Veeam Blog
Filters (Results: 20)
Results: 20
Filters (Results: 20)
  • Business Types (1)
Stay up to date on the latest tips and news
By subscribing, you are agreeing to have your personal information managed in accordance with the terms of Veeam’s Privacy Policy
You're all set!
Watch your inbox for our weekly blog updates.
OK

The Data Protection Blind Spot: What You’re Missing Below the Surface

Left unmanaged, data sprawl creates chaos that weakens operational control and increases risk. Risk can come in all shapes and forms: accommodating for increased expenses associated with data growth, keeping that data safe from threats while maintaining compliance, or even recovering that data without violating your RPO or RTO. While hypervisors and cloud platforms are often the first that come to mind, unstructured data frequently holds years of organizational knowledge that must not be overlooked. Read more
Matt Crape
Matt Crape

Senior Technical Product Marketer

Veeam Named a Leader in 2025 Gartner® Magic Quadrant™ for Backup and Data Protection Platforms

I’m proud to announce that Veeam has once again been recognized as a Leader in the 2025 Gartner® Magic Quadrant™ for Backup and Data Protection Platforms, marking the 9th time in a row we’ve earned this distinction and the 6th consecutive year we’ve been awarded the Highest in Ability to Execute. Read more
Dave Russell
Dave Russell

Vice President, Enterprise Strategy

The Two Pillars of Microsoft 365 Data Resilience

Nowadays, protecting organizational data and ensuring operational continuity is more crucial than ever. The rise of cyberthreats and data loss incidents have made it essential for businesses to adopt robust frameworks that safeguard information and maintain compliance with regulatory requirements. In this blog, we’ll discuss how the two pillars of Microsoft 365 data resilience are structured around two core pillars: Business continuity and disaster preparedness, all supported by a strong foundation of security. We’ll also cover how Veeam Data Cloud for Microsoft 365 allows organizations to adhere to this framework and ultimately become fully cyber-resilient and data-compliant enterprises. Read more
Edward Watson
Edward Watson

Principal, Product Marketing Manager

The Organizational Structure of Ransomware Threat Actor Groups is Evolving Before Our Eyes

As we approach the one year anniversary of two prominent ransomware group collapses (Lockbit and BlackCat/ALPHV), we find the ransomware ecosystem to be as fractured and uncertain as it did in the months following these events. The Ransomware-as-a-Service (RaaS) model remains irreversibly tarnished after the groups that pioneered this framework were exposed as being fraught with infighting, deception, lost profits, and compromised anonymity for their affiliates. Joint law enforcement actions over the last year have systematically impaired the resources ransomware actors depend on to operate. In the case of domestic threats, law enforcement efforts have even put a number of bad actors behind bars. While certain groups persist and new names continue to trickle in and out of the ransom-sphere, ... Read more
Bill Siegel
Bill Siegel

CEO & Co-founder of Coveware

Key Innovations and Data Resilience Highlights from VeeamON 2025 

With over 60 sessions and more than 100 speakers, VeeamON 2025 was a resounding success. We’re thrilled you joined us — whether in San Diego or virtually — to continue to learn the transformative potential of data resilience. During three action-packed days, we introduced significant new products and features, presented groundbreaking research on ransomware protection and the state of data resilience, and much more. Read more
Rick Vanover
Rick Vanover

Senior Director, Product Strategy

Building Cyber Resilience in Educational Organizations

Building cyber resilience within educational organizations is imperative to protect sensitive student, faculty, and research data and ensure operational continuity. Academic institutions are shifting toward complex, hybrid, and multi-cloud architectures, making them more susceptible to cyber threats like phishing and ransomware. Read more

Understanding Disaster Recovery as a Service (DRaaS): Benefits, Use Cases, and Implementation Strategies 

Ransomware, hardware failures, and natural disasters all have one thing in common — they can stop your business in its tracks. In today’s threat landscape, recovery speed matters just as much as prevention. Disaster Recovery as a Service (DRaaS) delivers an on-demand, cloud-hosted environment to failover critical workloads and keep operations running when the unexpected strikes. Read more
Laura Maniscalco
Laura Maniscalco

Sr. Product Marketing Manager, VCSP

Understanding Zero Trust Data Resilience (ZTDR)

With users, devices, and data spread across countless networks, the old “secure perimeter” model no longer works. No connection can be assumed safe, so every access request must be verified. Zero Trust replaces blind trust with explicit validation, ensuring only the right users, devices, and workloads get the right access at the right time. Read more

Your Guide to Security Information and Event Management (SIEM)

Security Information and Event Management (SIEM) is a cybersecurity solution that collects, correlates, and analyzes security data from across your IT environment to help your security operations center (SOC) detect, investigate, and respond to threats in real time. Read more