Veeam Blog
Filters (Results: 1519)
Results: 1519
Filters (Results: 1519)
  • Business Types (1)
Stay up to date on the latest tips and news
By subscribing, you are agreeing to have your personal information managed in accordance with the terms of Veeam’s Privacy Policy
You're all set!
Watch your inbox for our weekly blog updates.
OK

Veeam and Scality Continue to Deliver Well-Integrated, Market-Leading Immutable Storage and Recovery Solutions

One of the key tenets of Veeam is data freedom. Our platform helps customers achieve deeper cyber resilience with multilayered data security and recovery capabilities, no matter where your data backups reside. And while so much of the focus in IT and security circles is on the cloud, often hardware appliances make sense for particular use cases. Read more
Jo-Anne Bourne
Jo-Anne Bourne

Senior Alliance Marketing Manager

Bringing Radical Resilience Into 2024 

The beginning of a new year inspires change and possibility. In the spirit of starting fresh, we all make resolutions and start initiatives to make the new year even better than the previous one. At Veeam, one of our 2024 resolutions is to help you become more radically resilient in 2024, both in and outside of work.  Read more
Christine Bentsen
Christine Bentsen

VP and Head of Global Product Marketing

It’s Time to Apply! Veeam Vanguard Program Opens Nominations and Renewals for the Class of 2024

As the digital landscape continues to evolve, the importance of data security and management has become paramount. In this era of constant innovation, communities of experts and enthusiasts play a pivotal role in shaping the future of technology. Veeam, a global leader in data protection and management solutions, recognizes the significance of community engagement and expertise. The Veeam Vanguard program, a prestigious initiative that celebrates and supports the contributions of top influencers in the Veeam community, is set to open nominations and renewals for the next class of 2024. Read more
Nikola Pejková
Nikola Pejková

Technical Analyst & Community Manager, Product Strategy

High Availability Virtualization Best Practices

High Availability (HA) involves designing systems that are always accessible and resilient to failures, rapidly recovering to minimize downtime. In today's business environments, where interruptions can have significant consequences, this is especially important. Read more
Matt Crape
Matt Crape

Senior Technical Product Marketer

#EmpowHerVMCE a Step in the Right Direction for Inclusion 

Technology and technology-related jobs are growing exponentially but are lacking diversity, which is what helps innovation to flourish. According to Gartner, half of the global workforce is represented by women, however, women only make up 26% of people who work in IT. What is more staggering is that this percentage is lower than the original study that was done in 2018, where we saw female representation at 31%. Many studies that have tried investigating why women leave this profession showed there is no single reason but a combination of them that cultivate the decline of women in this line of work. Read more

6 Best Practices for Kubernetes Disaster Recovery

Kubernetes adoption is accelerating as businesses become familiar with its many benefits. The platform offers portability and scalability, cost efficiency and productivity gains, which is why more than 5.6 billion developers use it today. Unfortunately, cyber-attacks and the potential for downtime are very real risks for cloud native environments, so backup and disaster recovery (DR) are critical components of any Kubernetes environment. This is especially true as the number of stateful applications such as databases are being deployed in Kubernetes.  Read more
Michael Cade
Michael Cade

Senior Technologist, Product Strategy

Guide to Identity and Access Management (IAM)

Adopting Identity and Access Management (IAM) best practices is an important part of proactive defense against ransomware and other cyber threats, allowing you to quickly and effectively control – and limit – who has access to the files and data within your company. Identity and Access Management focuses on verifying user identities, computers, Internet of Things (IoTs), and other devices that want or need to be able to access data, information, and systems. Once verification is complete, IAM only grants access to resources the user (or device) needs to perform their tasks and rejects unauthorized or unrecognized requests. IAM also is helpful for regulatory compliance for standards like GDPR and HIPPA and can be an essential part of digital transformation ... Read more
Jackie Ostlie
Jackie Ostlie

Sr. Product Marketing Manager

Instant Data Backup and Instant Recovery: Minimize Downtime

You know the feeling — that knot in your stomach when faced with a potential data loss event. As an IT professional tasked with keeping operations running smoothly, any amount of downtime is unacceptable. But what if recovering from data loss didn't have to be a time-consuming, stressful ordeal? Read more
Billy Cashwell
Billy Cashwell

Principal Product Marketing Manager