High Availability Virtualization Best Practices

High Availability (HA) involves designing systems that are always accessible and resilient to failures, rapidly recovering to minimize downtime. In today's business environments, where interruptions can have significant consequences, this is especially important. Read more
Matt Crape
Matt Crape

Senior Technical Product Marketer

Data Center Virtualization: Key Benefits and Best Practices

If you're looking to streamline your IT infrastructure, cut costs, and enhance scalability, then virtualization is the key. In this guide, we'll explore the intricacies of data center virtualization and provide actionable strategies for successful implementation. Read more
Matt Crape
Matt Crape

Senior Technical Product Marketer

Comprehensive Guide to SIEM (Security Information & Event Management)

Security Information & Event Management (SIEM) systems are an essential part of any modern cybersecurity toolbox that helps the SOC collect, detect, investigate and respond to internal and external cyber threats. This critical tool helps cybersecurity teams collect, analyze and perform security operations while maintaining  and ensureing rapid, optimal incident response. We cover a lot of cloud security terminology in our , but SIEM is a complex topic worthy of its own page. Read on to learn more about the components of SIEM, best practices, use cases and trends. Read more
Matt Crape
Matt Crape

Senior Technical Product Marketer

Veeam Backup v5 for Nutanix AHV

In today’s cost-conscious world, enterprises are continually evaluating and adopting new preferred infrastructure vendors, whether it be driven by total cost of ownership, features or overall flexibility. Despite being critical in today’s datacenters, hypervisors themselves are not exempt from this either.  One of the key influences when evaluating the foundational pillars of your IT environment comes down to the ecosystem. Will the solution you land on fill your requirements? Are there limitations to be aware of? And of course, do you have a solid strategy to securely and reliably protect that data? Read more
Matt Crape
Matt Crape

Senior Technical Product Marketer

Protecting Your Unstructured Data: NAS Backup Best Practices

Unstructured data and file repositories are common in most enterprise environments. As organizations try to reduce licensing costs and maintenance overhead, Network Attached Storage (NAS) is still commonplace in many modern enterprises. The ability to store and host data directly on NAS without having to manage OS patches and other lifecycle operations is very attractive to many IT departments. Even though it isn’t suited for all workloads, unstructured data like Microsoft Office documents, JPGs, MP3s, etc. is one of the most common use cases for NAS backup. Read more
Matt Crape
Matt Crape

Senior Technical Product Marketer

Protect Your MacOS Workloads With Veeam Agent for Mac 2.0

One of the biggest challenges that corporate IT departments face is protecting all their workloads. Teams spend significant amounts of time architecting, deploying and configuring solutions for their hypervisor and cloud workloads. Physical workloads that typically consist of enterprise databases that run on Windows, Linux or Unix get their fair share of attention too. However, an often-overlooked gap are the end users themselves. Read more
Matt Crape
Matt Crape

Senior Technical Product Marketer

Linux Hardened Repositories: Achievable Immutability for All

It’s no secret that strong data security is one of the most critical requirements in today’s world. With networks constantly being targeted and assaulted through automated attacks, phishing expeditions or malicious insiders, your backups need to be secured. Without a trusted and secured backup, recovery becomes significantly more complicated, if not impossible. Fortunately, features like immutable backups can help strengthen your recovery plans. Read more
Matt Crape
Matt Crape

Senior Technical Product Marketer

From Secure Backup to Cyber Resiliency

Whether you’re protecting critical data from a ransomware attack or safeguarding it against malicious actors, security plays a prominent role in achieving cyber resiliency. Of course, the best way to avoid a disaster is to prevent it from happening in the first place. But what does this look like in real-world terms? An in-depth defense strategy must be taken, coupled with a methodology that’s built around secure backups, advanced monitoring and recovery at-scale. Read more
Matt Crape
Matt Crape

Senior Technical Product Marketer