Veeam Blog
Filters (Results: 1474)
Results: 1474
Filters (Results: 1474)
  • Capabilities (2)
  • Business Types (1)
Stay up to date on the latest tips and news
By subscribing, you are agreeing to have your personal information managed in accordance with the terms of Veeam’s Privacy Policy
You're all set!
Watch your inbox for our weekly blog updates.
OK

Guide to Identity and Access Management (IAM)

Adopting Identity and Access Management (IAM) best practices is an important part of proactive defense against ransomware and other cyber threats, allowing you to quickly and effectively control – and limit – who has access to the files and data within your company. Identity and Access Management focuses on verifying user identities, computers, Internet of Things (IoTs), and other devices that want or need to be able to access data, information, and systems. Once verification is complete, IAM only grants access to resources the user (or device) needs to perform their tasks and rejects unauthorized or unrecognized requests. IAM also is helpful for regulatory compliance for standards like GDPR and HIPPA and can be an essential part of digital transformation ... Read more
Jackie Ostlie
Jackie Ostlie

Sr. Product Marketing Manager

Instant Data Backup and Instant Recovery: Minimize Downtime

You know the feeling — that knot in your stomach when faced with a potential data loss event. As an IT professional tasked with keeping operations running smoothly, any amount of downtime is unacceptable. But what if recovering from data loss didn't have to be a time-consuming, stressful ordeal? Read more
Billy Cashwell
Billy Cashwell

Principal Product Marketing Manager

Microsoft 365 Native Security: Unlocking Compliance and Monitoring Features

No business is exempt from meeting some kind of compliance or governing regulation. These controls are put in place (generally speaking) to help ensure trust and consistency when dealing with goods and services. When it comes to “as a Service” offerings, these regulations can enter grey areas and offer misconceptions of who is responsible — and at fault — if there is a violation. Read more
Karinne Bessette
Karinne Bessette

Technologist, Product Strategy

SaaS Backup Guide: Empowering Resellers

The surge in Software-as-a-Service (SaaS) applications, in an era where data is the lifeblood of business, has been nothing short of revolutionary. The move to cloud and hybrid-cloud business models continues to exponentiate, with a 17% increase in enterprise SaaS spending from 2022 to 2023, and with cloud investment rising even faster with a 23% increase. This remarkable growth underscores a pivotal shift in how companies operate and manage their digital assets. With more data stored and processed in the cloud, the importance of robust, reliable SaaS backup solutions becomes increasingly paramount — which, in this domain, reveals potential growth that is as exciting as it is immense. Read more

Open Virtualization: A Modern IT Shift

The IT infrastructure field is continuously adapting, and open virtualization has become an important aspect of this change. This approach stands as an alternative to conventional proprietary methods, notable for its flexibility and potential for cost savings. Read more
Billy Cashwell
Billy Cashwell

Principal Product Marketing Manager

Data Center Virtualization: Key Benefits and Best Practices

If you're looking to streamline your IT infrastructure, cut costs, and enhance scalability, then virtualization is the key. In this guide, we'll explore the intricacies of data center virtualization and provide actionable strategies for successful implementation. Read more
Matt Crape
Matt Crape

Senior Technical Product Marketer