Veeam Blog
Filters (Results: 486)
Results: 486
Filters (Results: 486)
  • Business Types (1)
Stay up to date on the latest tips and news
By subscribing, you are agreeing to have your personal information managed in accordance with the terms of Veeam’s Privacy Policy
You're all set!
Watch your inbox for our weekly blog updates.
OK

Are you prepared when ransomware does happen?

Knowing all the options to help protect your environment is great but it’s time to put the pieces together. The question you should be asking is not "If it will happen?" but "Are you prepared when it does happen?" Are you waiting for ransomware to activate in your environment or are you taking steps to mitigate damage before it happens? This article will help you take the steps today to answer those questions and what tools we offer to make this possible. Read more
Karinne Bessette
Karinne Bessette

Technologist, Product Strategy

How to capture and inspect network packets in Windows

Microsoft originally offered the Microsoft Network Monitor which was subsequently succeeded by the Microsoft Message Analyzer application. Unfortunately, Microsoft has discontinued the Microsoft Message Analyzer and removed its download links. Therefore, only the older Microsoft Network Monitor is available. In this article, we are going to see how to capture and inspect packets using the latest available version of Microsoft Network Monitor. Read more
Adam Bertram
Adam Bertram

Guest author

A PowerShell script to remotely install SQL Server service packs

Any Microsoft SQL database administrator (DBA) will need to patch a SQL installation at one time or another. Using PowerShell, this can be made far easier and more convenient, especially with large numbers of servers. In this article, we are going to build a simple script for patching SQL Servers with Service Packs. Read more
Adam Bertram
Adam Bertram

Guest author

How to resize a VM in Azure with PowerShell

In this tutorial, you will take a hands-on approach to resize a virtual machine in Azure with PowerShell. You will write code to mitigate the need to navigate to the Azure Portal and instead, manage the virtual machine with code from a text editor. Read more
Adam Bertram
Adam Bertram

Guest author

Azure data backup: a technical look at Veeam Backup for Microsoft Azure

Today, Veeam has announced the general availability of Veeam Backup for Microsoft Azure. It delivers native Azure backup for Microsoft Azure virtual machines (VMs), enabling users to cost-effectively and securely protect their cloud data to overcome any data loss scenario quickly and efficiently. What’s more, it also integrates with Veeam Backup & Replication, providing a single platform for hybrid cloud organizations to manage and migrate cloud, virtual and physical workloads effortlessly. Read more
David Hill
David Hill

Technologist, Product Strategy

3 storage options against ransomware

Everyday ransomware finds a new way to slip into an environment, from clicking on the wrong site to a compromised set of credentials. This leaves the very real feeling that you already are or will be infected. But there are ways to make it easier to sleep at night by implementing what we call the impenetrables – the form factors that are resilient ransomware. Veeam offers three ways to protect your data from even the nastiest ransomware attack. Let’s see how they can help give you peace of mind in the face of disaster. Read more
Karinne Bessette
Karinne Bessette

Technologist, Product Strategy

3 Critical Strategies for Protecting Remote Workers Data

As many organizations deal with the new rigors of remote-working and the challenge of protecting critical business data on PCs, we wanted to remind you of a few Veeam solutions that can help during stressful times and into the future. In this article, we’ll bring a Veeam perspective on tool configurations as well as provide some advice on business security and successful data protection. Read more
Andrey Stadler
Andrey Stadler

Global Technologist, Product Strategy

Protecting Remote Office 365 User Data

More people than ever are using these products to store business data due to its mobility, moving between computers in the office, at home, and the mobile devices in-between which has made the transition to remote workplaces tenable. With this convenience comes the problem with users' data being exposed to more endpoints and threats than it would have before. These threats not only come in the form of ransomware but misguided users updating the wrong section of a shared resource. Which is why protecting this data has never been more critical. Read more
Karinne Bessette
Karinne Bessette

Technologist, Product Strategy