Business
|
May 16, 2023 (Updated May 17, 2023)
2 min to read
As we continue to get ready for VeeamON, the Community Event for Data Recovery Experts, Veeam is excited to announce eight Veeam Innovation Award (VIA) winners for 2023. Read more
Technical
|
May 15, 2023 (Updated June 10, 2024)
3 min to read
Software Security Certifications: A Primer and Update
Security is becoming increasingly critical as the world becomes more digital and interconnected. Security is paramount at Veeam Software. We understand the importance of maintaining the highest level of security to protect our customers' information. We are pleased to announce that we are undergoing Common Criteria certification, DoDIN APL certification, CMMC v2 and Independent Verification & Validation (IV&V) to enhance our products' security measures. Read more
Technical
|
May 10, 2023 (Updated March 12, 2026)
12 min to read
Protecting Your Unstructured Data: NAS Backup Best Practices
Unstructured data and file repositories are common in most enterprise environments. As organizations try to reduce licensing costs and maintenance overhead, Network Attached Storage (NAS) is still commonplace in many modern enterprises. The ability to store and host data directly on NAS without having to manage OS patches and other lifecycle operations is very attractive to many IT departments. Even though it isn’t suited for all workloads, unstructured data like Microsoft Office documents, JPGs, MP3s, etc. is one of the most common use cases for NAS backup. Read more
Technical
|
May 10, 2023 (Updated August 22, 2024)
8 min to read
How Kasten K10 Integrates With Red Hat Advanced Cluster Security for Security Monitoring
In this blog, we will be showcasing an integration between Kasten K10’s Kubernetes native data protection solution and Red Hat Advanced Cluster Security (RHACS), a platform that allows organizations to more securely build, deploy, and run cloud native applications. Read more
Executive
|
May 9, 2023 (Updated January 28, 2025)
5 min to read
Top 8 Enterprise Data Protection Threats
As the market for data protection grows, customers and consumers have grown accustomed to fast, easy and intuitive data pipelines. Enterprises, on the other hand, face a volume of complexities and dependencies that most consumers never encounter, and are often times discounted from these consumer-focused luxuries. Read more
May 8, 2023 (Updated April 10, 2024)
4 min to read
Veeam Women of the Channel – Raising Each Other Up
I’ve always believed in surrounding yourself with good people who are going to challenge you and make you better. That’s certainly what I’ve found during my short time here at Veeam, as I’m surrounded by 15 colleagues that were recognized today on the CRN 2023 Women of the Channel (WOTC) list. All these women work incredibly hard driving our channel-first mission here at Veeam. It’s an honor to work with women who share the same passion and raise each other up other within our organization, and as a result, we make each other better. Read more
Business
|
May 5, 2023
3 min to read
Cisco Hybrid Cloud Data Management With Veeam Platform
So much of the discussion about hybrid cloud is focused on moving workloads from data centers to the cloud (typically public cloud, but also managed cloud services). This makes intuitive sense: the cloud offers flexibility and simplicity of services that can be easily scaled up and down as needed. The most compelling reason is that you only pay for what you use. Let’s face it, you can do things in the cloud that you could never imagine doing in a data center. Read more
Technical
|
May 4, 2023 (Updated March 12, 2026)
4 min to read
Ubuntu Linux Essentials: Booting Into Single User Mode and Protecting Against Unauthorized Access
Anyone with console access to a Linux machine can get root access on the machine by booting into “single user mode”. In this blog, I will show how to boot into single user mode and how to protect the bootloader against unauthenticated attempts to boot into single user mode. Read more
Business
|
May 3, 2023 (Updated May 16, 2023)
4 min to read
Veeam’s Anomaly Detection for Ransomware
Ransomware attacks have a greater chance of causing data loss than any other DR event. Without visibility into the backup repositories, it will be difficult, if not impossible, to find the last known good copy of your data. Learn how Veeam's three-tiered approach to identifying clean data can help you recover faster. Read more
Executive
|
April 26, 2023 (Updated May 30, 2024)
6 min to read
Enterprise Data Protection Guide
Data is a perpetually growing and essential force for every business or organization and having a plan to manage all that data is critical.
Read more