Veeam Blog
Filters (Results: 60)
Results: 60
Filters (Results: 60)
  • Business Types (1)
Stay up to date on the latest tips and news
By subscribing, you are agreeing to have your personal information managed in accordance with the terms of Veeam’s Privacy Policy
You're all set!
Watch your inbox for our weekly blog updates.
OK

The Data Protection Blind Spot: What You’re Missing Below the Surface

Left unmanaged, data sprawl creates chaos that weakens operational control and increases risk. Risk can come in all shapes and forms: accommodating for increased expenses associated with data growth, keeping that data safe from threats while maintaining compliance, or even recovering that data without violating your RPO or RTO. While hypervisors and cloud platforms are often the first that come to mind, unstructured data frequently holds years of organizational knowledge that must not be overlooked. Read more
Matt Crape
Matt Crape

Senior Technical Product Marketer

Encryption in Real Time: What Really Happens During a Ransomware Attack

It starts like any other morning — except for the IT admin, who logs in first. You check the monitoring dashboard and see a few alerts: elevated CPU usage, a couple of failed logins, then a string of disconnected endpoints. At first, it looks like routine noise. Maybe a patch failed overnight. Maybe a script hung. Read more
Raymond Umerley
Raymond Umerley

Field CISO

Building Data Resilience: Lessons from Cricket, Business, and the Seattle Orcas

Relentless grit and fiery determination aren’t just hallmarks of Seattle Orcas cricket, they’re the foundation of resilience that every organization needs. At Veeam, resilience drives everything we do. From protecting our customers’ data to partnering with champions of adaptability like the Seattle Orcas, resilience shapes our approach. Read more
Matthew Bishop
Matthew Bishop

Chief Operating Officer

Coveware by Veeam Cyber Extortion Readiness & Response Retainer

Purpose-Built Expertise for Ransomware and Cyber Extortion

Ransomware and cyber extortion are more than security incidents; they are full-scale business crises. When operations halt and leadership demands answers, you need more than generalist DFIR. You need a partner fluent in high-stakes ransomware extortion.

Coveware by Veeam offers a dedicated Incident Response Retainer focused exclusively on ransomware and cyber extortion. Built to strengthen preparedness before an incident and accelerate response during one, Coveware reduces downtime, lowers costs, and restores clarity and control when it matters most.

Why Coveware? Strategic Value from Day One

A Partner Committed to Avoiding Payment

Our foundational principle: If you can avoid paying, you should.

Coveware builds recovery confidence so clients can walk away. When payment is unavoidable, we shorten timelines, cut ransom ... Read more

Raymond Umerley
Raymond Umerley

Field CISO

Putting the Replication in Veeam Backup & Replication

When someone says, "data protection," one of the first things that comes to mind is backup. Whether we’re up against the ever-evolving threat of ransomware or dealing with the simple mistake of an employee clicking a malicious link, backups serve as a kind of magical rewind button. For many organizations, this is enough to meet their recovery point objectives (RPOs). Read more
Brandon McCoy
Brandon McCoy

Systems Engineering-VCSP

5 Features for Service Providers to Monetize in Advanced BaaS and DRaaS Offerings

With so many features included in Veeam Data Platform, service providers can create differentiated package offerings to clients and address their business needs, service level agreements (SLAs) and budgets. Read more
Laura Maniscalco
Laura Maniscalco

Sr. Product Marketing Manager, VCSP

The Organizational Structure of Ransomware Threat Actor Groups is Evolving Before Our Eyes

As we approach the one year anniversary of two prominent ransomware group collapses (Lockbit and BlackCat/ALPHV), we find the ransomware ecosystem to be as fractured and uncertain as it did in the months following these events. The Ransomware-as-a-Service (RaaS) model remains irreversibly tarnished after the groups that pioneered this framework were exposed as being fraught with infighting, deception, lost profits, and compromised anonymity for their affiliates. Joint law enforcement actions over the last year have systematically impaired the resources ransomware actors depend on to operate. In the case of domestic threats, law enforcement efforts have even put a number of bad actors behind bars. While certain groups persist and new names continue to trickle in and out of the ransom-sphere, ... Read more
Bill Siegel
Bill Siegel

CEO & Co-founder of Coveware

10 Critical Alarms to Stop Ransomware and Protect Your Business Continuity

Ransomware attacks aggressively target virtual infrastructure like ESXi and vCenter, exploiting vulnerabilities to encrypt data and disrupt operations. Veeam’s advanced monitoring capabilities empower organizations to detect threats early and respond swiftly, safeguarding critical data before backups are compromised. By configuring precise alarms and integrating with SIEM tools such as CrowdStrike Falcon, Palo Alto XSIAM, Rapid7, Microsoft Sentinel, Splunk, etc., Veeam ensures comprehensive security visibility. Read more
Brad Linch
Brad Linch

Director of Enterprise Strategy

Key Innovations and Data Resilience Highlights from VeeamON 2025 

With over 60 sessions and more than 100 speakers, VeeamON 2025 was a resounding success. We’re thrilled you joined us — whether in San Diego or virtually — to continue to learn the transformative potential of data resilience. During three action-packed days, we introduced significant new products and features, presented groundbreaking research on ransomware protection and the state of data resilience, and much more. Read more
Rick Vanover
Rick Vanover

Senior Director, Product Strategy