Veeam Blog
Filters (Results: 825)
Results: 825
Filters (Results: 825)
  • Capabilities (2)
  • Business Types (1)
Stay up to date on the latest tips and news
By subscribing, you are agreeing to have your personal information managed in accordance with the terms of Veeam’s Privacy Policy
You're all set!
Watch your inbox for our weekly blog updates.
OK

Exchange Backup: Methods and Best Practices

Microsoft Exchange is a critical component of communication infrastructure for many organizations, and serves as the backbone for email, calendaring, and collaboration. However, its importance also makes it a high-priority system for data protection, and it’s your responsibility to safeguard your Microsoft Exchange data. Ensuring regular backups of your Exchange environment can protect against data loss caused by hardware failures, cyberattacks, or human error. Read more
Kendall Gray
Kendall Gray

Product Marketing Associate

Veeam is More+. Achieve complete data resilience with Veeam.

At Veeam, we’ve redefined data resilience for the modern enterprise. While we are known as the pioneer for virtualization backup, Veeam is so much more. Veeam Data Platform is your all-in-one data resilience solution, integrating data protection, threat detection, cyber protection, observability, AI, incident response and the world’s fastest, most trusted recoveries. Read more

Elevate Your Cloud Game With Veeam

Cloud adoption is at an all-time high, with nearly 98% of businesses utilizing cloud services in some capacity. This trend continues to grow as organizations store, process, and manage vast amounts of critical data in the cloud. Read more
Julia Furst Morgado
Julia Furst Morgado

Product Strategy Technology

Top 5 TTPs Targeting Enterprise Cybersecurity

As enterprises continue to strengthen their security tactics, threat actors are continuously refining their methods to sidestep them. In 2024, advanced tactics, techniques, and procedures (TTPs) evolved significantly, shaping the threat landscape with greater efficiency and effectiveness. These advancements have intensified enterprise cybersecurity threats, making proactive defense strategies more critical than ever.

With the dust now settled, let’s look at the TTPs most frequently leveraged against enterprises, which proved most impactful, and how enterprises can detect these threats before it’s too late.

TTPs Targeting Enterprises Today

1. Exfiltration

The concept behind data extortion attacks is straightforward: steal sensitive data and use it as ransom leverage. Threat actors have evolved beyond traditional encryption-based attacks, finding new avenues ... Read more

Raymond Umerley
Raymond Umerley

Field CISO

Building Cyber Resilience in Educational Organizations

Building cyber resilience within educational organizations is imperative to protect sensitive student, faculty, and research data and ensure operational continuity. Academic institutions are shifting toward complex, hybrid, and multi-cloud architectures, making them more susceptible to cyber threats like phishing and ransomware. Read more

Google Cloud Pricing Guide: Models, Calculations, and Tips

Google Cloud is a collection of services including storage and compute resources, Infrastructure as a Service (IaaS) and Platform as a Service (PaaS), provided by Google. The company offers several pricing options catering to different demographics and use cases, including a free tier, pay-as-you-go options, and discounted long-term reservations. Because there are so many pricing options, it can be difficult for organizations to predict how much their cloud usage will cost them. Read more
Sam Nicholls
Sam Nicholls

Principal, Product Marketing