Veeam Blog
Filters (Results: 1599)
Results: 1599
Filters (Results: 1599)
Stay up to date on the latest tips and news
By subscribing, you are agreeing to have your personal information managed in accordance with the terms of Veeam’s Privacy Policy
You're all set!
Watch your inbox for our weekly blog updates.
OK

Veeam Service Provider Console v9: Innovation, Efficiency, and Data Resiliency for Modern Service Providers

Building on the dedication to innovation and data resiliency, Veeam is excited to announce the launch of Veeam Service Provider Console v9. This release introduces major advancements that are designed to simplify operations, support the latest Veeam technologies, and deliver an unmatched user experience for service providers and MSPs. Read more
Michael Loos
Michael Loos

VCSP Manager, Product Marketing

What Is Cloud Data Management?

Cloud data lives everywhere now: On-premises, in multiple public clouds, and inside SaaS apps. That’s powerful, but it also means your team needs a deliberate way to organize, protect, govern, and optimize data across all those locations. In other words, you need cloud data management. Because this blog is for practitioners, we’ll keep it practical: Definitions first, then architectures, guardrails, and proven practices, so you can develop a strategy that holds up in the real world. Read more
David Cackowski
David Cackowski

Product Marketing Manager, Kasten

Multi and Hybrid Cloud Architecture: A Complete Guide

Businesses demand flexibility, control, and reliability from their IT infrastructures. The growing complexity of cloud environments has pushed many organizations to adopt multi- and hybrid cloud architectures as strategic solutions. But what makes these architectures so valuable? And how can businesses implement them effectively? Read more
Kelsey Teske
Kelsey Teske

Product Marketing Manager

Akira Exploits the Gaps Between Patching and Identity Security

Coveware by Veeam experts have observed a sharp rise in Akira ransomware cases, with more than 40 of those incidents tied to a single exploitation pathway. At the center of these cases is a recently mitigated VPN vulnerability in widely deployed enterprise appliances, which Akira has been actively exploiting to gain initial access. What makes this surge particularly concerning is that many of the victim organizations had already applied the vendor’s patch. Read more
Raymond Umerley
Raymond Umerley

Field CISO

How to Prevent Supply Chain Ransomware Attacks

It’s 2025, and SaaS and other cloud services are predominant. Organizations rely on countless suppliers, vendors, and service providers to deliver critical infrastructure, software, and services. This interconnectedness, while driving efficiency and innovation, has also created a new cyberattack surface that sophisticated threat actors are increasingly exploiting. This new surface is the supply chain. Read more

Nutanix AHV vs. VMware ESXi: Making an Informed Decision

As IT environments become more complex, the question of which hypervisor to use – Nutanix AHV or VMware ESXi – is one many teams face. Whether you are running traditional 3-tier architecture, shifting to hyperconverged infrastructure (HCI), or building a hybrid cloud strategy, choosing the right foundation matters. Read more

Introducing Veeam Vault to the One UI: Secure Cloud Storage Made Easy

Veeam Vault joins our all-new unified OneUI, alongside our Veeam Data Cloud workloads for Microsoft 365, Entra ID, Salesforce, and more. This integration brings our fully managed and pre-secured cloud storage solution front and center, making it even easier for organizations to protect, manage, and recover their most critical data all from a single interface. Read more

Smart Strategies for Handling Vendor Lock-In, Lock-Out, and Data Challenges

First, let’s take a quick look at the complicated nature of lock-in versus lock out. Vendor lock-In occurs when a company gets stuck relying on a specific technology or service from a particular cloud provider. This makes it difficult and expensive to switch providers or technologies. It’s a bit of a trap when you become too dependent on one company. On the other hand, vendor lock-out happens if a company loses access to its data or services supplied by a cloud provider. It can happen if there are disputes, payment issues, or problems on the vendor’s side. This situation can resemble being banned from your own digital tools and information. Read more
Leah Troscianecki
Leah Troscianecki

Product Marketing Manager, Cloud Product Marketing