Veeam Blog
Filters (Results: 1576)
Results: 1576
Filters (Results: 1576)
  • Business Types (1)
Stay up to date on the latest tips and news
By subscribing, you are agreeing to have your personal information managed in accordance with the terms of Veeam’s Privacy Policy
You're all set!
Watch your inbox for our weekly blog updates.
OK

What Is Cyber Resilience?

With the ever-increasing growth across the digital landscape, having a strong security posture is no longer enough. More than ever, organizations of all sizes need to have an end-to-end cyber resiliency strategy. But what exactly is Cyber Resilience? Read more
Jackie Ostlie
Jackie Ostlie

Sr. Product Marketing Manager

How Cisco & Nutanix’s Alliance Impacts Veeam Users

As Josh Druck outlined in his September 14th blog, Veeam has longstanding technical relationships with both Cisco HyperFlex and Nutanix.  In this blog, I would like to explore what the recent Cisco and Nutanix global strategic partnership announcement will mean to Veeam customers, or prospective Veeam customers, from a technical perspective.  Read more
Pete Ybarra
Pete Ybarra

Solutions Architect, NetApp/Nutanix - Product Management, Alliances

Mark Polin
Mark Polin

Solutions Architect, Cisco/Pure

Understanding Cloud Compliance: A Guide to HIPAA, GDPR, SOX, and More

In today's digital landscape, the adoption of cloud computing has transcended beyond just a technological trend; it's now a business imperative. Companies, irrespective of size or sector, are migrating to cloud services to leverage the advantages of scalability, flexibility, and efficiency. However, this migration comes with its own set of challenges, the most notable of which is maintaining compliance with various data protection regulations. Read more
Kelsey Teske
Kelsey Teske

Product Marketing Manager

Application Mobility in Kubernetes: The What, Why, and How

Application mobility in Kubernetes refers to the ability to move applications between different Kubernetes clusters, configurations, clouds and environments. But why is it important? Well, because the development world has changed. Applications are no longer tethered to a group of servers or data centers, and application mobility gives organizations greater flexibility, resilience, and efficiency in managing their applications, wherever they reside. Read more

A Comprehensive Guide to Salesforce Backup Solutions

If you were to approach one of the hundreds of thousands of people who use Salesforce daily and ask them the last time they backed up their data, they would probably have no idea. Why would it be their concern? After all, doesn't Salesforce back up data for you? Read more
Alison Connor
Alison Connor

Senior Product Marketing Manager

What Is Separation of Duties in Cybersecurity?

Separation of Duties (SOD) in cybersecurity, also known as Segregation of Duties, is a form of risk management that is often used in cybersecurity to mitigate insider threats and reduce the risk of errors or accidents when it comes to mission-critical data. By having more than one person responsible for key duties, organizations can prevent conflicts of interest and better maintain data integrity and availability. Read more

Top Threats in Microsoft 365 Security

Microsoft 365 is a cornerstone for businesses worldwide containing invaluable intellectual property and business-critical applications. It is vital to understand the threats facing this landscape and how to mitigate the risks with security considerations and monitoring. In this blog, we will take a deeper look at these challenges, some steps you can take today to ensure these assets are protected and some of the potential risks accepted by not acting. Read more
Karinne Bessette
Karinne Bessette

Technologist, Product Strategy