Veeam Blog
Filters (Results: 1600)
Results: 1600
Filters (Results: 1600)
Stay up to date on the latest tips and news
By subscribing, you are agreeing to have your personal information managed in accordance with the terms of Veeam’s Privacy Policy
You're all set!
Watch your inbox for our weekly blog updates.
OK

6 New Ways Kasten K10 V6.0 Empowers Kubernetes Scalability

With Kasten K10 V6.0, customers will find new ways to scale their Kubernetes data protection efficiently. Thus, boosting business resiliency, increasing productivity of cloud native operations, and leveraging seamless integrations with their ever-expanding infrastructure. Read more
Gaurav Rishi
Gaurav Rishi

Vice President of Product

When Ransomware Threatens Modern Computing

Two dynamics in the global landscape of business are the prevalence of cyberthreats, and the emergence of the modern computing platform to deliver agile and flexible solutions. What happens when the two collide? Read more
David Cackowski
David Cackowski

Product Marketing Manager, Kasten

Securing Veeam Hardened Repository

After selecting the right hardware for the Veeam Backup & Replication Hardened Repository and installing the Ubuntu Linux operating system, the next step is secure the operating system according to the DISA STIG (Defense Information Systems Agency Security Technical Implementation Guides) guidelines. Read more
Hannes Kasparick
Hannes Kasparick

Director, Product Management

Software Security Certifications: A Primer and Update

Security is becoming increasingly critical as the world becomes more digital and interconnected. Security is paramount at Veeam Software. We understand the importance of maintaining the highest level of security to protect our customers' information. We are pleased to announce that we are undergoing Common Criteria certification, DoDIN APL certification, CMMC v2 and Independent Verification & Validation (IV&V) to enhance our products' security measures. Read more
Jose Mendoza
Jose Mendoza

Sr. Director, Cybersecurity Compliance & Product Certifications, GIS

Protecting Your Unstructured Data: NAS Backup Best Practices

Unstructured data and file repositories are common in most enterprise environments. As organizations try to reduce licensing costs and maintenance overhead, Network Attached Storage (NAS) is still commonplace in many modern enterprises. The ability to store and host data directly on NAS without having to manage OS patches and other lifecycle operations is very attractive to many IT departments. Even though it isn’t suited for all workloads, unstructured data like Microsoft Office documents, JPGs, MP3s, etc. is one of the most common use cases for NAS backup. Read more
Matt Crape
Matt Crape

Senior Technical Product Marketing Manager

Top 8 Enterprise Data Protection Threats 

As the market for data protection grows, customers and consumers have grown accustomed to fast, easy and intuitive data pipelines. Enterprises, on the other hand, face a volume of complexities and dependencies that most consumers never encounter, and are often times discounted from these consumer-focused luxuries. Read more
Ian Findling
Ian Findling

Sr. Content Strategy Specialist