Veeam Blog
Filters (Results: 1594)
Results: 1594
Filters (Results: 1594)
  • Business Types (1)
Stay up to date on the latest tips and news
By subscribing, you are agreeing to have your personal information managed in accordance with the terms of Veeam’s Privacy Policy
You're all set!
Watch your inbox for our weekly blog updates.
OK

From Leak to Lockdown: Recommendations for Cyber Resilience

Credential leakage remains a critical vulnerability in cybersecurity, directly fueling the rise of ransomware attacks. With infostealer malware driving a surge in stolen credentials, organizations must implement robust security measures and proactively monitor the dark web to prevent exploitation. This blog outlines a framework for enhancing cyber resilience through prevention, early detection, and recovery strategies. Read more
Conner Reznicek
Conner Reznicek

Lead Solutions Engineer

Kelli Hartwick
Kelli Hartwick

Senior Product Marketing Manager

Identity Management Explained: Common Vulnerabilities and How Attacks Happen

Every day, more than 600 million identity‑based attacks target users across cloud and SaaS environments, and an increasing number of breaches now begin with compromised credentials. Attackers now log in instead of breaking in, which makes Identity and Access Management (IAM) the new perimeter of defense. Read more
Kendall Gray
Kendall Gray

Product Marketing Associate

Six Consecutive Wins, One Truth: Veeam Rules Kubernetes Resilience

The Kubernetes landscape expands every year with more clusters, more workloads, and more AI. However, one constant remains: the Veeam Kasten juggernaut. For the sixth year in a row, Veeam has been named a leader and outperformer in the newest edition of the GigaOm Radar for Kubernetes Data Protection Report, setting the standard for Kubernetes resilience Read more

Cloud Service Providers: What They Are, Benefits & Examples

Nowadays, managing a datacenter involves balancing a precarious equation: Data is growing exponentially, security threats are evolving daily, and the demand for 99.9% uptime is non-negotiable. For many IT infrastructure directors, the solution is to levaerage the specialized capabilities of a cloud service provider (CSP). Read more
Michael Loos
Michael Loos

VCSP Manager, Product Marketing

Beyond the Checklist: The 5 Security Questions You Must Ask Your Data Protection Vendor

In the current threat landscape, your data protection platform is either your strongest asset or your weakest link. For Security Leaders, the days of relying on a standard spreadsheet questionnaire to vet vendors are over. A simple "yes" in a checkbox doesn't stop a supply chain attack, nor does it guarantee that your partner has the operational maturity to handle a zero-day vulnerability. Read more
Emilee Tellez
Emilee Tellez

Field CTO, Veeam OR Director of Product Strategy

Expanding SOC Visibility: New Veeam Dashboards and Rule Templates in CrowdStrike Falcon Next-Gen SIEM

In today’s threat landscape, security operations center (SOC) teams are expected to respond faster than ever, but critical security signals often remain hidden in places they don’t regularly monitor. One of the biggest blind spots? Backup activity. When attackers target backups for deletion, tampering, or malware injection, those early warning signs rarely make it into the SOC’s detection workflow. Read more
Kelli Hartwick
Kelli Hartwick

Senior Product Marketing Manager

Sourabh Bhosale
Sourabh Bhosale

Staying Compliant, Secure, and Resilient

Modern data protection must be compliant, secure and resilient; not only to pass audits, but to recover with confidence. For most organizations, managing compliance, risk, and security can be a time-consuming, and complex challenge. This is because businesses are impacted every day by internal and external factors that affect growth, strategy and survival. Whether it’s a new regulation to adhere to, a new advancement in technology or even the scare of a cyberattack, it’s critical to have a modern IT strategy that continues to evolve with business and includes its people and processes.

Compliance, governance, and risk are all factors organizations need to address, whether big or small. Think of compliance as the ongoing governance and management of risk. Making sure ... Read more

Kirsten Stoner
Kirsten Stoner

Technologist and Program Lead

Stacking Intelligence: How Veeam’s AI-Powered Data Protection Redefines Resilience

AI is no longer just a buzzword or a promise of future transformation. It’s become an operational reality and a critical driver of efficiency, innovation, and, increasingly, security. From predicting inventory needs to generating customer insights, incorporating AI has become central to competition and innovation. As enterprises race to automate, streamline, and protect their digital operations, the focus is shifting from simply adopting AI to integrating it intelligently and securely into multiple layers of your business. Therefore, in this new landscape, how organizations protect and manage their data becomes the ultimate differentiator. Read more

Built on Trust: Why Customers Choose Veeam Again and Again

At Veeam, we don’t just build data protection solutions — we build confidence. Every product we deliver is shaped by authentic customer feedback, tested against real-world challenges, and designed to help organizations stay resilient in an environment where downtime isn’t an option. Read more
Abigail Fish
Abigail Fish

Customer Insights Senior Associate