Veeam Blog
Filters (Results: 646)
Results: 646
Filters (Results: 646)
  • Business Types (1)
Stay up to date on the latest tips and news
By subscribing, you are agreeing to have your personal information managed in accordance with the terms of Veeam’s Privacy Policy
You're all set!
Watch your inbox for our weekly blog updates.
OK

The Crucial Role of Security in the Age of Quantum Computing

Robust security measures are not mere features; they are essential components of any viable product or service. Security must be ingrained in every aspect of design and operation of software. With rapid advancements in AI and the looming influence of quantum computing, the state of “secure enough” has changed dramatically. Technologies that promise groundbreaking capabilities bring along significant new vulnerabilities; they must stay ahead of the curve to protect sensitive data and maintain trust in their systems. Read more
Bryant Schuck
Bryant Schuck

Principal Product Manager

What Is Cloud Data Protection?

Cloud has expanded where data lives and how you should protect it. Data now flows across SaaS apps, cloud-native services, and on-premises systems, often in more than one public cloud. That flexibility is powerful, but it also expands the blast radius for mistakes, misconfigurations, and modern threats like double-extortion ransomware. Cloud data protection is your operating model for securing, backing up, and recovering this sprawl by aligning identity, encryption, immutability, and recovery orchestration so you can bounce back quickly and confidently. Read more
David Cackowski
David Cackowski

Product Marketing Manager, Kasten

What Is Cloud Data Management?

Cloud data lives everywhere now: On-premises, in multiple public clouds, and inside SaaS apps. That’s powerful, but it also means your team needs a deliberate way to organize, protect, govern, and optimize data across all those locations. In other words, you need cloud data management. Because this blog is for practitioners, we’ll keep it practical: Definitions first, then architectures, guardrails, and proven practices, so you can develop a strategy that holds up in the real world. Read more
David Cackowski
David Cackowski

Product Marketing Manager, Kasten

Multi and Hybrid Cloud Architecture: A Complete Guide

Businesses demand flexibility, control, and reliability from their IT infrastructures. The growing complexity of cloud environments has pushed many organizations to adopt multi- and hybrid cloud architectures as strategic solutions. But what makes these architectures so valuable? And how can businesses implement them effectively? Read more
Kelsey Teske
Kelsey Teske

Product Marketing Manager

Nutanix AHV vs. VMware ESXi: Making an Informed Decision

As IT environments become more complex, the question of which hypervisor to use – Nutanix AHV or VMware ESXi – is one many teams face. Whether you are running traditional 3-tier architecture, shifting to hyperconverged infrastructure (HCI), or building a hybrid cloud strategy, choosing the right foundation matters. Read more
Tyler Jurgens
Tyler Jurgens

Senior Technical Product Marketing Manager

Introducing Veeam Vault to the One UI: Secure Cloud Storage Made Easy

Veeam Vault joins our all-new unified OneUI, alongside our Veeam Data Cloud workloads for Microsoft 365, Entra ID, Salesforce, and more. This integration brings our fully managed and pre-secured cloud storage solution front and center, making it even easier for organizations to protect, manage, and recover their most critical data all from a single interface. Read more

Smart Strategies for Handling Vendor Lock-In, Lock-Out, and Data Challenges

First, let’s take a quick look at the complicated nature of lock-in versus lock out. Vendor lock-In occurs when a company gets stuck relying on a specific technology or service from a particular cloud provider. This makes it difficult and expensive to switch providers or technologies. It’s a bit of a trap when you become too dependent on one company. On the other hand, vendor lock-out happens if a company loses access to its data or services supplied by a cloud provider. It can happen if there are disputes, payment issues, or problems on the vendor’s side. This situation can resemble being banned from your own digital tools and information. Read more
Leah Troscianecki
Leah Troscianecki

Principal Product Marketing Manager, Cloud

The Overlooked Risk in Your Microsoft 365 Defense: Why Identity Protection Matters More Than Ever

Cybersecurity is a moving target, and as organizations increasingly rely on Microsoft 365, Entra ID has become the latest battleground in the war on information security. In our recent webinar, “The Overlooked Risk in Your Microsoft 365 Defense: Identity Protection”, Veeam expert Karinne Bessette and industry leader Joseph Carson explored the real-world risks organizations face, including why identity is under attack and how resilience backup strategies play a vital role in modern defense. Read more
Karinne Bessette
Karinne Bessette

Global Technologist, Microsoft 365 Lead