Veeam Blog
Filters (Results: 1605)
Results: 1605
Filters (Results: 1605)
Stay up to date on the latest tips and news
By subscribing, you are agreeing to have your personal information managed in accordance with the terms of Veeam’s Privacy Policy
You're all set!
Watch your inbox for our weekly blog updates.
OK

What is Threat Hunting? Techniques, Tools, and Types

Proactive measures are crucial for safeguarding sensitive information and ensuring the integrity of digital infrastructures. Threat hunting has become a vital component in this realm, enabling organizations to detect and mitigate potential security threats before they can cause significant damage. Read more

Veeam is More+. Destination: Data Portability.

With so many new methods to build and run applications at our fingertips, not to mention changes in the market, organizations are constantly looking at new platforms to adopt and applications to modernize. Read more
Alan Baptista
Alan Baptista

Product Marketing Director

Veeam Supports Rocky Linux 9 for Immutable Backups

At Veeam, we continually strive to provide the most robust, secure, and reliable data protection solutions. Today, we're excited to announce a significant development in that pursuit: Veeam's new support for Rocky Linux 9.4 in Veeam Backup & Replication v12.2, complete with the DISA STIG security profile. Read more
Hannes Kasparick
Hannes Kasparick

Director, Product Management