Veeam Blog
Filters (Results: 1581)
Results: 1581
Filters (Results: 1581)
  • Business Types (1)
Stay up to date on the latest tips and news
By subscribing, you are agreeing to have your personal information managed in accordance with the terms of Veeam’s Privacy Policy
You're all set!
Watch your inbox for our weekly blog updates.
OK

The Crucial Role of Security in the Age of Quantum Computing

Robust security measures are not mere features; they are essential components of any viable product or service. Security must be ingrained in every aspect of design and operation of software. With rapid advancements in AI and the looming influence of quantum computing, the state of “secure enough” has changed dramatically. Technologies that promise groundbreaking capabilities bring along significant new vulnerabilities; they must stay ahead of the curve to protect sensitive data and maintain trust in their systems. Read more

What Is Cloud Data Protection?

Cloud has expanded where data lives and how you should protect it. Data now flows across SaaS apps, cloud-native services, and on-premises systems, often in more than one public cloud. That flexibility is powerful, but it also expands the blast radius for mistakes, misconfigurations, and modern threats like double-extortion ransomware. Cloud data protection is your operating model for securing, backing up, and recovering this sprawl by aligning identity, encryption, immutability, and recovery orchestration so you can bounce back quickly and confidently. Read more
David Cackowski
David Cackowski

Product Marketing Manager, Kasten

Veeam Service Provider Console v9: Innovation, Efficiency, and Data Resiliency for Modern Service Providers

Building on the dedication to innovation and data resiliency, Veeam is excited to announce the launch of Veeam Service Provider Console v9. This release introduces major advancements that are designed to simplify operations, support the latest Veeam technologies, and deliver an unmatched user experience for service providers and MSPs. Read more
Michael Loos
Michael Loos

VCSP Manager, Product Marketing

What Is Cloud Data Management?

Cloud data lives everywhere now: On-premises, in multiple public clouds, and inside SaaS apps. That’s powerful, but it also means your team needs a deliberate way to organize, protect, govern, and optimize data across all those locations. In other words, you need cloud data management. Because this blog is for practitioners, we’ll keep it practical: Definitions first, then architectures, guardrails, and proven practices, so you can develop a strategy that holds up in the real world. Read more
David Cackowski
David Cackowski

Product Marketing Manager, Kasten

Multi and Hybrid Cloud Architecture: A Complete Guide

Businesses demand flexibility, control, and reliability from their IT infrastructures. The growing complexity of cloud environments has pushed many organizations to adopt multi- and hybrid cloud architectures as strategic solutions. But what makes these architectures so valuable? And how can businesses implement them effectively? Read more
Kelsey Teske
Kelsey Teske

Product Marketing Manager

Akira Exploits the Gaps Between Patching and Identity Security

Coveware by Veeam experts have observed a sharp rise in Akira ransomware cases, with more than 40 of those incidents tied to a single exploitation pathway. At the center of these cases is a recently mitigated VPN vulnerability in widely deployed enterprise appliances, which Akira has been actively exploiting to gain initial access. What makes this surge particularly concerning is that many of the victim organizations had already applied the vendor’s patch. Read more
Raymond Umerley
Raymond Umerley

Field CISO

How to Prevent Supply Chain Ransomware Attacks

It’s 2025, and SaaS and other cloud services are predominant. Organizations rely on countless suppliers, vendors, and service providers to deliver critical infrastructure, software, and services. This interconnectedness, while driving efficiency and innovation, has also created a new cyberattack surface that sophisticated threat actors are increasingly exploiting. This new surface is the supply chain. Read more

Nutanix AHV vs. VMware ESXi: Making an Informed Decision

As IT environments become more complex, the question of which hypervisor to use – Nutanix AHV or VMware ESXi – is one many teams face. Whether you are running traditional 3-tier architecture, shifting to hyperconverged infrastructure (HCI), or building a hybrid cloud strategy, choosing the right foundation matters. Read more

Introducing Veeam Vault to the One UI: Secure Cloud Storage Made Easy

Veeam Vault joins our all-new unified OneUI, alongside our Veeam Data Cloud workloads for Microsoft 365, Entra ID, Salesforce, and more. This integration brings our fully managed and pre-secured cloud storage solution front and center, making it even easier for organizations to protect, manage, and recover their most critical data all from a single interface. Read more