Veeam Blog
Filters (Results: 1605)
Results: 1605
Filters (Results: 1605)
Stay up to date on the latest tips and news
By subscribing, you are agreeing to have your personal information managed in accordance with the terms of Veeam’s Privacy Policy
You're all set!
Watch your inbox for our weekly blog updates.
OK

What is WORM (Write Once, Read Many)?

As data privacy and retention laws tighten across industries, navigating compliance can seem like a daunting task. Enter "write once, read many" (WORM) storage: a straightforward solution that’s designed to anchor your data securely in place and protect it from accidental changes and deliberate threats.   Read more
Alexey Strygin
Alexey Strygin

Director of Product Management

Marco Escobar
Marco Escobar

Solutions Architect

CrowdStrike & Veeam Deliver Data Resilience and Recovery for Windows Hosts

The CrowdStrike outage disrupted critical services for many organizations, highlighting how Microsoft Windows continues to be a critical infrastructure. This incident exposed a crucial lesson: no system is immune to failure. Comprehensive backup and recovery strategies are critical to mitigate the impact of such disruptions. Read more
Brad Linch
Brad Linch

Director of Enterprise Strategy

Veeam Kasten V7.0 is FIPS 140-3 Compliant

The announcement of Veeam Kasten for Kubernetes V7.0 at Red Hat Summit 2024 brings over 30 new features and enhancements, including the addition of Federal Information Protection Standard (FIPS) for federal sector customers. Read more
Bryant Schuck
Bryant Schuck

Principal Product Manager

Ransomware Encryption: Prevention and Response

. The 2024 Ransomware Trends Report revealed that bad actors are targeting backup repositories in 96% of attacks. These attackers are waiting in your environment for the perfect time to strike, encrypt your data (especially your backups, so you can’t save yourself), and demand their ransom. Read more
Jason Buffington
Jason Buffington

Vice President, Market Strategy

Emilee Tellez
Emilee Tellez

Field CTO, Veeam OR Director of Product Strategy

Planning for the Future: Veeam and Microsoft 365 Backup Storage

As data within Microsoft 365 continues to grow exponentially, businesses face numerous challenges in securing and protecting their critical information. With over two billion files created daily in Microsoft 365 and some tenants experiencing petabytes of growth each month, it is evident that protecting Microsoft 365 data has become a pressing consideration. Read more
Edward Watson
Edward Watson

Principal Product Marketing Manager

A Guide to Implementing Effective Data Retention in Microsoft 365

Data retention in Microsoft 365 is the process of preserving, managing, and securely deleting business data, such as emails, documents, and chat messages, while staying in line with regulatory, legal, and operational requirements. It ensures that critical information remains accessible for as long as it’s needed, while removing outdated or redundant data to optimize storage and reduce risk. Read more
Edward Watson
Edward Watson

Principal Product Marketing Manager

Understanding Virtualization and Containerization

As technology continues to advance, optimizing resources by balancing investment between infrastructure and application deployment becomes increasingly important. Two leading methods for addressing these challenges are virtualization and containerization. Read more