Veeam Blog
Filters (Results: 1598)
Results: 1598
Filters (Results: 1598)
Stay up to date on the latest tips and news
By subscribing, you are agreeing to have your personal information managed in accordance with the terms of Veeam’s Privacy Policy
You're all set!
Watch your inbox for our weekly blog updates.
OK

Proxmox High Availability: Ensuring Always‑On Virtualization with Veeam

TL;DR–KeyTakeaways

ProxmoxHighAvailability(HA) automatically restarts virtual machines on healthy nodes when failures occur, keeping workloads online with minimal disruption.Even brief outages can impact operations and customer trust.HA ensures critical services keep running without manual intervention.ProxmoxHA delivers reliable uptime and fault tolerance but lacks built‑in backup, recovery, and ransomware protection.VeeamBackup&Replication complementsProxmoxHAwith immutablebackupsandenterprise‑graderesilience.

WhatIsProxmoxHighAvailability?

When we talk about High Availability in virtualization, we’re talking about one thing,keeping workloads running no matter what happens underneath.

ProxmoxHighAvailability(HA) automatically restarts virtual machines or containers on healthy nodes if a host fails, ensuring minimal downtime and continuous service availability.

ProxmoxHA is built into the ProxmoxVirtualEnvironment(PVE), which isan open‑source platform that many IT teams use because it’s simple, stable, and cost‑effective.
It lets you create clusters of physical servers that work together as a ... Read more

Cody Ault
Cody Ault

Staff Solutions Architect, Cloud - Product Management, Alliances

Migrating VMware to OpenShift: Some Practical Guidance and Best Practices

Migrating and/or replatforming can be intimidating. And for good reason — there are often many complex and disparate systems with varying levels of tech debt, multiple teams, stakeholders, and business units involved. They need to be consulted, assist with pre- and post-migration activities, and often have aggressive timelines with little flexibility in terms of downtime or maintenance windows. Read more

Critical Infrastructure Cybersecurity: Frameworks, Risks, and Resilience Strategies

Critical infrastructure cybersecurity protects the essential systems that keep society running: Power grids, water treatment plants, hospitals, transportation networks, and communications. These environments face constant threats from ransomware groups and state‑sponsored attackers seeking to disrupt operations or test national defenses. Read more
Kelli Hartwick
Kelli Hartwick

Senior Product Marketing Manager

From Leak to Lockdown: Recommendations for Cyber Resilience

Credential leakage remains a critical vulnerability in cybersecurity, directly fueling the rise of ransomware attacks. With infostealer malware driving a surge in stolen credentials, organizations must implement robust security measures and proactively monitor the dark web to prevent exploitation. This blog outlines a framework for enhancing cyber resilience through prevention, early detection, and recovery strategies. Read more
Conner Reznicek
Conner Reznicek

Lead Solutions Engineer

Kelli Hartwick
Kelli Hartwick

Senior Product Marketing Manager

Identity Management Explained: Common Vulnerabilities and How Attacks Happen

Every day, more than 600 million identity‑based attacks target users across cloud and SaaS environments, and an increasing number of breaches now begin with compromised credentials. Attackers now log in instead of breaking in, which makes Identity and Access Management (IAM) the new perimeter of defense. Read more
Kendall Gray
Kendall Gray

Product Marketing Associate

Six Consecutive Wins, One Truth: Veeam Rules Kubernetes Resilience

The Kubernetes landscape expands every year with more clusters, more workloads, and more AI. However, one constant remains: the Veeam Kasten juggernaut. For the sixth year in a row, Veeam has been named a leader and outperformer in the newest edition of the GigaOm Radar for Kubernetes Data Protection Report, setting the standard for Kubernetes resilience Read more

Cloud Service Providers: What They Are, Benefits & Examples

Nowadays, managing a datacenter involves balancing a precarious equation: Data is growing exponentially, security threats are evolving daily, and the demand for 99.9% uptime is non-negotiable. For many IT infrastructure directors, the solution is to levaerage the specialized capabilities of a cloud service provider (CSP). Read more
Michael Loos
Michael Loos

VCSP Manager, Product Marketing

Beyond the Checklist: The 5 Security Questions You Must Ask Your Data Protection Vendor

In the current threat landscape, your data protection platform is either your strongest asset or your weakest link. For Security Leaders, the days of relying on a standard spreadsheet questionnaire to vet vendors are over. A simple "yes" in a checkbox doesn't stop a supply chain attack, nor does it guarantee that your partner has the operational maturity to handle a zero-day vulnerability. Read more
Emilee Tellez
Emilee Tellez

Field CTO, Veeam OR Director of Product Strategy