats to modern businesses and Microsoft 365 environments are a leading target. With millions of users and connected services like Exchange Online, SharePoint, OneDrive, and Teams, attackers see Microsoft 365 as a direct path to an organization’s most valuable data. Read more
Edward Watson
Edward Watson

Principal Product Marketing Manager

Understanding Microsoft 365 Security & Compliance

Microsoft 365 is the cornerstone of business communication worldwide, containing invaluable intellectual property and business-critical applications. It is vital to understand the threats to this landscape and how to mitigate the risks with native security and monitoring tools. In this blog, we will take a deeper look at these challenges, some steps you can take today to ensure these assets are protected, and some of the potential risks accepted by not acting. Lastly, we’ll cover how Veeam’s backup service can help with Microsoft 365 compliance needs. Read more
Karinne Bessette
Karinne Bessette

Global Technologist, Microsoft 365 Lead