Resource Library

Search

Sort by

Hypervisor

Application Recovery

Topics

Resource Type

Language

Products

Author: Rick Vanover, VMware vExpert, MCP, MCITP, MCSA and Veeam Product Strategy Specialist

Ransomware is a real threat for CIOs and technology administrators today. In this new white paper, Veeam® offers sound tips for adding ransomware resiliency so you can provide the best levels of Availability for critical applications and data.

Read the first chapter in the series and learn how design options for resiliency in Veeam products can protect you if ransomware strikes.

Read Designing Veeam Availability Suite to protect against ransomware threats to learn more about:

  • Offline storage, the most effective ransomware resiliency technique
  • Using different credentials for backup repositories
  • The need to have more types of restore points that are more frequent
Read now
Author: Matt Lloyd , Lead EMC and VMware Business Development Manager, Veeam Software

Everyone needs a place to store their backups off site. But, many organizations don’t have a second site, and rotating tapes or removable media off site is cumbersome. Increasingly, customers are turning to the cloud as a better alternative.

This solution brief highlights how Veeam® Backup & Replication™ delivers self-service backup and restore with VMware vCloud Director to simplify management while increasing efficiency for service providers and other users of vCloud Director. Read now

Virtual machine sprawl and staggering data growth are putting enormous pressure on legacy backup solutions. Weaknesses in backup infrastructure can contribute to an Availability Gap that poses significant business risk.

Backup appliances have become a go-to solution for many IT teams looking to alleviate the pressure on backup and recovery. In addition to shrinking the storage footprint, these backup appliances can drive huge improvements in backup performance and recovery times — particularly when paired with modern Availability software.

Read on to learn more.

Read now

No modern storage project is complete without the addition of flexible recovery and backup for your virtual and physical workloads to keep your Always-On Enterprise™ running smoothly. Veeam® Availability Suite™ and IBM Storage solutions provide excellent data protection for on-premises and cloud IT services, and their applications and data, to deliver recovery service levels of < 15 minutes.

This solution brief provides an overview of Veeam capabilities with IBM Storage, including:

  • How Veeam and IBM bridge the Availability Gap that can slow down your business and expose your operations to risk
  • Supported IBM Storage options with IBM Spectrum Virtualize, Storwize family of storage and IBM SAN Volume Controller (SVC)
  • A quick look at Veeam and IBM Bluemix as well as the upcoming Veeam Availability Suite v10 integration with IBM
Read now
White Paper
April 07, 2017

Flexible recovery and back up for your IBM Bluemix hosted workloads is critical to keep your Always-On Enterprise™ running smoothly. Veeam® Availability Suite™ with IBM Bluemix offerings provide excellent data protection for IT services, and their applications and data, to deliver recovery service levels of < 15 minutes.

This solution brief provides an overview of Veeam capabilities with the IBM Bluemix portfolio of compute, storage and other services that make it one of the cloud’s most flexible and fastest growing Platform as a Service.

Read now

Ransomware attacks are a serious threat to industries worldwide. According to the FBI, ransomware collected $209 million in the first three months of 2016, and on pace to reach $1 billion in 2016. While health care organizations are the most publicized victims, this is a growing threat across all industries.

The 3-2-1 Rule of data protection along with Veeam® Availability Suite™ enables companies to quickly and effectively restore critical data infected by ransomware.

This solution brief highlights how Veeam can help customers recover from a ransomware attack.

Don’t miss this opportunity to learn more about:

  • The 3-2-1 Rule for data protection
  • How Veeam can recover your data from a ransomware attack
  • Unique Veeam features that facilitate a rapid recovery from ransomware
  • And more!
Read now

A recent survey conducted by ESG on behalf of Veeam confirms that half of organizations struggle with backup software. The survey included 250 IT professionals responsible for data protection at organizations based in the Asia-Pacific area.

Check out this infographic to find out what these Asia-Pacific organizations say is their primary virtual server data-protection challenge.

Read the full report to get more details.

Read now

IT organizations are looking for new and more advanced Availability and data protection solutions that work seamlessly in virtualized environments and provide just-in-time application restores and recoveries. In addition, they require backup storage that can protect data in a deduplicated format for enhanced efficiencies, without extending the backup window or increasing data restore and recovery time.

Veeam® and ExaGrid EX deduplication appliances provide businesses a very efficient and cost-effective way to ensure Availability for the Always-On Enterprise™ by providing recovery point and recovery time objectives (RTPO™) of < 15 minutes for ALL applications and data. ExaGrid backup appliances combine a unique backup storage landing (without dedupe) zone, to provide ultra-fast data ingest speeds and data recovery speeds; with a separate deduplicated storage repository to enable highly efficient long-term data retention on disk. Through ExaGrid’s embedded Veeam data mover, businesses can leverage Veeam Backup & Replication™ to speed up data transfers to ExaGrid backup appliances and to enable very rapid recovery of entire VMs and their associated application data. Read this solution brief to learn:

  • How to simplify backup management and improve application service levels
  • How to efficiently scale your backup infrastructure to meet the growing demands of the business
  • How to reduce IT costs and leverage your investments in backup infrastructure
  • And much more!
Read now
White Paper
March 27, 2017
Author: Sander Berkouwer, IT Pro Evangelist, Microsoft MVP

While Active Directory (AD) has been around since Windows 2000 Server, Microsoft has continued to make adjustments and introduce features in newer Windows Server releases, especially in Windows Server 2012. What’s New in Active Directory 2016 covers different AD features and the requirements to enable them.

Scalability boundaries: RID & DNT improvements, resource SID compression

Learn about two big changes made by Microsoft in Windows Server 2012, which now allow AD environments to grow more easily, and beyond the limitations encountered by AD administrators.

Deployment and migration features: Deferred index creation, virtualization safeguards, Domain Controller (DC) cloning and new promotion and upgrade processes

Microsoft has released many improvements to make DC deployment and migration better than ever. Have you ever wondered how to prevent possible issues after a schema update? Do you know how to make your DC aware of the virtual environment to prevent data loss? Have you thought about using DC cloning so you can quickly create a replica DC for DR purposes? Have you heard about the new ways to promote a machine to DC? How about preparing an automatic update for the AD domain and a forest for new versions? Keep reading this white paper, we've got you covered!

Security features: Group Managed Service Accounts (gMSAs), Kerberos Armoring (FAST), Protected Users, Authentication Policies and Policy Silos, Dynamic Access Control and Privileged Access Management (PAM)

In Windows Server 2012 and WS 2012 R2, a couple of features have been introduced to enable domain admins to further lock down their AD environments. One new security feature is the Flexible Authentication Secure Tunneling (FAST) or Kerberos Armoring. Start solving common security problems with Kerberos and make sure that clients will never return to less- secure legacy protocols or weaker cryptographic methods.

On top of all that security goodness, Windows Server 2016 brings Privileged Access Management (PAM) that allows admins to only have administrative privileges when they need them through auto-expiration of these privileges. Did you know that PAM is the only secure way you could actually regain control over a compromised AD environment without throwing it away?

Manageability features: Active Directory Administrative Center, GUIs, expanded functionality

Learn about Active Directory Administrative Center (dsac.exe), which was first introduced with Windows Server 2008 R2. Read about Active Directory Administrative Center’s serious overhaul in Windows Server 2012. In addition to providing Graphical User Interfaces (GUIs) to new features in Active Directory 2012, the functionality has expanded to manage features that were previously only manageable on the command line.

Mobility features

Has your organization adopted a Hybrid Identity approach towards Azure Active Directory? Your AD can help get the devices your users use into Azure Active Directory with the help of Azure AD Connect and (optionally) AD FS. These features are not just Windows 10 devices, either.

Read now

Oil & Gas companies are embracing the digital transformation as the key driver of business value. As data centers modernize and data vol¬umes grow, leaders depend on data Availability for competitive advantage and risk avoidance.

Data generation and storage are exploding. New applica¬tions are processing data from virtual¬ized storage environments as well as public and private clouds, users are often located in remote environments and merg¬ers are bringing together disparate storage and VM environments. In this context of transformation, Oil & Gas companies must find a way to maintain Availability for their Always-On Enterprise™.

Read this new IDG Enterprise white paper, 10 Availability Lessons Leading Digital Transformation in the Oil & Gas Industry, to learn:

  • How the energy industry leverages data for business value
  • Why data dependence will only increase for Oil & Gas companies
  • Key data Availability guidelines that facilitate the digital transformation
  • How to keep exploration and production (E&P), pipeline operations and energy delivery available
Read now
Load more