Veeam Blog
Filters (Results: 585)
Results: 585
Filters (Results: 585)
  • Business Types (1)
Stay up to date on the latest tips and news
By subscribing, you are agreeing to have your personal information managed in accordance with the terms of Veeam’s Privacy Policy
You're all set!
Watch your inbox for our weekly blog updates.
OK

The Crucial Role of Security in the Age of Quantum Computing

Robust security measures are not mere features; they are essential components of any viable product or service. Security must be ingrained in every aspect of design and operation of software. With rapid advancements in AI and the looming influence of quantum computing, the state of “secure enough” has changed dramatically. Technologies that promise groundbreaking capabilities bring along significant new vulnerabilities; they must stay ahead of the curve to protect sensitive data and maintain trust in their systems. Read more

What Is Cloud Data Protection?

Cloud has expanded where data lives and how you should protect it. Data now flows across SaaS apps, cloud-native services, and on-premises systems, often in more than one public cloud. That flexibility is powerful, but it also expands the blast radius for mistakes, misconfigurations, and modern threats like double-extortion ransomware. Cloud data protection is your operating model for securing, backing up, and recovering this sprawl by aligning identity, encryption, immutability, and recovery orchestration so you can bounce back quickly and confidently. Read more
David Cackowski
David Cackowski

Product Marketing Manager, Kasten

What Is Cloud Data Management?

Cloud data lives everywhere now: On-premises, in multiple public clouds, and inside SaaS apps. That’s powerful, but it also means your team needs a deliberate way to organize, protect, govern, and optimize data across all those locations. In other words, you need cloud data management. Because this blog is for practitioners, we’ll keep it practical: Definitions first, then architectures, guardrails, and proven practices, so you can develop a strategy that holds up in the real world. Read more
David Cackowski
David Cackowski

Product Marketing Manager, Kasten

Multi and Hybrid Cloud Architecture: A Complete Guide

Businesses demand flexibility, control, and reliability from their IT infrastructures. The growing complexity of cloud environments has pushed many organizations to adopt multi- and hybrid cloud architectures as strategic solutions. But what makes these architectures so valuable? And how can businesses implement them effectively? Read more
Kelsey Teske
Kelsey Teske

Product Marketing Manager

Nutanix AHV vs. VMware ESXi: Making an Informed Decision

As IT environments become more complex, the question of which hypervisor to use – Nutanix AHV or VMware ESXi – is one many teams face. Whether you are running traditional 3-tier architecture, shifting to hyperconverged infrastructure (HCI), or building a hybrid cloud strategy, choosing the right foundation matters. Read more

Introducing Veeam Vault to the One UI: Secure Cloud Storage Made Easy

Veeam Vault joins our all-new unified OneUI, alongside our Veeam Data Cloud workloads for Microsoft 365, Entra ID, Salesforce, and more. This integration brings our fully managed and pre-secured cloud storage solution front and center, making it even easier for organizations to protect, manage, and recover their most critical data all from a single interface. Read more

Smart Strategies for Handling Vendor Lock-In, Lock-Out, and Data Challenges

First, let’s take a quick look at the complicated nature of lock-in versus lock out. Vendor lock-In occurs when a company gets stuck relying on a specific technology or service from a particular cloud provider. This makes it difficult and expensive to switch providers or technologies. It’s a bit of a trap when you become too dependent on one company. On the other hand, vendor lock-out happens if a company loses access to its data or services supplied by a cloud provider. It can happen if there are disputes, payment issues, or problems on the vendor’s side. This situation can resemble being banned from your own digital tools and information. Read more
Leah Troscianecki
Leah Troscianecki

Product Marketing Manager, Cloud Product Marketing

The Overlooked Risk in Your Microsoft 365 Defense: Why Identity Protection Matters More Than Ever

Cybersecurity is a moving target, and as organizations increasingly rely on Microsoft 365, Entra ID has become the latest battleground in the war on information security. In our recent webinar, “The Overlooked Risk in Your Microsoft 365 Defense: Identity Protection”, Veeam expert Karinne Bessette and industry leader Joseph Carson explored the real-world risks organizations face, including why identity is under attack and how resilience backup strategies play a vital role in modern defense. Read more
Karinne Bessette
Karinne Bessette

Technologist, Product Strategy

Veeam Achieves TX-RAMP Level 2 Security Certification for Veeam Data Cloud Products

Veeam® Software, the leader in Data Protection and Ransomware Recovery, today announced that its Veeam Data Cloud (VDC) offerings have been awarded the Texas Risk and Authorization Management Program (TX-RAMP) Level 2 security certification. This achievement underscores Veeam’s commitment to delivering industry-leading, secure cloud data protection solutions to public sector organizations across Texas. Read more

8 Reasons Veeam Data Cloud is the #1 Choice for Microsoft 365 SaaS Backup

Your Microsoft 365 data may live in the cloud, but that doesn’t make it immune to loss. A single mistaken deletion, sync error, or ransomware attack can wipe out critical emails, files, or Teams conversations in seconds. Microsoft 365 keeps your services available, but many organizations incorrectly assume that availability equals protection. Read more
Kendall Gray
Kendall Gray

Product Marketing Associate