Veeam Blog
Filters (Results: 1600)
Results: 1600
Filters (Results: 1600)
Stay up to date on the latest tips and news
By subscribing, you are agreeing to have your personal information managed in accordance with the terms of Veeam’s Privacy Policy
You're all set!
Watch your inbox for our weekly blog updates.
OK

High Availability Virtualization Best Practices

High Availability (HA) involves designing systems that are always accessible and resilient to failures, rapidly recovering to minimize downtime. In today's business environments, where interruptions can have significant consequences, this is especially important. Read more
Matt Crape
Matt Crape

Senior Technical Product Marketing Manager

#EmpowHerVMCE a Step in the Right Direction for Inclusion 

Technology and technology-related jobs are growing exponentially but are lacking diversity, which is what helps innovation to flourish. According to Gartner, half of the global workforce is represented by women, however, women only make up 26% of people who work in IT. What is more staggering is that this percentage is lower than the original study that was done in 2018, where we saw female representation at 31%. Many studies that have tried investigating why women leave this profession showed there is no single reason but a combination of them that cultivate the decline of women in this line of work. Read more
Federica Saba
Federica Saba

Global Training and Certification Manager

6 Best Practices for Kubernetes Disaster Recovery

Kubernetes adoption is accelerating as businesses become familiar with its many benefits. The platform offers portability and scalability, cost efficiency and productivity gains, which is why more than 5.6 billion developers use it today. Unfortunately, cyber-attacks and the potential for downtime are very real risks for cloud native environments, so backup and disaster recovery (DR) are critical components of any Kubernetes environment. This is especially true as the number of stateful applications such as databases are being deployed in Kubernetes.  Read more
Michael Cade
Michael Cade

Field CTO / Director of Product Strategy

Guide to Identity and Access Management (IAM)

Adopting Identity and Access Management (IAM) best practices is an important part of proactive defense against ransomware and other cyber threats, allowing you to quickly and effectively control – and limit – who has access to the files and data within your company. Identity and Access Management focuses on verifying user identities, computers, Internet of Things (IoTs), and other devices that want or need to be able to access data, information, and systems. Once verification is complete, IAM only grants access to resources the user (or device) needs to perform their tasks and rejects unauthorized or unrecognized requests. IAM also is helpful for regulatory compliance for standards like GDPR and HIPPA and can be an essential part of digital transformation ... Read more
Jackie Ostlie
Jackie Ostlie

Sr. Product Marketing Manager

Instant Data Backup and Instant Recovery: Minimize Downtime

You know the feeling — that knot in your stomach when faced with a potential data loss event. As an IT professional tasked with keeping operations running smoothly, any amount of downtime is unacceptable. But what if recovering from data loss didn't have to be a time-consuming, stressful ordeal? Read more
Billy Cashwell
Billy Cashwell

Principal Product Marketing Manager

ESXi Alternatives: Exploring Your Virtualization Options

VMware ESXi has long been the cornerstone of many data center virtualization strategies thanks to its powerful, bare-metal hypervisor capabilities. However, as data centers grow and diversify, the limitations in terms of cost, flexibility, and compatibility lead many to seek out other options. Read more
Billy Cashwell
Billy Cashwell

Principal Product Marketing Manager

Microsoft 365 Native Security: Unlocking Compliance and Monitoring Features

No business is exempt from meeting some kind of compliance or governing regulation. These controls are put in place (generally speaking) to help ensure trust and consistency when dealing with goods and services. When it comes to “as a Service” offerings, these regulations can enter grey areas and offer misconceptions of who is responsible — and at fault — if there is a violation. Read more
Karinne Bessette
Karinne Bessette

Global Technologist, Microsoft 365 Lead

SaaS Backup Guide: Empowering Resellers and Partners

Businesses rely heavily on SaaS applications like Microsoft 365, Salesforce, and Google Workspace to run daily operations. However, here’s the catch: While SaaS providers ensure platform availability, the responsibility for protecting business-critical data still lies with the customer. That’s where SaaS backup comes in, and why it represents such a powerful opportunity for resellers and partners. Read more