Veeam Blog
Filters (Results: 921)
Results: 921
Filters (Results: 921)
  • Business Types (1)
Stay up to date on the latest tips and news
By subscribing, you are agreeing to have your personal information managed in accordance with the terms of Veeam’s Privacy Policy
You're all set!
Watch your inbox for our weekly blog updates.
OK

Application Mobility in Kubernetes: The What, Why, and How

Application mobility in Kubernetes refers to the ability to move applications between different Kubernetes clusters, configurations, clouds and environments. But why is it important? Well, because the development world has changed. Applications are no longer tethered to a group of servers or data centers, and application mobility gives organizations greater flexibility, resilience, and efficiency in managing their applications, wherever they reside. Read more

What Is Separation of Duties in Cybersecurity?

Separation of Duties (SOD) in cybersecurity, also known as Segregation of Duties, is a form of risk management that is often used in cybersecurity to mitigate insider threats and reduce the risk of errors or accidents when it comes to mission-critical data. By having more than one person responsible for key duties, organizations can prevent conflicts of interest and better maintain data integrity and availability. Read more

Top Threats in Microsoft 365 Security

Microsoft 365 is a cornerstone for businesses worldwide containing invaluable intellectual property and business-critical applications. It is vital to understand the threats facing this landscape and how to mitigate the risks with security considerations and monitoring. In this blog, we will take a deeper look at these challenges, some steps you can take today to ensure these assets are protected and some of the potential risks accepted by not acting. Read more
Karinne Bessette
Karinne Bessette

Technologist, Product Strategy

Your Guide to Security Information and Event Management (SIEM)

Security Information and Event Management (SIEM) is a cybersecurity solution that collects, correlates, and analyzes security data from across your IT environment to help your security operations center (SOC) detect, investigate, and respond to threats in real time. Read more

The Cyber Battlefield: A Tactical Guide To Preparing For, Engaging in and Triumphing Over Cyberattacks

In the digital age, where information is power, and the battle for data integrity rages on, cyber threats loom like shadowy adversaries, ready to pounce on unsuspecting organizations. These stealthy assailants are relentless, exploiting every vulnerability to breach digital fortresses, wreak havoc and compromise the integrity of business-critical data. In the ever-evolving landscape of cyber warfare, organizations must be fully equipped, prepared for the subduing incursion and swift in their response to emerge victorious. Read more
Karinne Bessette
Karinne Bessette

Technologist, Product Strategy

Ransomware Prevention: Technical Best Practices & Strategic Defense

How can organizations prevent ransomware with today’s advanced and sophisticated threat landscape? It starts with building a strategic and layered defense. This includes deploying immutable backups, enforcing zero-trust principles, identifying attack vector and MITRE ATT&CK framework tactics, techniques, and procedures (TTP), and preparing with orchestrated recovery and up to date incident response plans. Ransomware prevention demands technical depth and proactive planning. Read more
Misha Rangel
Misha Rangel

Director, Enterprise Product Marketing

Mastering Managed Backup as a Service (BaaS) In the Age of Hybrid and Multi-Cloud: A Guide for MSPs

In a recent survey conducted by Vanson Bourne[1], a staggering 83% of organizations agree that the hybrid multi-cloud approach stands as the preferred backup strategy. Considering this dramatic surge in digital transformation, the management and protection of data have assumed unprecedented importance. As organizations increasingly incorporate hyperscale cloud environments such as AWS and Azure, there is strong demand for dependable and efficient Managed Backup as a Service (BaaS) solutions. For Managed Service Providers (MSPs), adeptly navigating this evolving landscape necessitates remaining informed and adaptable to emerging trends and challenges. Read more
Michael Loos
Michael Loos

VCSP Manager, Product Marketing

Veeam Backup v5 for Nutanix AHV

In today’s cost-conscious world, enterprises are continually evaluating and adopting new preferred infrastructure vendors, whether it be driven by total cost of ownership, features or overall flexibility. Despite being critical in today’s datacenters, hypervisors themselves are not exempt from this either.  One of the key influences when evaluating the foundational pillars of your IT environment comes down to the ecosystem. Will the solution you land on fill your requirements? Are there limitations to be aware of? And of course, do you have a solid strategy to securely and reliably protect that data? Read more
Matt Crape
Matt Crape

Senior Technical Product Marketer