Veeam Blog
Filters (Results: 942)
Results: 942
Filters (Results: 942)
Stay up to date on the latest tips and news
By subscribing, you are agreeing to have your personal information managed in accordance with the terms of Veeam’s Privacy Policy
You're all set!
Watch your inbox for our weekly blog updates.
OK

Understanding Cloud Compliance: A Guide to HIPAA, GDPR, SOX, and More

In today's digital landscape, the adoption of cloud computing has transcended beyond just a technological trend; it's now a business imperative. Companies, irrespective of size or sector, are migrating to cloud services to leverage the advantages of scalability, flexibility, and efficiency. However, this migration comes with its own set of challenges, the most notable of which is maintaining compliance with various data protection regulations. Read more
Kelsey Teske
Kelsey Teske

Product Marketing Manager

Application Mobility in Kubernetes: The What, Why, and How

Application mobility in Kubernetes refers to the ability to move applications between different Kubernetes clusters, configurations, clouds and environments. But why is it important? Well, because the development world has changed. Applications are no longer tethered to a group of servers or data centers, and application mobility gives organizations greater flexibility, resilience, and efficiency in managing their applications, wherever they reside. Read more
Thomas Keenan
Thomas Keenan

Senior Product Marketing Manager for Kasten by Veeam

What Is Separation of Duties in Cybersecurity?

Separation of Duties (SOD) in cybersecurity, also known as Segregation of Duties, is a form of risk management that is often used in cybersecurity to mitigate insider threats and reduce the risk of errors or accidents when it comes to mission-critical data. By having more than one person responsible for key duties, organizations can prevent conflicts of interest and better maintain data integrity and availability. Read more

Top Threats in Microsoft 365 Security

Microsoft 365 is a cornerstone for businesses worldwide containing invaluable intellectual property and business-critical applications. It is vital to understand the threats facing this landscape and how to mitigate the risks with security considerations and monitoring. In this blog, we will take a deeper look at these challenges, some steps you can take today to ensure these assets are protected and some of the potential risks accepted by not acting. Read more
Karinne Bessette
Karinne Bessette

Global Technologist, Microsoft 365 Lead

Your Guide to Security Information and Event Management (SIEM)

Security Information and Event Management (SIEM) is a cybersecurity solution that collects, correlates, and analyzes security data from across your IT environment to help your security operations center (SOC) detect, investigate, and respond to threats in real time. Read more
Kelli Hartwick
Kelli Hartwick

Senior Product Marketing Manager

The Cyber Battlefield: A Tactical Guide To Preparing For, Engaging in and Triumphing Over Cyberattacks

In the digital age, where information is power, and the battle for data integrity rages on, cyber threats loom like shadowy adversaries, ready to pounce on unsuspecting organizations. These stealthy assailants are relentless, exploiting every vulnerability to breach digital fortresses, wreak havoc and compromise the integrity of business-critical data. In the ever-evolving landscape of cyber warfare, organizations must be fully equipped, prepared for the subduing incursion and swift in their response to emerge victorious. Read more
Karinne Bessette
Karinne Bessette

Global Technologist, Microsoft 365 Lead

Ransomware Prevention: Technical Best Practices & Strategic Defense

How can organizations prevent ransomware with today’s advanced and sophisticated threat landscape? It starts with building a strategic and layered defense. This includes deploying immutable backups, enforcing zero-trust principles, identifying attack vector and MITRE ATT&CK framework tactics, techniques, and procedures (TTP), and preparing with orchestrated recovery and up to date incident response plans. Ransomware prevention demands technical depth and proactive planning. Read more
Misha Rangel
Misha Rangel

Director, Enterprise Product Marketing