Veeam Blog
Filters (Results: 420)
Results: 420
Filters (Results: 420)
  • Business Types (1)
Stay up to date on the latest tips and news
By subscribing, you are agreeing to have your personal information managed in accordance with the terms of Veeam’s Privacy Policy
You're all set!
Watch your inbox for our weekly blog updates.
OK

What Is Cloud Shared Responsibility Model?

The shared responsibility model is one of the most important features of effective cloud security and your organization’s overall security posture. This applies whether you use a Software-as-a-Service (SaaS) model, such as Microsoft 365, or an all-encompassing Infrastructure-as-a-Service (IaaS) model. There are always responsibilities shared between you and the cloud service provider. Read more
Billy Cashwell
Billy Cashwell

Principal Product Marketing Manager

The Organizational Structure of Ransomware Threat Actor Groups is Evolving Before Our Eyes

As we approach the one year anniversary of two prominent ransomware group collapses (Lockbit and BlackCat/ALPHV), we find the ransomware ecosystem to be as fractured and uncertain as it did in the months following these events. The Ransomware-as-a-Service (RaaS) model remains irreversibly tarnished after the groups that pioneered this framework were exposed as being fraught with infighting, deception, lost profits, and compromised anonymity for their affiliates. Joint law enforcement actions over the last year have systematically impaired the resources ransomware actors depend on to operate. In the case of domestic threats, law enforcement efforts have even put a number of bad actors behind bars. While certain groups persist and new names continue to trickle in and out of the ransom-sphere, ... Read more
Bill Siegel
Bill Siegel

CEO & Co-founder of Coveware

Expand Security with SIEM Integration and Backup

SIEM integration involves consolidating a variety of cybersecurity tools, including firewalls, intrusion detection systems, antivirus solutions, IAM (Identity and Access Management), Endpoint security, and Cloud security, into a unified platform. This modernization encompasses a broader range of security measures, moving beyond the older solutions. Read more
Matt Crape
Matt Crape

Senior Technical Product Marketer

Best Practices for Secure Hybrid and Multi-Cloud Backup

Cloud computing has become ubiquitous and has reached the point where nearly half of all workloads run in the cloud. Currently, most organizations operate a combination of on-premise and cloud workloads, known as a hybrid cloud. Typically, they keep key services within their data centers and use the cloud for customer-facing services, software applications and flexible data storage. The hybrid cloud model is ideal because it is not always possible, or even wise, to move everything to the cloud for reasons like cost, performance and compliance. Read more
Sam Nicholls
Sam Nicholls

Principal, Product Marketing

The Power of Veeam Intelligent Diagnostics

In Veeam Availability Suite 9.5 Update 4, we released a feature called Veeam Intelligent Diagnostics. In Veeam Availability Suite v10, we enhanced VID by adding the ability to find potential issues with proxies and backup repositories in addition to Veeam Backup & Replication servers. Let’s take a look at how VID reduces risk in your Veeam environment and keeps it always ready to protect or restore your data. Read more
Kirsten Stoner
Kirsten Stoner

Technologist, Product Strategy

Melissa Palmer
Melissa Palmer

Team Lead/Senior Technologist, Product Strategy

How to protect your organization from ransomware attacks

One thing that all CIOs have had on their minds the last couple of years is if their infrastructure and services are safe from ransomware attacks. So far in 2021 we have seen a surge of ransomware attacks that have targeted even large enterprises like Colonial Pipeline which supply 45% of the East Coast's supply of diesel, petrol and jet fuel and ended up paying 5 million for getting back access to their data. The latest statistics show that there is a ransomware attack every 11 seconds, where the attackers utilize different attack vectors to try to get access. So how can we protect ourselves or at least reduce the risk from these types of attacks? Read more
Marius Sandbu
Marius Sandbu

Guest author, Guild Lead for Public Cloud at TietoEVRY