Veeam Blog
Filters (Results: 1527)
Results: 1527
Filters (Results: 1527)
  • Business Types (1)
Stay up to date on the latest tips and news
By subscribing, you are agreeing to have your personal information managed in accordance with the terms of Veeam’s Privacy Policy
You're all set!
Watch your inbox for our weekly blog updates.
OK

Akira Exploits the Gaps Between Patching and Identity Security

Coveware by Veeam experts have observed a sharp rise in Akira ransomware cases, with more than 40 of those incidents tied to a single exploitation pathway. At the center of these cases is a recently mitigated VPN vulnerability in widely deployed enterprise appliances, which Akira has been actively exploiting to gain initial access. What makes this surge particularly concerning is that many of the victim organizations had already applied the vendor’s patch. Read more
Raymond Umerley
Raymond Umerley

Field CISO

How to Prevent Supply Chain Ransomware Attacks

It’s 2025, and SaaS and other cloud services are predominant. Organizations rely on countless suppliers, vendors, and service providers to deliver critical infrastructure, software, and services. This interconnectedness, while driving efficiency and innovation, has also created a new cyberattack surface that sophisticated threat actors are increasingly exploiting. This new surface is the supply chain. Read more

The Challenge of Cloud Storage for Backups: Security Concerns, Bill Shock, and Expertise

Storing backups in the cloud is an increasingly popular strategy for good reason. A good plan includes storing backups securely off-site, and cloud storage backup solutions offer a convenient way for you to achieve that goal. However, when you store data in the cloud, you may face challenges with managing cloud spend, security, resources, or expertise. In this guide, we explore these cloud storage challenges and how to mitigate them. Read more

Ransomware Prevention: Technical Best Practices & Strategic Defense

How can organizations prevent ransomware with today’s advanced and sophisticated threat landscape? It starts with building a strategic and layered defense. This includes deploying immutable backups, enforcing zero-trust principles, identifying attack vector and MITRE ATT&CK framework tactics, techniques, and procedures (TTP), and preparing with orchestrated recovery and up to date incident response plans. Ransomware prevention demands technical depth and proactive planning. Read more
Misha Rangel
Misha Rangel

Director, Enterprise Product Marketing

Bare-Metal Recovery for Microsoft Windows with Veeam Agent for Windows

Bare-metal recovery (BMR) is the process of restoring a fully functioning Windows machine from scratch (including the operating system, applications, settings, and files) to either the same or entirely different hardware. It’s called “bare metal” because the recovery takes place on a system that has no software installed at all — just hardware waiting for a complete rebuild. Read more

Nutanix AHV vs. VMware ESXi: Making an Informed Decision

As IT environments become more complex, the question of which hypervisor to use – Nutanix AHV or VMware ESXi – is one many teams face. Whether you are running traditional 3-tier architecture, shifting to hyperconverged infrastructure (HCI), or building a hybrid cloud strategy, choosing the right foundation matters. Read more

Ransomware Recovery: Comprehensive Strategies to Ensure Data Resilience

Ransomware attacks don’t just encrypt data. They compromise trust, stall operations, and threaten business continuity. In today’s threat landscape, the difference between days of downtime and fast, confident recovery often comes down to how well-prepared your recovery strategy is. With cyber extortion growing faster than ever in 2025, organizations need more than just backups, they need tested, orchestrated, and secure recovery plans. Read more

Introducing Veeam Vault to the One UI: Secure Cloud Storage Made Easy

Veeam Vault joins our all-new unified OneUI, alongside our Veeam Data Cloud workloads for Microsoft 365, Entra ID, Salesforce, and more. This integration brings our fully managed and pre-secured cloud storage solution front and center, making it even easier for organizations to protect, manage, and recover their most critical data all from a single interface. Read more

How Malware Protection by Veeam Safeguards Your Workloads from Threats

Ransomware attacks are more sophisticated than ever, targeting cloud-based workloads and posing significant risks to organizations. These cyberthreats can encrypt critical data, disrupt business operations, and demand hefty ransoms. Tactics such as double extortion and data theft amplify this potential damage, so a solid defense strategy is essential for safeguarding your cloud workloads. Read more
Brad Linch
Brad Linch

Director of Enterprise Strategy