Veeam Blog
Filters (Results: 803)
Results: 803
Filters (Results: 803)
  • Capabilities (2)
  • Business Types (1)
Stay up to date on the latest tips and news
By subscribing, you are agreeing to have your personal information managed in accordance with the terms of Veeam’s Privacy Policy
You're all set!
Watch your inbox for our weekly blog updates.
OK

 What’s New in Veeam Recovery Orchestrator 7.2?

In 2025, enterprises face mounting challenges in meeting new regulatory requirements and maintaining compliance. This year marks the full implementation of the Digital Operational Resilience Act (DORA) for countries part of the European Union (EU), requiring financial institutions as well as certain third-party service providers to demonstrate their ability to withstand, respond to, and recover from various disruptions and cyberthreats. Meanwhile, in the United States, the Cybersecurity, and Infrastructure Security Agency (CISA) is finalizing mandatory cyberattack reporting regulations for those organizations that fall into the category of Critical Infrastructure as defined by the Cyber Incident Reporting for Critical Infrastructure Act (CIRCIA). Read more

Enhancing Business Continuity with the Digital Operational Resilience Act

In the digital age, cybersecurity is not just about protecting data; it’s about ensuring that the very fabric of our financial systems remain intact and resilient against threats. The introduction of the Digital Operational Resilience Act (DORA) by the European Union marks a significant milestone in the journey toward a safer and more stable financial ecosystem. The financial services sector, together with their cybersecurity and resilience structures, has witnessed firsthand the evolution of digital threats and the increasing sophistication of cyber adversaries. It is against this backdrop that we delve into the importance of DORA and its potential to redefine the landscape of financial services, cybersecurity, and resilience. Read more
Andre Troskie
Andre Troskie

EMEA Field CISO

Adam Bergh
Adam Bergh

Technical Alliances Director, Global Systems Integrators

Understanding Disaster Recovery as a Service (DRaaS): Benefits, Use Cases, and Implementation Strategies 

Data protection has become one of the most critical components of modern business operations. Protecting business applications is also important. Ransomware, natural disasters, and system failures are all threats organizations could face that impact business continuity and resiliency. For many businesses, DRaaS offers a scalable, reliable, and efficient solution to help you remain resilient. Read more
Michael Loos
Michael Loos

VCSP Manager, Product Marketing

Secure by Design: Building a Safer Data Future

Cyberthreats are evolving at an unprecedented pace, and organizations must rethink their approach to data security. Traditional reactive measures are no longer sufficient. Enter Secure by Design, a proactive strategy aimed at embedding security into every stage of product development, ensuring robust defenses from day one. This blog explores the key principles, benefits, and practical applications of Secure by Design, and how organizations like Veeam are championing its adoption.

What is the Secure by Design Strategy?

The Secure by Design approach shifts the focus from reactive security such as patching vulnerabilities after deployment to integrating security measures during the development and deployment lifecycle. By prioritizing security early, organizations reduce the risk of cyber incidents and the costs associated with reactive security fixes.

Historically, ... Read more

5 Reasons Why You Should Be Backing Up Microsoft Entra ID

In today’s IT environments, Microsoft Entra ID (formerly Azure Active Directory) stands as the backbone of identity and access management (IAM) for most organizations.  It controls user access, secures sensitive data, and ensures smooth operations across the enterprise.  While businesses invest heavily in backing up servers and endpoints, one critical aspect often gets overlooked – backing up Entra ID.  Without a comprehensive backup strategy, organizations face a substantial amount of risk. Read more
Colin Hanks
Colin Hanks

Product Marketing Manager, SMB Velocity

Will Law Enforcement Success Against Ransomware Continue in 2025?

Throughout 2024, law enforcement agencies worldwide intensified their fight against cybercrime, leading to significant arrests and takedowns of major cybercriminal groups. Q4 alone saw a substantial flurry of actions. On Oct. 1, 2024, authorities arrested four individuals linked to the notorious LockBit ransomware gang, including a developer, a bulletproof hosting service administrator, and two other affiliates. This followed formal sanctions imposed by the U.S. Treasury Department on LockBit members, marking a major step in disrupting the group's global operations. Later in the month, on Oct. 28, Dutch law enforcement executed Operation Magnus, successfully seizing the infrastructure of Redline and Meta Infostealer, two malware-as-a-service platforms used to steal sensitive credentials. Read more
Bill Siegel
Bill Siegel

CEO & Co-founder of Coveware

Migrating Your Data Estate from an Incumbent Hypervisor to Nutanix AHV: Key Considerations with Veeam Data Platform

Introduction

Migrating from an incumbent hypervisor to Nutanix AHV offers numerous advantages, including simplified management, enhanced security, and improved total cost of ownership (TCO). To ensure a seamless transition and robust data protection, integrating Veeam Data Platform into your migration strategy is essential. This blog outlines the critical considerations and best practices for migrating your entire data estate to Nutanix AHV with the support of Veeam Data Platform.

Understanding Nutanix AHV and Veeam Data Platform

Nutanix AHV

Nutanix AHV is a native hypervisor integrated with the Nutanix Enterprise Cloud OS. It is designed to simplify virtualization by eliminating the need for additional virtualization management tools that are typically required with other hypervisors. Key benefits of AHV include:

Simplified Management: Unified management interface ... Read more
Billy Cashwell
Billy Cashwell

Principal Product Marketing Manager