Veeam Blog
Filters (Results: 212)
Results: 212
Filters (Results: 212)
  • Business Types (1)
Stay up to date on the latest tips and news
By subscribing, you are agreeing to have your personal information managed in accordance with the terms of Veeam’s Privacy Policy
You're all set!
Watch your inbox for our weekly blog updates.
OK

5 Top ransomware exploits that you should know

Today’s highway robber is a lot more sophisticated and savvy. They take far less risk and turn to the latest technology to extort you out of your money by threatening your valuables. In this case your data, your technology and most probably your computing ability.

Of course, I’m talking now about ransomware, the threat that’s been in the news almost every day for the past couple of months. The tool of choice for the modern highway robber has become headline news around the world with variants such as WannaCry and the more recent Popcorn Time. Organizations around the world have been affected by this ransomware, from the UK National Health Service, through to the Russian Postal Service in the last few ... Read more

How to benefit from Veeam ONE: VM Monitoring, performance optimization, reporting and more!

Complete visibility within the data center is essential to keeping businesses available 24.7.365. Visibility into the data center allows IT administrators to properly utilize resources, be proactive in troubleshooting issues and run reports on their environment. Veeam allows businesses to remain proactive in monitoring and managing their environment through Veeam ONE. If you haven’t heard about it, you are truly missing out, as it works not only for your Veeam-powered data protection operations, but for entire VMware vSphere and Microsoft Hyper-V environments as well.

Read more
Kirsten Stoner
Kirsten Stoner

Technologist and Program Lead

GDPR one year out — Considerations for the next 12 months

Here we are, one year out. Just 365 days separate us from the enforcement of the General Data Protection Regulation (GDPR), one of the biggest changes to how personal data is handled and managed in the last 20 years. If you’re reading this blog, you’re likely affected by it either as an employee of a business with customers in the EU, as a EU citizen yourself or perhaps both.

At Veeam, we believe in rules that protect the rights of consumers, and have welcomed GDPR since it was adopted by the European Council some 14 months ago.

What is it all about, and why now?

In short, GDPR strengthens and gives new rights to individuals over their personal data such as: Who can ... Read more

Danny Allan
Danny Allan

Chief Technology Officer (CTO) and Senior Vice President (SVP), Product Strategy

Recovery fundamentals in the event of a worldwide ransomware cyber-attack

The event that has been named the “largest hacking in history,” where more than 100,000 ransomware attacks affected 150 countries last Friday, reads very much like a script from a Hollywood blockbuster. However, these events occurred and had very real effects on the victims.

The attacks have been stopped since writing this post, but the experts warn that “copy cats” could be encouraged to try this again.

While the majority of focus has been on the source of the vulnerability and the group responsible for these attacks, organizations need to consider what should be done to ensure that these kinds of attacks cause minimal disruption to their applications and systems if they happen again.

As with all malware and ... Read more

Danny Allan
Danny Allan

Chief Technology Officer (CTO) and Senior Vice President (SVP), Product Strategy

New FREE Downloadable e-book: Conversational Ransomware Defense and Survival

Veeam and Conversational Geeks collaborated to publish Conversational Ransomware Defense and Survival, an e-book that illustrates the fundamentals for ransomware preparation, protection and recovery. As the title suggests, the book is written in a conversational tone, so it’s easy to read and it addresses both the unlucky ones who have already struggled with ransomware and those who are willing to learn more about this cybersecurity threat.

Read more

Ransomware resiliency & Availability: The endpoint is a great place to start

Fighting ransomware has become a part of doing business today. Technology professionals around the world are advocating many ways to stay resilient. The most effective method is to have end-user training on how to handle and operate attachments and connectivity to the Internet. One other area to look is frequent endpoint devices: Laptops and PCs.

Read more
Rick Vanover
Rick Vanover

Vice President, Product Strategy

FREE Veeam tools for powerful data protection

Sometimes, circumstances can vary and you need to adjust your company’s investments based on its resources. Being on a budget and reducing investments can weaken key areas of your organization, but the integrity of your data shouldn’t be affected. At Veeam, we have many FREE solutions ready to sharpen the reliability of your data. Today, I will showcase some of our free tools and explain how you can actually reach a high level of protection at no cost, for both your organization and your personal use.

Read more

How to choose a trusted cloud service provider

There’s a plethora of different cloud service providers out there. They range from traditional integrators offering backup services on top of their managed offerings to Information as a Service (IaaS) providers looking to specialize in business continuity and disaster recovery (DR), and even to the hyper-scale public clouds that offer platform services that can be consumed as part of an off-site backup solution. It’s important to understand the requirements around choosing cloud service providers that offer data backup, replication and recovery services, whether you are a large enterprise or a small-to-medium-size business (SMB).

Read more
Anthony Spiteri
Anthony Spiteri

Regional CTO APJ, Veeam Product Strategy & Lead Cloud and Service Provider Technologist

Ransomware as a Service: Air gapped backups became more important than ever

I’ve heard about the "Ransomware as a Service" concept before and it was a big eye opener to me in regards to the real level of threat we could be facing soon. And last week, I found this blog post that went into detail about RaaS and new threats. Take some time to read it, because I think RaaS will change IT as we know it.

Read more
Anton Gostev
Anton Gostev

Senior Vice President, Product Management

Cloud backup customization

Cloud is a viable option for many use cases, including but not limited to storage, critical workload management, disaster recovery and much more. And as we have covered in our previous concerns related to this series, it can also be made secure, reasonably priced, and migration can be simplified. We found one of the major cloud concerns in last year’s end user survey to be customization. Let’s dive into where customization and the cloud meet.

Read more