Business
|
May 23, 2023 (Updated June 23, 2023)
2 min to read
Veeam is proud to release the findings of yet another independent research project, the 2023 Ransomware Trends Report. What’s almost as bad as going through a cyberattack is talking about it to others, so Veeam contracted with a research firm to conduct blind interviews and surveys of 1,200 organizations who suffered one or more attacks in 2022. Read more
Technical
|
May 23, 2023 (Updated October 7, 2025)
3 min to read
6 New Ways Kasten K10 V6.0 Empowers Kubernetes Scalability
With Kasten K10 V6.0, customers will find new ways to scale their Kubernetes data protection efficiently. Thus, boosting business resiliency, increasing productivity of cloud native operations, and leveraging seamless integrations with their ever-expanding infrastructure. Read more
Technical
|
May 23, 2023 (Updated September 17, 2024)
4 min to read
When Ransomware Threatens Modern Computing
Two dynamics in the global landscape of business are the prevalence of cyberthreats, and the emergence of the modern computing platform to deliver agile and flexible solutions. What happens when the two collide? Read more
Business
|
May 22, 2023 (Updated September 24, 2025)
4 min to read
5 Key Considerations for CTOs Building a Recovery Plan
It’s no secret that as time has passed, the data landscape we all live in has grown exponentially, and with each day that goes by, protecting your business-critical data from ransomware has become an increasingly complex process. Read more
Technical
|
May 18, 2023
6 min to read
How To Migrate a Veeam Backup & Replication Configuration Database to PostgreSQL
Before Veeam Backup & Replication v11, the product used SQL Server to create and store its configuration database. It has always been possible to use SQL Server Express to store a Veeam Backup & Replication, however, this version of SQL Server had some critical limitations. Read more
Technical
|
May 17, 2023 (Updated June 10, 2024)
20 min to read
Securing Veeam Hardened Repository
After selecting the right hardware for the Veeam Backup & Replication Hardened Repository and installing the Ubuntu Linux operating system, the next step is secure the operating system according to the DISA STIG (Defense Information Systems Agency Security Technical Implementation Guides) guidelines. Read more
Business
|
May 16, 2023 (Updated May 17, 2023)
2 min to read
Announcing the Veeam Innovation Award Winners for 2023
As we continue to get ready for VeeamON, the Community Event for Data Recovery Experts, Veeam is excited to announce eight Veeam Innovation Award (VIA) winners for 2023. Read more
Technical
|
May 15, 2023 (Updated June 10, 2024)
3 min to read
Software Security Certifications: A Primer and Update
Security is becoming increasingly critical as the world becomes more digital and interconnected. Security is paramount at Veeam Software. We understand the importance of maintaining the highest level of security to protect our customers' information. We are pleased to announce that we are undergoing Common Criteria certification, DoDIN APL certification, CMMC v2 and Independent Verification & Validation (IV&V) to enhance our products' security measures. Read more
Technical
|
May 10, 2023 (Updated March 12, 2026)
12 min to read
Protecting Your Unstructured Data: NAS Backup Best Practices
Unstructured data and file repositories are common in most enterprise environments. As organizations try to reduce licensing costs and maintenance overhead, Network Attached Storage (NAS) is still commonplace in many modern enterprises. The ability to store and host data directly on NAS without having to manage OS patches and other lifecycle operations is very attractive to many IT departments. Even though it isn’t suited for all workloads, unstructured data like Microsoft Office documents, JPGs, MP3s, etc. is one of the most common use cases for NAS backup. Read more
Technical
|
May 10, 2023 (Updated August 22, 2024)
8 min to read
How Kasten K10 Integrates With Red Hat Advanced Cluster Security for Security Monitoring
In this blog, we will be showcasing an integration between Kasten K10’s Kubernetes native data protection solution and Red Hat Advanced Cluster Security (RHACS), a platform that allows organizations to more securely build, deploy, and run cloud native applications. Read more