Veeam Blog
Filters (Results: 157)
Results: 157
Filters (Results: 157)
  • Capabilities (2)
  • Business Types (1)
Stay up to date on the latest tips and news
By subscribing, you are agreeing to have your personal information managed in accordance with the terms of Veeam’s Privacy Policy
You're all set!
Watch your inbox for our weekly blog updates.
OK

Why in the age of ransomware cyber insurance & minimized recovery times are critical

There is no question that ransomware attacks are becoming increasingly prevalent. In fact, some have proposed that 2017 is the Year of Ransomware. The WannaCry attack led to the infection of more than 230,000 computers and more recently, the Petya outbreak on June 27, 2017 led to a second global spread of ransomware. While traditional methods of data protection are essential, they are not sufficient.

Traditional data protection strategies have centered around the three foundational components of IT:  people, process and technology. Data protection with people begins with education and a continuous focus on making employees aware of the most ... Read more

Danny Allan
Danny Allan

Chief Technology Officer (CTO) and Senior Vice President (SVP), Product Strategy

5 Top ransomware exploits that you should know

Today’s highway robber is a lot more sophisticated and savvy. They take far less risk and turn to the latest technology to extort you out of your money by threatening your valuables. In this case your data, your technology and most probably your computing ability.

Of course, I’m talking now about ransomware, the threat that’s been in the news almost every day for the past couple of months. The tool of choice for the modern highway robber has become headline news around the world with variants such as WannaCry and the more recent Popcorn Time. Organizations around the world have been affected by this ransomware, from the UK National Health Service, through to the Russian Postal Service in the last few ... Read more

How to benefit from Veeam ONE: VM Monitoring, performance optimization, reporting and more!

Complete visibility within the data center is essential to keeping businesses available 24.7.365. Visibility into the data center allows IT administrators to properly utilize resources, be proactive in troubleshooting issues and run reports on their environment. Veeam allows businesses to remain proactive in monitoring and managing their environment through Veeam ONE. If you haven’t heard about it, you are truly missing out, as it works not only for your Veeam-powered data protection operations, but for entire VMware vSphere and Microsoft Hyper-V environments as well.

Read more
Kirsten Stoner
Kirsten Stoner

Technologist, Product Strategy

GDPR one year out — Considerations for the next 12 months

Here we are, one year out. Just 365 days separate us from the enforcement of the General Data Protection Regulation (GDPR), one of the biggest changes to how personal data is handled and managed in the last 20 years. If you’re reading this blog, you’re likely affected by it either as an employee of a business with customers in the EU, as a EU citizen yourself or perhaps both.

At Veeam, we believe in rules that protect the rights of consumers, and have welcomed GDPR since it was adopted by the European Council some 14 months ago.

What is it all about, and why now?

In short, GDPR strengthens and gives new rights to individuals over their personal data such as: Who can ... Read more

Danny Allan
Danny Allan

Chief Technology Officer (CTO) and Senior Vice President (SVP), Product Strategy

Recovery fundamentals in the event of a worldwide ransomware cyber-attack

The event that has been named the “largest hacking in history,” where more than 100,000 ransomware attacks affected 150 countries last Friday, reads very much like a script from a Hollywood blockbuster. However, these events occurred and had very real effects on the victims.

The attacks have been stopped since writing this post, but the experts warn that “copy cats” could be encouraged to try this again.

While the majority of focus has been on the source of the vulnerability and the group responsible for these attacks, organizations need to consider what should be done to ensure that these kinds of attacks cause minimal disruption to their applications and systems if they happen again.

As with all malware and ... Read more

Danny Allan
Danny Allan

Chief Technology Officer (CTO) and Senior Vice President (SVP), Product Strategy

New FREE Downloadable e-book: Conversational Ransomware Defense and Survival

Veeam and Conversational Geeks collaborated to publish Conversational Ransomware Defense and Survival, an e-book that illustrates the fundamentals for ransomware preparation, protection and recovery. As the title suggests, the book is written in a conversational tone, so it’s easy to read and it addresses both the unlucky ones who have already struggled with ransomware and those who are willing to learn more about this cybersecurity threat.

Read more

Ransomware resiliency & Availability: The endpoint is a great place to start

Fighting ransomware has become a part of doing business today. Technology professionals around the world are advocating many ways to stay resilient. The most effective method is to have end-user training on how to handle and operate attachments and connectivity to the Internet. One other area to look is frequent endpoint devices: Laptops and PCs.

Read more
Rick Vanover
Rick Vanover

Senior Director, Product Strategy

FREE Veeam tools for powerful data protection

Sometimes, circumstances can vary and you need to adjust your company’s investments based on its resources. Being on a budget and reducing investments can weaken key areas of your organization, but the integrity of your data shouldn’t be affected. At Veeam, we have many FREE solutions ready to sharpen the reliability of your data. Today, I will showcase some of our free tools and explain how you can actually reach a high level of protection at no cost, for both your organization and your personal use.

Read more

Ransomware as a Service: Air gapped backups became more important than ever

I’ve heard about the "Ransomware as a Service" concept before and it was a big eye opener to me in regards to the real level of threat we could be facing soon. And last week, I found this blog post that went into detail about RaaS and new threats. Take some time to read it, because I think RaaS will change IT as we know it.

Read more
Anton Gostev
Anton Gostev

Senior Vice President, Product Management

Cloud disaster recovery models: planning and testing

Modern enterprises know that disasters are a fact of life. They also understand that disasters come in many shapes and sizes and lead to varying degrees of Availability loss and impact on business continuity. Because major wide-scale disasters occur way less often than smaller disasters from within a data center, it’s also important to plan and test cloud disaster recovery models for smaller disasters that can happen at VM, guest OS or application levels. In this article we'll talk about the importance of planning and testing your DR strategy, as well as the categories of the cloud disaster recovery models. Read more
Anthony Spiteri
Anthony Spiteri

Regional CTO APJ, Veeam Product Strategy & Lead Cloud and Service Provider Technologist