Veeam Blog
Filters (Results: 942)
Results: 942
Filters (Results: 942)
Stay up to date on the latest tips and news
By subscribing, you are agreeing to have your personal information managed in accordance with the terms of Veeam’s Privacy Policy
You're all set!
Watch your inbox for our weekly blog updates.
OK

Microsoft 365 Data Protection: A Practical Guide

Safeguarding the sensitive information within your Microsoft 365 environment is more important than ever. From accidental deletion and ransomware attacks to costly compliance failures, the consequences of inadequate data protection can be severe. Read more
Edward Watson
Edward Watson

Principal Product Marketing Manager

NIS2 Directive Explained: Duty of Care for Data

In the digital age, cybersecurity is not just about protecting data; it is about ensuring the very fabric of our critical infrastructure remains intact and resilient against threats. The introduction of the Network and Information Security Directive 2 (NIS2) by the European Union marks a significant milestone in the journey toward a safer, more stable digital ecosystem. Read more
Andre Troskie
Andre Troskie

EMEA Field CISO

Accelerating Success: The Veeam Partner Onboarding Journey

Welcoming new partners to our Veeam family is a top priority! Partners have made the choice to grow with us as a strategic decision to enhance their business and provide unrivalled solutions to their customers. In this blog, we will explore the Veeam partner onboarding process. Read more
Jason Jenkinson
Jason Jenkinson

Senior Manager of Global Channel Marketing

Enhancing Cyber Resilience Through IT and Security Collaboration

Cybersecurity threats are becoming increasingly complex and sophisticated and pose significant risks to organizations of all sizes. This evolving threat landscape includes a range of challenges such as advanced persistent threats (APTs), ransomware, phishing attacks, and zero-day vulnerabilities. Read more
Jason Buffington
Jason Buffington

Vice President, Market Strategy

Andre Troskie
Andre Troskie

EMEA Field CISO

Microsoft 365 Immutability: Securing Data Against Threats

Microsoft 365 offers built-in immutability features to meet these data protection and compliance needs without the cost and complexity of traditional bolt-on archiving solutions. Read on to learn how Microsoft 365’s in-place retention, preservation, and archiving capabilities allow you to easily render data immutable while keeping it accessible for discovery within the native user workflows. Read more
Alison Connor
Alison Connor

Senior Product Marketing Manager

Announcing the 2024 Ransomware Trends Report

The third annual Veeam Ransomware Trends Report is officially here. Each year, independent analysts survey unbiased and vetted organizations that experienced at least one cyberattack (breach/ransom/etc.) in the preceding 12 months. Read more
Jason Buffington
Jason Buffington

Vice President, Market Strategy

Megan Schillereff
Megan Schillereff