Veeam Blog
Filters (Results: 1576)
Results: 1576
Filters (Results: 1576)
  • Business Types (1)
Stay up to date on the latest tips and news
By subscribing, you are agreeing to have your personal information managed in accordance with the terms of Veeam’s Privacy Policy
You're all set!
Watch your inbox for our weekly blog updates.
OK

Dangerous Tools in Clumsy Hands: Lessons from the VanHelsing Ransomware Leak

For many organizations, this is the nightmare scenario: you think you’ve negotiated your way out of a ransomware attack, you’ve paid the ransom demanded, and you’ve waited for the promised decryption tool. But when you think your data is safe and the ordeal is finished, you discover your data is still lost. Read more

Driving Enterprise Efficiency: VMWare Rightsizing Powered by Veeam ONE and Pure1

In today’s enterprise IT landscape, organizations are challenged to maximize performance, control costs and drive efficiencies across their virtual environments.  Additionally, migrating to a new hypervisor is a complex and costly process. Read more
Mark Polin
Mark Polin

Solutions Architect, Cisco/Pure

Minimum Viable Business and Minimum Viable Company for Cyber Resilience: What You Need to Know

MVB or MVC refers to the minimum possible version of an organization that can still operate should an incident bring down systems and operations. They are critical concepts in cyber resilience planning and response. They define the bare minimum operations, processes, systems, and data an organization must restore to remain functional after a cyberattack. Read more

The Overlooked Risk in Your Microsoft 365 Defense: Why Identity Protection Matters More Than Ever

Cybersecurity is a moving target, and as organizations increasingly rely on Microsoft 365, Entra ID has become the latest battleground in the war on information security. In our recent webinar, “The Overlooked Risk in Your Microsoft 365 Defense: Identity Protection”, Veeam expert Karinne Bessette and industry leader Joseph Carson explored the real-world risks organizations face, including why identity is under attack and how resilience backup strategies play a vital role in modern defense. Read more
Karinne Bessette
Karinne Bessette

Technologist, Product Strategy

Veeam Achieves TX-RAMP Level 2 Security Certification for Veeam Data Cloud Products

Veeam® Software, the leader in Data Protection and Ransomware Recovery, today announced that its Veeam Data Cloud (VDC) offerings have been awarded the Texas Risk and Authorization Management Program (TX-RAMP) Level 2 security certification. This achievement underscores Veeam’s commitment to delivering industry-leading, secure cloud data protection solutions to public sector organizations across Texas. Read more

Fortify Cyber Resilience Through Hyperautomation with Veeam + Torq

Cyberthreats continue to expand in frequency and complexity. They increase pressure on security operations and IT teams to preempt, detect, respond to, and recover from attacks faster, more accurately and confidently. Many organizations remain hindered by limited visibility, fragmented tools, and manual processes. These obstructions and complexities slow their ability to respond effectively to a cyber incident. Read more

Clean Recovery and Business Continuity: Expert Insights from Veeam and Coveware

Recovery isn’t just about getting systems back online; it’s about proving that IT operations are essential to business continuity. Veeam’s Leah Troscianecki sat down with Ray Umerley, Field CISO, Coveware by Veeam, for a tactical conversation about what actually happens when ransomware hits, and how clean recovery can turn the tide from operational fire drills to strategic foresight. Read more
Leah Troscianecki
Leah Troscianecki

Product Marketing Manager, Cloud Product Marketing

8 Reasons Veeam Data Cloud is the #1 Choice for Microsoft 365 SaaS Backup

Your Microsoft 365 data may live in the cloud, but that doesn’t make it immune to loss. A single mistaken deletion, sync error, or ransomware attack can wipe out critical emails, files, or Teams conversations in seconds. Microsoft 365 keeps your services available, but many organizations incorrectly assume that availability equals protection. Read more
Kendall Gray
Kendall Gray

Product Marketing Associate

Backing Up Microsoft Entra ID Conditional Access Policies Matters

Conditional access policies in Microsoft Entra ID (formerly Azure AD) are at the heart of modern identity security. They determine who gets access to what, under which conditions, based on factors like user identity, device state, location, and application sensitivity. But these critical policies are often overlooked in backup strategies. Read more
Colin Hanks
Colin Hanks

Product Marketing Manager, SMB Velocity