Veeam Blog
Filters (Results: 1581)
Results: 1581
Filters (Results: 1581)
  • Business Types (1)
Stay up to date on the latest tips and news
By subscribing, you are agreeing to have your personal information managed in accordance with the terms of Veeam’s Privacy Policy
You're all set!
Watch your inbox for our weekly blog updates.
OK

How Resilient Is Your Business? Discover the Key Factors

How resilient is your company? Most businesses aren’t as resilient as they think. Historically, backup and recovery processes for IT and cloud environments are: • Composed of manual processes to replicate and protect workloads and data, • Kept in a written business continuity/disaster recovery (BC/DR) plan, and • Implemented by a person or team. Read more
Karyn Price
Karyn Price

Industry Principal, ICT, Frost & Sullivan

Best Practices for Secure Hybrid and Multi-Cloud Backup

Cloud computing has become ubiquitous and has reached the point where nearly half of all workloads run in the cloud. Currently, most organizations operate a combination of on-premise and cloud workloads, known as a hybrid cloud. Typically, they keep key services within their data centers and use the cloud for customer-facing services, software applications and flexible data storage. The hybrid cloud model is ideal because it is not always possible, or even wise, to move everything to the cloud for reasons like cost, performance and compliance. Read more
Sam Nicholls
Sam Nicholls

Principal, Product Marketing

Microsoft 365 Recovery Best Practices 

The fact that organizations need to backup their Microsoft 365 deployments has been well established. Microsoft is based on a shared responsibility model in which Microsoft is responsible for protecting the underlying infrastructure, and subscribers are responsible for protecting their own data. This means that if you use Microsoft 365, you have to back up your own data.  In their Services Agreement, Microsoft makes it very clear on the delineation around customer data, “We don’t claim ownership of Your Content. Your Content remains Your Content, and you are responsible for it.” Read more
Brien Posey
Brien Posey

Scientist-Astronaut Candidate, Internationally Best Selling Technology Author, and Speaker

Using Kasten K10 for Ransomware Attack Prevention

Ransomware attacks are on the rise – in 2021, the number of ransomware attacks rose by 92.7% compared to 2020 levels, with 2,690 attacks reported. In this short article, we’ll show you how Kasten K10 by Veeam can be leveraged to detect a common ransomware pattern in order to prevent data loss or corruption. Read more

Does Microsoft Protect Microsoft 365 Data?

Welcome back to the second part of our three-part blog series, where we continue to revisit what leading IT analyst firm, Gartner, suggests for protecting Microsoft 365. In the first post, we looked at what Gartner identified as risks associated with Microsoft 365. Read more
Karinne Bessette
Karinne Bessette

Technologist, Product Strategy