Veeam Blog
Filters (Results: 941)
Results: 941
Filters (Results: 941)
Stay up to date on the latest tips and news
By subscribing, you are agreeing to have your personal information managed in accordance with the terms of Veeam’s Privacy Policy
You're all set!
Watch your inbox for our weekly blog updates.
OK

How to Prevent Supply Chain Ransomware Attacks

It’s 2025, and SaaS and other cloud services are predominant. Organizations rely on countless suppliers, vendors, and service providers to deliver critical infrastructure, software, and services. This interconnectedness, while driving efficiency and innovation, has also created a new cyberattack surface that sophisticated threat actors are increasingly exploiting. This new surface is the supply chain. Read more

Nutanix AHV vs. VMware ESXi: Making an Informed Decision

As IT environments become more complex, the question of which hypervisor to use – Nutanix AHV or VMware ESXi – is one many teams face. Whether you are running traditional 3-tier architecture, shifting to hyperconverged infrastructure (HCI), or building a hybrid cloud strategy, choosing the right foundation matters. Read more

Introducing Veeam Vault to the One UI: Secure Cloud Storage Made Easy

Veeam Vault joins our all-new unified OneUI, alongside our Veeam Data Cloud workloads for Microsoft 365, Entra ID, Salesforce, and more. This integration brings our fully managed and pre-secured cloud storage solution front and center, making it even easier for organizations to protect, manage, and recover their most critical data all from a single interface. Read more

Smart Strategies for Handling Vendor Lock-In, Lock-Out, and Data Challenges

First, let’s take a quick look at the complicated nature of lock-in versus lock out. Vendor lock-In occurs when a company gets stuck relying on a specific technology or service from a particular cloud provider. This makes it difficult and expensive to switch providers or technologies. It’s a bit of a trap when you become too dependent on one company. On the other hand, vendor lock-out happens if a company loses access to its data or services supplied by a cloud provider. It can happen if there are disputes, payment issues, or problems on the vendor’s side. This situation can resemble being banned from your own digital tools and information. Read more
Leah Troscianecki
Leah Troscianecki

Principal Product Marketing Manager, Cloud

How Higher Education Institutions Can Strengthen Cyber Resilience with Modern Data Protection

Education sector IT teams are facing unprecedented cybersecurity threats and compliance demands. For colleges and universities, cyber resilience is the ability to withstand, recover from, and adapt to cyberattacks and IT disruptions, without losing access to critical systems and data. Read more
Kellen Flood
Kellen Flood

Director of Public Sector

Locking Down Public-Sector Data: My Perspective on Why Veeam Data Cloud Vault Sets the New Standard

As director of public sector sales for Veeam in the U.S., I spend my days talking with state agencies, county CIOs, school districts, and federal program managers who are under relentless pressure. Ransomware actors see public services as soft targets, compliance mandates tighten every budget cycle, and legacy infrastructure isn’t aging gracefully. When 911 dispatch, election platforms, or student information systems go dark, it’s front-page news and citizens feel it instantly. Read more
Kellen Flood
Kellen Flood

Director of Public Sector

Safeguarding Public Sector Data: Veeam’s Blueprint for SLED Resilience

In my role at Veeam, I have the privilege of working closely with state, local, and education (SLED) organizations across the U.S. Every day, I hear first-hand the challenges IT teams face including tight budgets, aging infrastructure, rising cyberthreats, and the constant pressure to meet compliance mandates. It's not easy. In fact, with 87% of U.S. state and local governments reporting at least one cyber incident in the past two years, the stakes have never been higher. Read more
Kellen Flood
Kellen Flood

Director of Public Sector

Dangerous Tools in Clumsy Hands: Lessons from the VanHelsing Ransomware Leak

For many organizations, this is the nightmare scenario: you think you’ve negotiated your way out of a ransomware attack, you’ve paid the ransom demanded, and you’ve waited for the promised decryption tool. But when you think your data is safe and the ordeal is finished, you discover your data is still lost. Read more
Ian Findling
Ian Findling

Sr. Content Strategy Specialist