Veeam Blog
Filters (Results: 586)
Results: 586
Filters (Results: 586)
  • Business Types (1)
Stay up to date on the latest tips and news
By subscribing, you are agreeing to have your personal information managed in accordance with the terms of Veeam’s Privacy Policy
You're all set!
Watch your inbox for our weekly blog updates.
OK

Top Threats in Microsoft 365 Security

Microsoft 365 is a cornerstone for businesses worldwide containing invaluable intellectual property and business-critical applications. It is vital to understand the threats facing this landscape and how to mitigate the risks with security considerations and monitoring. In this blog, we will take a deeper look at these challenges, some steps you can take today to ensure these assets are protected and some of the potential risks accepted by not acting. Read more
Karinne Bessette
Karinne Bessette

Technologist, Product Strategy

Best Practices for Secure Hybrid and Multi-Cloud Backup

Cloud computing has become ubiquitous and has reached the point where nearly half of all workloads run in the cloud. Currently, most organizations operate a combination of on-premise and cloud workloads, known as a hybrid cloud. Typically, they keep key services within their data centers and use the cloud for customer-facing services, software applications and flexible data storage. The hybrid cloud model is ideal because it is not always possible, or even wise, to move everything to the cloud for reasons like cost, performance and compliance. Read more
Sam Nicholls
Sam Nicholls

Principal, Product Marketing

Microsoft 365 Recovery Best Practices 

The fact that organizations need to backup their Microsoft 365 deployments has been well established. Microsoft is based on a shared responsibility model in which Microsoft is responsible for protecting the underlying infrastructure, and subscribers are responsible for protecting their own data. This means that if you use Microsoft 365, you have to back up your own data.  In their Services Agreement, Microsoft makes it very clear on the delineation around customer data, “We don’t claim ownership of Your Content. Your Content remains Your Content, and you are responsible for it.” Read more
Brien Posey
Brien Posey

Scientist-Astronaut Candidate, Internationally Best Selling Technology Author, and Speaker

Using Kasten K10 for Ransomware Attack Prevention

Ransomware attacks are on the rise – in 2021, the number of ransomware attacks rose by 92.7% compared to 2020 levels, with 2,690 attacks reported. In this short article, we’ll show you how Kasten K10 by Veeam can be leveraged to detect a common ransomware pattern in order to prevent data loss or corruption. Read more

Does Microsoft Protect Microsoft 365 Data?

Welcome back to the second part of our three-part blog series, where we continue to revisit what leading IT analyst firm, Gartner, suggests for protecting Microsoft 365. In the first post, we looked at what Gartner identified as risks associated with Microsoft 365. Read more
Karinne Bessette
Karinne Bessette

Technologist, Product Strategy

Going Under the Hood of the Newest Veeam Backup for Salesforce

Just around a week ago, we released a new version for Veeam Backup for Salesforce (VBSF) and have been seeing warm reception from our customers for it. As the fog has cleared a bit, it’s finally a good time to get deeper into the product itself and see it in action. You might already know that this version has many new capabilities and under-the-hood enhancements, and I’d like to talk about my favorites. Join me as we sit down and tackle them by going through the major buckets, starting with security. Read more
Andrey Stadler
Andrey Stadler

Global Technologist, Product Strategy