Business
|
January 17, 2023
3 min to read
At VNOG, we provide essential fire-fighting services and assistance in the event of accidents, disasters and crises to the 870,000 citizens of North and East Gelderland in the Netherlands. In this blog post, I’ll tell the story of my most memorable day as VNOG’s Chief Information Security Officer (CISO). Read more
Business
|
January 13, 2023 (Updated October 7, 2025)
4 min to read
7 Reasons to Adopt a Kubernetes-Native Backup Solution
According to a 2019 survey conducted by the Cloud Native Computing Foundation (CNCF), 78% of the respondents said they were using Kubernetes in some form, and 95% report they are using, evaluating or planning storage use in Kubernetes. Read more
Business
|
January 12, 2023 (Updated December 20, 2023)
7 min to read
Managing Backups as Code – Configuring IAM roles in Veeam Backup for AWS with AWS CloudFormation and Lambda
One of the cornerstones of Amazon Web Services (AWS) best practices is using multiple accounts to manage your workloads. Dedicating accounts to specific business units or even specific applications provides numerous benefits that increase agility, improve security and streamline operations. This practice also helps operators follow the principle of least privilege, whereby only a minimal set of privileges required to perform a task are assigned to responsible users and services, and ideally, only for the time required to complete the task. Read more
Technical
|
January 10, 2023 (Updated January 16, 2024)
4 min to read
Increasing Security and Minimizing Costs with AWS Gateway Endpoints
As your business embraces Amazon Web Services (AWS), it is imperative to ensure that your data remains secure/protected and you are minimizing costs. One of the ways to increase security and minimize costs in AWS is through a Gateway Endpoint. Read more
Technical
|
January 9, 2023 (Updated March 25, 2024)
5 min to read
Using Ansible to Manage Kubernetes Data Protection
In this blog we will be sharing some information about Ansible and then diving into how you can use Ansible to deploy Kasten K10 in a desired state either at scale for many Kubernetes clusters or a repeatable way to automate the deployment removing the human error factor, or it could be both. Read more
Business
|
December 29, 2022 (Updated June 12, 2024)
2 min to read
MSP Considerations when choosing BaaS & DRaaS in 2023
Welcome to another installment in our ongoing series from the Cloud Protection Trends Report for 2023, which surveyed 1,700 “as a Service” administrators, including those utilizing Backup as a Service (BaaS) and Disaster Recovery as a Service (DRaaS). Veeam contracts with independent research firms to ask questions on an assortment of topics – including what customers are looking for from their Managed Service Providers (MSP) when consuming BaaS or DRaaS services: Read more
Technical
|
December 28, 2022 (Updated July 15, 2024)
4 min to read
What is the Point? Comparing Microsoft Azure Service and Private Endpoints
Information is key in today’s business world. Not just having it, but making sure it does not end up in the wrong hands. This is true regardless if you are in a private cloud or leveraging a public cloud like Microsoft Azure. Read more
Business
|
December 8, 2022 (Updated September 23, 2024)
2 min to read
What is BaaS? And why are organizations embracing BaaS & DRaaS?
Welcome to another installment in our ongoing series from the Cloud Protection Trends Report for 2023, which surveyed 1,700 “as a Service” administrators, including those utilizing Backup as a Service (BaaS) and Disaster Recovery as a Service (DRaaS). Read more
Business
|
December 7, 2022 (Updated March 12, 2026)
5 min to read
Protecting your critical enterprise applications
Enterprises routinely face challenges when it comes to protecting their critical workloads. Meeting demanding Service Level Agreements (SLAs), unsought multi-team workflows, and convoluted or sprawling toolsets are just a few of the common constraints that organizations routinely face. When these challenges start to compound, you quickly wind up in situations where simple tasks can grind your applications to a halt. Read more
Technical
|
December 5, 2022 (Updated August 31, 2023)
5 min to read
How to Recover Quickly From a Ransomware Attack
Ransomware attacks need to be viewed under the same category as power outages and natural disasters. The requirement to recover quickly is a necessity. Recently, I'm seeing many vendors in the data protection industry advertise immutability and ransomware detection features. Both of which should absolutely be part of a company's ransomware strategy, but an immutable copy coming from spinning disk or tape can result in too much downtime for the business. It's an easy decision for a CEO or CFO if an attacker's ransom is $100,000 and the cost of downtime for a day is $500,000. The only question at that point becomes how do we make a Coinbase account to transfer Bitcoin? Read more