Veeam Blog
Filters (Results: 1486)
Results: 1486
Filters (Results: 1486)
  • Capabilities (2)
  • Business Types (1)
Stay up to date on the latest tips and news
By subscribing, you are agreeing to have your personal information managed in accordance with the terms of Veeam’s Privacy Policy
You're all set!
Watch your inbox for our weekly blog updates.
OK

Why You Need to Cover Your SaaS

In today’s fast-paced digital landscape, businesses are constantly seeking new ways to enhance efficiency and reduce costs. One of the most significant innovations in recent years has been the rise of Software as a Service (SaaS). According to Gartner Research’s latest forecast, worldwide SaaS spending has grown 20% to a staggering $247.2 billion in 2024, and it is expected to approach nearly $300 billion by the end of 2025. Read more

Veeam Extends our #1 Market Share in Data Protection Software, Growing Faster Than the Top 5 in the Category 

In the high-stakes arena of cybersecurity, where threats evolve with every passing second, standing still is not an option. That’s why at Veeam, we don’t just participate — we actively lead the charge in cyber resilience by offering the best data protection and rapid ransomware recovery. This is a battleground; one where every detail and nuance counts. Our community — our customers, partners, and dedicated users — drive us to set an untouchable pace. Read more
Anand Eswaran
Anand Eswaran

Chief Executive Officer

Ransomware Brings Backup out of the Basement into the Boardroom

By design, data backup functions have traditionally been siloed and hidden away. But in the ever-evolving landscape of cybersecurity, the surge in ransomware attacks has brought backup and recovery functions into the light of top leadership and forced organizations to rethink their data protection strategies. No longer is data recovery just a technical necessity, but its also now a critical business continuity concern at the board level. Read more
Brad Linch
Brad Linch

Director of Technical Strategy

The Organizational Structure of Ransomware Threat Actor Groups is Evolving Before Our Eyes

As we approach the one year anniversary of two prominent ransomware group collapses (Lockbit and BlackCat/ALPHV), we find the ransomware ecosystem to be as fractured and uncertain as it did in the months following these events. The Ransomware-as-a-Service (RaaS) model remains irreversibly tarnished after the groups that pioneered this framework were exposed as being fraught with infighting, deception, lost profits, and compromised anonymity for their affiliates. Joint law enforcement actions over the last year have systematically impaired the resources ransomware actors depend on to operate. In the case of domestic threats, law enforcement efforts have even put a number of bad actors behind bars. While certain groups persist and new names continue to trickle in and out of the ransom-sphere, ... Read more
Bill Siegel
Bill Siegel

CEO & Co-founder of Coveware

5 Hybrid Cloud Benefits for IT Teams

Have you heard about the recent UniSuper and Google Cloud accident? The recent data outage that impacted UniSuper serves as a stark reminder of the potential risks associated with relying solely on a single cloud provider and highlights the importance for businesses to prioritize data resilience to minimize downtime. To address these challenges, many organizations are now turning to the concept of hybrid and multi-cloud. By combining the benefits of multiple cloud providers and on-premises infrastructure, businesses can mitigate the risks associated with relying on a single cloud provider and unlock additional benefits such as improved scalability, reliability, and flexibility. The hybrid and multi-cloud approach offers a strategic solution that not only enhances data resilience but also ensures businesses are better ... Read more
Kelsey Teske
Kelsey Teske

Product Marketing Manager

Top 10 Azure Security Tools & Features

It’s safe to say many organizations have embraced some form of cloud strategy. Some have adopted a hybrid cloud model, while others have chosen a multi-cloud model with Software as a Service, Platform as a Service, or Infrastructure as a Service. Regardless of the infrastructure choice, businesses must protect and secure these environments. Microsoft Azure offers a range of cloud services and tools to help secure your environment and data. However, it's crucial to be aware of the critical gaps in Azure's security tools and features. Let’s dive into Azure’s security tools, their capabilities, and later we will reinforce the areas where we can make improvements. Read more

How Malware Protection by Veeam Safeguards Your Workloads from Threats

Ransomware attacks are more sophisticated than ever, targeting cloud-based workloads and posing significant risks to organizations. These cyberthreats can encrypt critical data, disrupt business operations, and demand hefty ransoms. Tactics such as double extortion and data theft amplify this potential damage, so a solid defense strategy is essential for safeguarding your cloud workloads. Read more
Brad Linch
Brad Linch

Director of Technical Strategy

Efficient Multi-Cloud Management for Strategic Integration of AWS, Microsoft Azure, and Google Cloud

Hybrid and multi-cloud environments are often chosen because they offer flexibility, resilience, compliance capabilities, and opportunities for optimization and innovation for modern businesses. According to a report published by Enterprise Strategy Group in 2023, the majority of organizations use multiple on-premises data centers, colocation providers, and Platform as a Service (PaaS)/Infrastructure as a Service (IaaS) providers to power their IT infrastructure. A staggering 85% of organizations use two or more IaaS providers, making the need for cloud synchronization and effective management tools stronger than ever. Read more
David Cackowski
David Cackowski

Product Marketing Manager, Kasten

10 Critical Alarms to Stop Ransomware and Protect Your Business Continuity

Ransomware attacks aggressively target virtual infrastructure like ESXi and vCenter, exploiting vulnerabilities to encrypt data and disrupt operations. Veeam’s advanced monitoring capabilities empower organizations to detect threats early and respond swiftly, safeguarding critical data before backups are compromised. By configuring precise alarms and integrating with SIEM tools such as CrowdStrike Falcon, Palo Alto XSIAM, Rapid7, Microsoft Sentinel, Splunk, etc., Veeam ensures comprehensive security visibility. Read more
Brad Linch
Brad Linch

Director of Technical Strategy