Veeam Blog
Filters (Results: 1600)
Results: 1600
Filters (Results: 1600)
Stay up to date on the latest tips and news
By subscribing, you are agreeing to have your personal information managed in accordance with the terms of Veeam’s Privacy Policy
You're all set!
Watch your inbox for our weekly blog updates.
OK

Methods and Best Practices for SharePoint Backup

SharePoint’s native integration with Microsoft 365 makes it a popular tool for collaboration and content sharing. Organizations often find themselves storing, organizing, and sharing significant amounts of data on SharePoint Online or an on-premises SharePoint server, which makes it crucial to regularly back up the platform. Read more
Edward Watson
Edward Watson

Principal Product Marketing Manager

Comprehensive Overview of Google Cloud Security

Integrating Google Cloud security measures is crucial to enhancing the security of digital assets in the cloud. By leveraging Google Cloud's security infrastructure, businesses can ensure that their sensitive data, trade secrets, personal information, intellectual property, and financial data is well-protected. Implementing proper access controls, encryption protocols, and utilizing monitoring capabilities offered by Google Cloud can significantly reduce the risk of unauthorized access and potential data breaches. Read more
Cody Ault
Cody Ault

Staff Solutions Architect

Highlight Threats and Reduce Risk With Veeam Threat Center

Veeam Data Platform is continuously evolving to provide users with the tools they need for ultimate data protection and resilience. It provides a holistic solution for data protection with monitoring and orchestration capabilities that help ensure compliance and cyber resilience. Read more
Kirsten Stoner
Kirsten Stoner

Technologist and Program Lead

Cloud Workload Protection: Secure Your Cloud Data

These days, organizations are migrating more and more workloads to the cloud. While this may make their work more efficient, this may be seen as just another opportunity for cybercriminals. Cloud environments contain massive amounts of sensitive data, which makes them prime targets for hackers. Read more
Kelsey Teske
Kelsey Teske

Product Marketing Manager