Veeam Blog
Filters (Results: 1599)
Results: 1599
Filters (Results: 1599)
Stay up to date on the latest tips and news
By subscribing, you are agreeing to have your personal information managed in accordance with the terms of Veeam’s Privacy Policy
You're all set!
Watch your inbox for our weekly blog updates.
OK

Multi-Agent AI for SQL Databases: Turning Natural Language into Business Insights

Much of my focus on unlocking value from enterprise data has been on unstructured content, including documents, emails, and various file formats. But there's immense untapped value in our structured enterprise databases, both current and historical. The challenge is the data’s accessibility. Business users need insights but lack SQL expertise, while technical teams understand databases but may miss the business context behind the questions. Read more
Ben Young
Ben Young

Director, Product Strategy - Field CTO, APJ

From Gaps to Gains: The Measurable Impact of Data Resilience Maturity

The reality is resilience is no longer just about having a backup. It’s about whether your systems and your people can perform under pressure. From ransomware to regulatory scrutiny, enterprises today are carrying more risk than ever. That’s why a maturity-based approach to data management, protection, and recovery isn’t optional anymore. It’s the difference between disruption and continuity. Read more
Leah Troscianecki
Leah Troscianecki

Product Marketing Manager, Cloud Product Marketing

What Is Cloud Disaster Recovery?

Downtime doesn’t just mean systems are “up” or “down” anymore; it encompasses everything from minor performance hiccups to major outages that disrupt entire regions. In the cloud, the goal isn’t merely to have “a copy” of your data, it’s to restart your business quickly and cleanly when something goes wrong. Read more
David Cackowski
David Cackowski

Product Marketing Manager, Kasten

Entra ID (Azure AD) Backup Solutions: Protecting Your Identity Infrastructure

Microsoft Entra ID (formerly known as Microsoft Azure Active Directory) is the foundational identity and access management (IAM) layer for hybrid and cloud-first enterprises. Yet, while Microsoft offers soft-deletion and recovery features, they fall short when facing ransomware, insider threats, or regulatory audits. Read more
Colin Hanks
Colin Hanks

Senior Product Marketing Manager

Choosing Your Go-to-Market: VAR, MSP, or MSSP with Veeam Data Platform

Choosing the right business model is one of the most important decisions for today’s technology partners. Should you operate as a Value-Added Reseller (VAR), expand into a Managed Service Provider (MSP), or specialize as a Managed Security Service Provider (MSSP)? Each approach comes with unique opportunities, responsibilities, and revenue streams — especially when it comes to data protection and cyber resilience. Read more

Navigating Market Shifts and Embracing Change as a Catalyst for Growth

The only constant in technology is change, and the Broadcom acquisition of VMware continues to send ripples across the industry. Partners who have long relied on VMware’s traditional programs now face monumental shifts including new licensing models, SKU consolidations, and a complete overhaul of partner tiers. This means many valued partners are left questioning their future in the VMware ecosystem, while customers are rethinking their virtualization strategies and seeking guidance on next steps. However, with disruption comes opportunity. As a Veeam ProPartner, you’re uniquely positioned to help customers navigate these uncertain waters, turning industry shifts into a competitive advantage. Read more

The Crucial Role of Security in the Age of Quantum Computing

Robust security measures are not mere features; they are essential components of any viable product or service. Security must be ingrained in every aspect of design and operation of software. With rapid advancements in AI and the looming influence of quantum computing, the state of “secure enough” has changed dramatically. Technologies that promise groundbreaking capabilities bring along significant new vulnerabilities; they must stay ahead of the curve to protect sensitive data and maintain trust in their systems. Read more
Bryant Schuck
Bryant Schuck

Principal Product Manager

What Is Cloud Data Protection?

Cloud has expanded where data lives and how you should protect it. Data now flows across SaaS apps, cloud-native services, and on-premises systems, often in more than one public cloud. That flexibility is powerful, but it also expands the blast radius for mistakes, misconfigurations, and modern threats like double-extortion ransomware. Cloud data protection is your operating model for securing, backing up, and recovering this sprawl by aligning identity, encryption, immutability, and recovery orchestration so you can bounce back quickly and confidently. Read more
David Cackowski
David Cackowski

Product Marketing Manager, Kasten