Veeam Blog
Filters (Results: 418)
Results: 418
Filters (Results: 418)
  • Virtual (0)
  • Cloud (0)
  • Physical (0)
  • Applications (0)
  • Storage Integrations (0)
  • Data Security and Compliance (0)
Stay up to date on the latest tips and news
By subscribing, you are agreeing to have your personal information managed in accordance with the terms of Veeam’s Privacy Policy
You're all set!
Watch your inbox for our weekly blog updates.
OK

 Azure Security Tools & Features: A Comprehensive Guide

In 2024, it is safe to say that many organizations have embraced a cloud strategy in some way. Whether that is a hybrid cloud model or multi-cloud model that uses some of the most common approaches like Software as a Service (SaaS), Platform as a Service (PaaS), or Infrastructure as a Service (IaaS). One thing is clear, the need to protect and secure these environments is crucial for all businesses. Microsoft Azure offers many of these cloud services to users depending on their needs, but did you know they also have tools available to help secure the environment and data as well? Let’s dive into some of the security tools and features you can find available in Microsoft Azure. Read more

Comprehensive Overview of Google Cloud Security

Integrating Google Cloud security measures is crucial to enhancing the security of digital assets in the cloud. By leveraging Google Cloud's security infrastructure, businesses can ensure that their sensitive data, trade secrets, personal information, intellectual property, and financial data is well-protected. Implementing proper access controls, encryption protocols, and utilizing monitoring capabilities offered by Google Cloud can significantly reduce the risk of unauthorized access and potential data breaches. Read more
Cody Ault
Cody Ault

Staff Solutions Architect, Cloud - Product Management, Alliances

Highlight Threats and Reduce Risk With Veeam Threat Center

Veeam Data Platform is continuously evolving to provide users with the tools they need for ultimate data protection and resilience. It provides a holistic solution for data protection with monitoring and orchestration capabilities that help ensure compliance and cyber resilience. Read more
Kirsten Stoner
Kirsten Stoner

Technologist, Product Strategy

Guide to Google Cloud Disaster Recovery

Modern companies rely on their ability to leverage their data and applications to function in almost every aspect of their business, whether it’s their website used for e-commerce, inventory databases, and industrial controls for manufacturers, sales and customer relation management systems, medical records, or payment systems. Without these capabilities, hospitals, utility companies, and emergency services can’t function and provide critical services. Companies could be unable to serve customers, take new orders, or manufacture products, causing loss of revenue and failing to meet obligations or even face regulatory penalties.   Read more
Cody Ault
Cody Ault

Staff Solutions Architect, Cloud - Product Management, Alliances