Veeam Blog
Filters (Results: 1576)
Results: 1576
Filters (Results: 1576)
  • Business Types (1)
Stay up to date on the latest tips and news
By subscribing, you are agreeing to have your personal information managed in accordance with the terms of Veeam’s Privacy Policy
You're all set!
Watch your inbox for our weekly blog updates.
OK

Managed Kubernetes Explained: Comparing AKS, EKS, and GKE

In the ever-evolving world of cloud computing, Kubernetes has emerged as a powerful orchestration platform for containerized applications. However, managing and maintaining a Kubernetes cluster can sometimes be complex and resource-intensive. This is where managed Kubernetes services come into play, since they offer a streamlined and efficient solution for organizations who want to leverage the power of Kubernetes without the operational overhead. Read more
Julia Furst Morgado
Julia Furst Morgado

Product Strategy Technology

How Veeam Addresses VM Migration Challenges

In today’s rapidly evolving IT landscape, the ability to efficiently migrate virtual machines (VMs) is crucial for businesses aiming to enhance infrastructure performance and scalability. VM migration enables organizations to move workloads between different environments, whether it's on-premises, to the cloud, or between different hypervisors. Read more
Billy Cashwell
Billy Cashwell

Principal Product Marketing Manager

Salesforce Disaster Recovery Plan

Salesforce is a critical system for managing customer data and business operations. Protecting this data against threats such as accidental deletions, cyberattacks, and system failures is essential. Implementing an effective Salesforce disaster recovery plan ensures business continuity and data integrity. Read more
Alison Connor
Alison Connor

Senior Product Marketing Manager

Ransomware Trends Report 2024: Where to Recover & How to Ensure Cleanliness

For the third year in a row, an independent research firm surveyed IT leaders and implementers whose organizations suffered at least one ransomware attack in 2023. This year’s report surveyed 1,200 respondents — comprised of CISOs (or executives with similar responsibility), security professionals, and backup administrators Read more
Jason Buffington
Jason Buffington

Vice President, Market Strategy

Emilee Tellez
Emilee Tellez

What is WORM (Write Once, Read Many)?

As data privacy and retention laws tighten across industries, navigating compliance can seem like a daunting task. Enter "write once, read many" (WORM) storage: a straightforward solution that’s designed to anchor your data securely in place and protect it from accidental changes and deliberate threats.   Read more
Alexey Strygin
Alexey Strygin
Marco Escobar
Marco Escobar

Solutions Architect