Veeam Blog
Filters (Results: 486)
Results: 486
Filters (Results: 486)
  • Business Types (1)
Stay up to date on the latest tips and news
By subscribing, you are agreeing to have your personal information managed in accordance with the terms of Veeam’s Privacy Policy
You're all set!
Watch your inbox for our weekly blog updates.
OK

Veeam Supports Rocky Linux 9 for Immutable Backups

At Veeam, we continually strive to provide the most robust, secure, and reliable data protection solutions. Today, we're excited to announce a significant development in that pursuit: Veeam's new support for Rocky Linux 9.4 in Veeam Backup & Replication v12.2, complete with the DISA STIG security profile. Read more
Hannes Kasparick
Hannes Kasparick

Senior Analyst, Product Management

Hyper-V Migration: Simplify Moving Workloads

Migrating workloads can be a daunting task for any IT professional, but with Veeam's robust tools and solutions, the process becomes straightforward and efficient. In this blog, we'll explore how you can leverage Veeam to move your workloads to Microsoft Hyper-V seamlessly. Read more
Matt Crape
Matt Crape

Senior Technical Product Marketer

Managed Kubernetes Explained: Comparing AKS, EKS, and GKE

In the ever-evolving world of cloud computing, Kubernetes has emerged as a powerful orchestration platform for containerized applications. However, managing and maintaining a Kubernetes cluster can sometimes be complex and resource-intensive. This is where managed Kubernetes services come into play, since they offer a streamlined and efficient solution for organizations who want to leverage the power of Kubernetes without the operational overhead. Read more
Julia Furst Morgado
Julia Furst Morgado

Product Strategy Technology

What is WORM (Write Once, Read Many)?

As data privacy and retention laws tighten across industries, navigating compliance can seem like a daunting task. Enter "write once, read many" (WORM) storage: a straightforward solution that’s designed to anchor your data securely in place and protect it from accidental changes and deliberate threats.   Read more
Alexey Strygin
Alexey Strygin
Marco Escobar
Marco Escobar

Solutions Architect

CrowdStrike & Veeam Deliver Data Resilience and Recovery for Windows Hosts

The CrowdStrike outage disrupted critical services for many organizations, highlighting how Microsoft Windows continues to be a critical infrastructure. This incident exposed a crucial lesson: no system is immune to failure. Comprehensive backup and recovery strategies are critical to mitigate the impact of such disruptions. Read more
Brad Linch
Brad Linch

Director of Enterprise Strategy

Understanding Virtualization and Containerization

As technology continues to advance, optimizing resources by balancing investment between infrastructure and application deployment becomes increasingly important. Two leading methods for addressing these challenges are virtualization and containerization. Read more