Veeam Blog
Filters (Results: 1621)
Results: 1621
Filters (Results: 1621)
  • Business Types (1)
Stay up to date on the latest tips and news
By subscribing, you are agreeing to have your personal information managed in accordance with the terms of Veeam’s Privacy Policy
You're all set!
Watch your inbox for our weekly blog updates.
OK

Announcing the Ransomware Trends Report for 2023

Veeam is proud to release the findings of yet another independent research project, the 2023 Ransomware Trends Report. What’s almost as bad as going through a cyberattack is talking about it to others, so Veeam contracted with a research firm to conduct blind interviews and surveys of 1,200 organizations who suffered one or more attacks in 2022. Read more
Jason Buffington
Jason Buffington

Vice President, Market Strategy

Dave Russell
Dave Russell

Senior Vice President, Head of Strategy

6 New Ways Kasten K10 V6.0 Empowers Kubernetes Scalability

With Kasten K10 V6.0, customers will find new ways to scale their Kubernetes data protection efficiently. Thus, boosting business resiliency, increasing productivity of cloud native operations, and leveraging seamless integrations with their ever-expanding infrastructure. Read more
Gaurav Rishi
Gaurav Rishi

Vice President of Product

When Ransomware Threatens Modern Computing

Two dynamics in the global landscape of business are the prevalence of cyberthreats, and the emergence of the modern computing platform to deliver agile and flexible solutions. What happens when the two collide? Read more
David Cackowski
David Cackowski

Product Marketing Manager, Kasten

Securing Veeam Hardened Repository

After selecting the right hardware for the Veeam Backup & Replication Hardened Repository and installing the Ubuntu Linux operating system, the next step is secure the operating system according to the DISA STIG (Defense Information Systems Agency Security Technical Implementation Guides) guidelines. Read more
Hannes Kasparick
Hannes Kasparick

Director, Product Management

Software Security Certifications: A Primer and Update

Security is becoming increasingly critical as the world becomes more digital and interconnected. Security is paramount at Veeam Software. We understand the importance of maintaining the highest level of security to protect our customers' information. We are pleased to announce that we are undergoing Common Criteria certification, DoDIN APL certification, CMMC v2 and Independent Verification & Validation (IV&V) to enhance our products' security measures. Read more
Jose Mendoza
Jose Mendoza

Sr. Director, Cybersecurity Compliance & Product Certifications, GIS

Protecting Your Unstructured Data: NAS Backup Best Practices

Unstructured data and file repositories are common in most enterprise environments. As organizations try to reduce licensing costs and maintenance overhead, Network Attached Storage (NAS) is still commonplace in many modern enterprises. The ability to store and host data directly on NAS without having to manage OS patches and other lifecycle operations is very attractive to many IT departments. Even though it isn’t suited for all workloads, unstructured data like Microsoft Office documents, JPGs, MP3s, etc. is one of the most common use cases for NAS backup. Read more
Matt Crape
Matt Crape

Senior Technical Product Marketing Manager

How Kasten K10 Integrates With Red Hat Advanced Cluster Security for Security Monitoring

In this blog, we will be showcasing an integration between Kasten K10’s Kubernetes native data protection solution and Red Hat Advanced Cluster Security (RHACS), a platform that allows organizations to more securely build, deploy, and run cloud native applications. Read more
Thomas Keenan
Thomas Keenan

Senior Product Marketing Manager for Kasten by Veeam