Resource Library


Sort by


Application Recovery


Resource Type



Originating in 1989, ransomware attacks have started spreading internationally around 2012, with infection approaches becoming more and more sophisticated and attack delivery getting easier and easier. The U.S. Department of Justice recently referred to ransomware as a new business model for cybercrime and a global phenomenon.

As ransomware becomes a mainstream threat, cybersecurity spending forecasts show substantial growth moving forward. Leveraging data protection and security best practices is crucial to protect your company’s Digital Life. Veeam® offers businesses and end users the confidence that their Digital Life will be Always-On™ and uninterrupted by ensuring they have the right ransomware resilience and recovery plans in place.

Read this Executive Brief to learn more about:

  • How to stay resilient against ransomware with data protection best practices
  • How to combat ransomware with Availability and recovery solutions
  • Unique Veeam solutions for ransomware resilience and efficient data recovery
Read now

Financial organizations are targeted by approximately 13% of total ransomware attacks, reported as the number one risk factor of the industry.

In this threat landscape, increasing security demands and regulations pose further challenges on the IT departments, that need to ensure data protection, business continuity and enable Availability for all applications and data no matter what.

Read this white paper, 7 Proven Resilience Best Practices against Ransomware for Financial Services and learn:

  • How ransomware impacts the financial sector
  • Key compliance requirements and Availability challenges
  • Best practices and resilience tips to fight ransomware
  • And more!
Read now

Last year, over 13% of the education organizations have been hit by ransomware attacks. The extensive personal information and research data, together with the open nature of this information, make the industry very vulnerable.

In this white paper, you will learn more about:

  • Ransomware and its outcomes in relation to the education industry
  • How to prepare for and recover from such attacks
  • How to defend sensitive information and align with the industry’s data security and integrity regulations.

Read the 7 Proven Resilience Best Practices Against Ransomware in Education and get the right tools you need to save the day!

Read now

15% of total global ransomware attacks in 2016 targeted health care institutions. The question is no longer an “if”, but when. Ransomware can shut down entire hospitals, severely damage the brand and result in steep regulatory penalties, or dramatically impact patient lives.

This white paper discusses the impact of ransomware on the medical sector, but most important, it provides clear guidelines on how to prepare for and recover from these attacks without compromising patient trust and aligning with the industry’s regulations around data protection and Availability.

Read 7 Proven Resilience Best Practices against Ransomware in Health Care and learn:

  • How ransomware impacts the health care industry
  • How to keep up with compliance and Availability challenges
  • How to enhance your data protection strategy with key resilience best practices
Read now
Author: Rick Vanover, VMware vExpert, MCP, MCITP, MCSA and Veeam Director of Technical Product Marketing & Evangelism

Ransomware is a real threat for CIOs and technology administrators today. In this new white paper, Veeam® Availability Platform designs for ransomware resiliency series, Veeam offers sound tips for adding ransomware resiliency so you can provide the best levels of Availability for critical applications and data.

The first chapter in the series, Veeam Availability Suite™ resiliency tips to enhance data protection, shows how design options for resiliency in Veeam products can protect you against ransomware threats discussing:

●       Offline storage, the most effective ransomware resiliency technique

●       Using different credentials for backup repositories

●       The need to have more types of restore points that are more frequent

In the second chapter, Veeam Backup & Replication™ and Veeam Agents resiliency tips to enhance data protection, Rick Vanover will outline additional tips around file backups and replication as well as using Veeam Agent for Microsoft Windows for backups of mobile workstations to removable media and discuss:

●       Additional backup that is file-only

●       Replicated VMs

●       Ejecting media and computer account permissions for Veeam Agent for Microsoft Windows

Read this whitepaper to discover best practices and recommendations for preparing your infrastructure against ransomware threats and for ensuring Availability of your systems. The paper consists of four chapters, two of them are available now and two more are coming soon!

Read now

Suppose you are the CIO of a state government agency and you decided to move your systems to the cloud to save money. You knew that keeping your servers, operating systems and databases on site was too costly. And suppose this move truly enabled you to do more with less and that your stakeholders loved the improved performance.

Migrating away from end-of-life systems and moving data to the cloud improved life for the people you serve because they now had access to information anytime, anywhere and on any device. And your capital expenditures also dropped dramatically. But then it turned out that just migrating to the cloud did not solve all your security problems. You realize you are still responsible for the security of your data.

In this white paper, we address:

  • Keys to surviving ransomware attacks
  • What to look for in a backup and recovery solution
  • Availability for the Always-On Enterprise™
Read now
Author: Brian Maher, Senior Manager, HPE Alliance Product Marketing, Veeam Software

Ransomware has evolved into a powerful cyber threat, able to take down solid security solutions. Ransomware attacks are spreading and becoming more sophisticated, which causes significant financial losses, brand identity damage or data loss for businesses around the world.

Solid data protection against ransomware threats requires a proactive approach, careful planning and industry best practices implementation, such as the 3-2-1 backup rule. Leveraging this rule, IT admins can ensure a high level of redundancy, as well as maximize application uptime and data protection. By doing so, organizations can avoid paying the ransom in case of a cyber-attack and benefit from a strong data availability solution.

Veeam and Hewlett Packard Enterprise (HPE) solution is easy to deploy and use and packed with very useful capabilities that make it an enterprise-class data availability solution: testing environment, rapid data restores and recovery or infrastructure lock down.

Read this joint Veeam and Hewlett Packard Enterprise (HPE) ransomware solution brief that details the rise in ransomware attacks, the business and IT risks of ransomware and explains how the integration of HPE storage platforms and Veeam software can be deployed to combat any ransomware threats by hackers.

Read now
Author: Orlando Scott‑Cowley, CISSP, CCSP, CCSK, cybersecurity expert

Ransomware is the main cyber security issue for most enterprise organizations, as they struggle to keep up with today’s rapidly changing threat landscape. This is no surprise, given that a single ransomware attack campaign portenitally nets criminals millions of dollars in return for very little risk or expenditure.

In this new Conversational Geek and Veeam e-book, learn more about:

  • The cost potential of a ransomware attack
  • Ransomware methods of entry
  • How to prepare for and recover from ransomware attacks

This executive brief summarizes the key findings published in the recent e-book, Conversational Ransomware Defense and Survival, by Veeam and Conversational Geek!

Read now
Author: Orlando Scott‑Cowley, CISSP, CCSP, CCSK, cybersecurity expert

Ransomware has become the poster child of cybersecurity threats for businesses of all types and end users alike, as well as the preferred money extortion tool for hackers and cybercriminals. With its impressive ability to evolve and bypass traditional data protection solutions, this is hardly surprising. The potential outcomes of an attack are highly detrimental, including critical data loss, lowered productivity and damaged brand reputation.

This e-book aims to give you an introduction into the ransomware threat, as well as the fundamentals of best-in-class ransomware preparedness and recovery, to help you and your organization mitigate the effects of ransomware. The initial attack could be inevitable, which is why the best protection is to be completely prepared and ready to recover from backups.

In the Conversational Ransomware Defense and Survival e-book, learn more about:

  • Ransomware milestones, key capabilities and its impact
  • The main layers of ransomware protection and preparedness against attacks
  • Quick and painless data recovery from backups
  • And much more!
Read now

Ransomware attacks are a serious threat to industries worldwide. According to the FBI, ransomware collected $209 million in the first three months of 2016 and is on pace to reach $1 billion in 2016. While healthcare organizations are the most publicized victims, this is a growing threat across all industries.

There are two common types of ransomware; lock screen, such as FakeBsod & Brolo, which lock screens and ask for payment to unlock them and encryption, such as CryptyWall, Lock and TorrentLocker, which encrypt data on a drive and demand payment to unlock it.

With ransomware evolving into a more complex and frequent phenomenon, organizations should follow common best practices for data protection, including the 3-2-1 principle: THREE copies of data on TWO different types of media and ONE copy stored offsite. The 3-2-1 Rule of data protection along with Veeam® Availability Suite™ enables companies to prevent data loss due to ransomware, by quickly and effectively restoring it in case of an attack.

Learn how by following the best practices, Veeam can help customers to avoid data loss caused by a ransomware attack and recover fast and securely.

In this solution brief, you will discover several techniques to fight ransomware, including:

  • The 3-2-1 Rule for data protection
  • How to recover your data after a ransomware attack with Veeam
  • Unique Veeam features that facilitate a rapid file recovery from ransomware
  • And much more!
Read now
Load more