Veeam Blog
Filters (Results: 1475)
Results: 1475
Filters (Results: 1475)
  • Capabilities (2)
  • Business Types (1)
Stay up to date on the latest tips and news
By subscribing, you are agreeing to have your personal information managed in accordance with the terms of Veeam’s Privacy Policy
You're all set!
Watch your inbox for our weekly blog updates.
OK

What is the 3-2-1 backup rule?

The 3-2-1 Rule is a rule to live by. Here at Veeam, we have been advocating this rule for many years to help organizations ensure recoverability when it is needed most. In this blog post I’m going to explain the 3-2-1 Rule and show you the way to upgrade it to a more modern and resilient way of thinking! Read more
Rick Vanover
Rick Vanover

Senior Director, Product Strategy

RPO and RTO: What’s the Difference?

Recovery objectives are the foundational metric for building your disaster recovery strategy. Applying a quantifiable metric to the disruption that is tolerable to your business can help guide your evaluation of backup and recovery solutions to consider. Building your backup and recovery strategy based on your recovery objectives can provide you with confidence that when disaster hits, you are ready to recover with minimal data loss and impact on business processes and protect your business’s brand. Read more
Maria Liuzzo
Maria Liuzzo

Global Product Marketing Manager

Kaleigh Bovey
Kaleigh Bovey

Senior Product Marketing Manager

Modern Data Protection: Embracing Enterprise Features for Today’s Challenges

Veeam is proud to release the findings of yet another research project, the 2023 Data Protection Trends Report, which is the industry’s largest independent research on backup and data protection. This research is fully independent, representing the whole market — not only from Veeam customers — and conducted by a third-party research organization. Read more
Jason Buffington
Jason Buffington

Vice President, Market Strategy

Introduction to Key Management Systems (KMS)

When it comes to managing encryption, keys needed for secure data encryption and decryption – the essential tools for encoding and decoding data – Key Management Systems (KMS) are crucial. KMS provides a secure environment for handling these keys, ensuring they are accessible only to authorized systems and individuals. KMS is vital for protecting the confidentiality and integrity of sensitive data, particularly in complex IT environments. Read more
Ivan Cioffi
Ivan Cioffi

Technical Advisor, GSI - Product Management, Alliances

VMware to Hyper-V Migration: Best Practices

The shift from VMware to Hyper-V is becoming an increasingly popular decision for many organizations. This move is not just a change in virtualization platforms; it's a strategic decision that can influence a company's operational efficiency and future scalability. Read more
Matthew Anania
Matthew Anania

Product Marketing Specialist

Mastering Data Protection: A Comprehensive Guide to Salesforce Backup Best Practices

In the digital age, where data reigns supreme, businesses face the challenge of safeguarding their most critical asset. As organizations increasingly turn to Salesforce for managing their customer relationships and data, the need for a robust backup strategy is beyond necessary. To keep you informed, let’s delve into the whys and hows of Salesforce backup, explore best practices to ensure the data’s security, and how to keep the integrity of your business data. Read more
Alison Connor
Alison Connor

Senior Product Marketing Manager