Veeam Blog
Filters (Results: 145)
Results: 145
Filters (Results: 145)
Stay up to date on the latest tips and news
By subscribing, you are agreeing to have your personal information managed in accordance with the terms of Veeam’s Privacy Policy
You're all set!
Watch your inbox for our weekly blog updates.
OK

Don’t Get Haunted by Data Loss: Salesforce Backup in the Age of AI

As the Halloween season arrives, it’s not just cobwebs and carved pumpkins that can send chills down an IT team’s spine. For organizations leveraging Salesforce—especially those embracing AI-powered automation and insights—the real fright comes from unseen risks lurking in the digital shadows. But here’s the treat: with the right approach, you can keep business running smoothly no matter what surprises the night may hold. Read more
Kelsey Teske
Kelsey Teske

Product Marketing Manager

Secure Kubernetes Storage Made Easy

Earlier this year, Veeam Kasten launched support for exporting of secure snapshots to VDC Vault. This allows Kasten admins to protect their Kubernetes stateful data and take advantage of the built-in security and redundancy protection features natively provided by VDC Vault as a securely managed storage platform. The new integrated model allows Kubernetes admins to check three key application data protection and mobility requirements from their enterprise policy compliance list: ransomware protection, application migration, and cost. Read more

Veeam Data Platform Advanced for Proxmox VE

Proxmox VE has seen remarkable growth in popularity and adoption across industries of all sizes. All organizations share a common problem: ensuring their data is protected and ready to be restored at a moment’s notice. Rapid data recovery is critical in the face of unexpected outages to the ever-present threat of ransomware. Veeam Data Platform provides Proxmox VE users with a proven solution to meet these challenges head-on. Read more

Veeam Cyber Secure: Elite Services for Full Data Resilience

Today’s cyberattacks are fast, complex, and coordinated. They are designed to encrypt backups, exfiltrate data, and bring business operations to a halt. In this environment, organizations need more than a recovery plan. They need a proactive program that strengthens their security posture, validates readiness, and guides response when stakes are highest. Read more
Kelli Hartwick
Kelli Hartwick

Senior Product Marketing Manager

The Crucial Role of Security in the Age of Quantum Computing

Robust security measures are not mere features; they are essential components of any viable product or service. Security must be ingrained in every aspect of design and operation of software. With rapid advancements in AI and the looming influence of quantum computing, the state of “secure enough” has changed dramatically. Technologies that promise groundbreaking capabilities bring along significant new vulnerabilities; they must stay ahead of the curve to protect sensitive data and maintain trust in their systems. Read more
Bryant Schuck
Bryant Schuck

Principal Product Manager

Akira Exploits the Gaps Between Patching and Identity Security

Coveware by Veeam experts have observed a sharp rise in Akira ransomware cases, with more than 40 of those incidents tied to a single exploitation pathway. At the center of these cases is a recently mitigated VPN vulnerability in widely deployed enterprise appliances, which Akira has been actively exploiting to gain initial access. What makes this surge particularly concerning is that many of the victim organizations had already applied the vendor’s patch. Read more
Raymond Umerley
Raymond Umerley

Field CISO

Dangerous Tools in Clumsy Hands: Lessons from the VanHelsing Ransomware Leak

For many organizations, this is the nightmare scenario: you think you’ve negotiated your way out of a ransomware attack, you’ve paid the ransom demanded, and you’ve waited for the promised decryption tool. But when you think your data is safe and the ordeal is finished, you discover your data is still lost. Read more
Ian Findling
Ian Findling

Sr. Content Strategy Specialist

The Overlooked Risk in Your Microsoft 365 Defense: Why Identity Protection Matters More Than Ever

Cybersecurity is a moving target, and as organizations increasingly rely on Microsoft 365, Entra ID has become the latest battleground in the war on information security. In our recent webinar, “The Overlooked Risk in Your Microsoft 365 Defense: Identity Protection”, Veeam expert Karinne Bessette and industry leader Joseph Carson explored the real-world risks organizations face, including why identity is under attack and how resilience backup strategies play a vital role in modern defense. Read more
Karinne Bessette
Karinne Bessette

Global Technologist, Microsoft 365 Lead