Veeam Blog
Filters (Results: 75)
Results: 75
Filters (Results: 75)
  • Capabilities (2)
  • Business Types (1)
Stay up to date on the latest tips and news
By subscribing, you are agreeing to have your personal information managed in accordance with the terms of Veeam’s Privacy Policy
You're all set!
Watch your inbox for our weekly blog updates.
OK

What Are Immutable Backups and Why Are They Important?

To keep businesses running, a secure backup is a priority for the best data protection strategy. Data Security, one of Veeam’s core pillars for data protection, focuses on data accessibility and backup immutability. Immutability remains a hot topic, especially around ransomware, with many vendors and organizations adopting immutable technologies for cyber resiliency. So, what exactly are immutable backups and why should you use them in your data protection strategy? Read more

What is Enterprise Cybersecurity & Why it’s Important

At its core, enterprise cybersecurity is about safeguarding an organization’s data and systems from unauthorized access, data breaches, and other forms of cyberattacks. It involves a combination of technologies, processes, and policies designed to prevent, detect, and respond to potential threats. Read more
Megan Schillereff
Megan Schillereff

Senior Technical Writer

What’s New in Veeam Recovery Orchestrator 7?

Veeam Recovery Orchestrator (Orchestrator), part of Veeam Data Platform, enhances the user recovery experience by ensuring that businesses can define, test, and plan for data outages. Having the ability to choose which type of recovery method you want to use is crucial, especially when it comes to cyberthreats. There were some major enhancements and new features added into this version of Veeam Data Platform that compliments the robust functionality of Orchestrator version 6. Let’s discuss what new features you can see from the updated Veeam Recovery Orchestrator v7. Read more

What is the 3-2-1 backup rule?

The 3-2-1 Rule is a rule to live by. Here at Veeam, we have been advocating this rule for many years to help organizations ensure recoverability when it is needed most. In this blog post I’m going to explain the 3-2-1 Rule and show you the way to upgrade it to a more modern and resilient way of thinking! Read more
Rick Vanover
Rick Vanover

Senior Director, Product Strategy

Introduction to Key Management Systems (KMS)

When it comes to managing encryption, keys needed for secure data encryption and decryption – the essential tools for encoding and decoding data – Key Management Systems (KMS) are crucial. KMS provides a secure environment for handling these keys, ensuring they are accessible only to authorized systems and individuals. KMS is vital for protecting the confidentiality and integrity of sensitive data, particularly in complex IT environments. Read more
Ivan Cioffi
Ivan Cioffi

Technical Advisor, GSI - Product Management, Alliances

Why Essential Eight is Critical to Tackling the Future of Cybersecurity – Embracing the Path to Cyber Resiliency 

In the past 12 months, Australia has witnessed several major cybersecurity incidents, such as the Latitude Financial, Optus, and Medibank cyberattacks. Veeam’s 2023 Ransomware Trends Report revealed that 85% of  organizations suffered at least one attack in the past 12 months, a sharp increase from 76% in the year prior. This signals an urgent need for businesses to keep up with the dynamic cybersecurity landscape and ensure cyber resiliency. Read more
John Wood
John Wood

Vice President, Systems Engineer - Asia Pacific & Japan