Veeam Blog
Filters (Results: 422)
Results: 422
Filters (Results: 422)
  • Capabilities (2)
  • Business Types (1)
Stay up to date on the latest tips and news
By subscribing, you are agreeing to have your personal information managed in accordance with the terms of Veeam’s Privacy Policy
You're all set!
Watch your inbox for our weekly blog updates.
OK

What is the 3-2-1 backup rule?

The 3-2-1 Rule is a rule to live by. Here at Veeam, we have been advocating this rule for many years to help organizations ensure recoverability when it is needed most. In this blog post I’m going to explain the 3-2-1 Rule and show you the way to upgrade it to a more modern and resilient way of thinking! Read more
Rick Vanover
Rick Vanover

Senior Director, Product Strategy

Expand Security with SIEM Integration and Backup

SIEM integration involves consolidating a variety of cybersecurity tools, including firewalls, intrusion detection systems, antivirus solutions, IAM (Identity and Access Management), Endpoint security, and Cloud security, into a unified platform. This modernization encompasses a broader range of security measures, moving beyond the older solutions. Read more
Matt Crape
Matt Crape

Senior Technical Product Marketer

6 Best Practices for Kubernetes Disaster Recovery

Kubernetes adoption is accelerating as businesses become familiar with its many benefits. The platform offers portability and scalability, cost efficiency and productivity gains, which is why more than 5.6 billion developers use it today. Unfortunately, cyber-attacks and the potential for downtime are very real risks for cloud native environments, so backup and disaster recovery (DR) are critical components of any Kubernetes environment. This is especially true as the number of stateful applications such as databases are being deployed in Kubernetes.  Read more
Michael Cade
Michael Cade

Senior Technologist, Product Strategy

6 Best Practices for Kubernetes Backup

The adoption of cloud-native development practices, particularly with Kubernetes, is rapidly accelerating as companies shift from last-gen tech to the far more reliable, scalable and portable environment that the cloud provides. Yet despite offering numerous advantages over on-premises systems, moving to the cloud can sometimes be a double-edged sword. Read more
Michael Cade
Michael Cade

Senior Technologist, Product Strategy

What Is the Shared Responsibility Model?

The shared responsibility model is one of the most important features of effective cloud security. This applies whether you use a Software as a Service model such as Microsoft 365 or an all-encompassing Infrastructure as a Service model. There are always responsibilities shared between you and the cloud service provider. Read more
Billy Cashwell
Billy Cashwell

Principal Product Marketing Manager

Cybersecurity Best Practices for Small Business

In an era marked by relentless cyber threats, the paramount question echoing in the minds of small business owners is this: Why is cybersecurity important for small businesses? As the shadow of cyberattacks looms larger, it has become clear that cybersecurity is not merely a choice but an absolute necessity. Read more
Colin Hanks
Colin Hanks

Product Marketing Manager, SMB Velocity