Veeam Blog
Filters (Results: 483)
Results: 483
Filters (Results: 483)
  • Capabilities (2)
  • Business Types (1)
Stay up to date on the latest tips and news
By subscribing, you are agreeing to have your personal information managed in accordance with the terms of Veeam’s Privacy Policy
You're all set!
Watch your inbox for our weekly blog updates.
OK

Veeam Backup for Microsoft Office 365: Availability vs Recoverability

Veeam Backup & Replication has added a new integration – Veeam Backup for Microsoft Office 365. How can you benefit from Office 365 email backup with the Veeam’s new product? Why is cloud Availability different from cloud recoverability? In this blog, we will discuss all these topics and try to shed some light on the needs and use cases of email backups. Of course, we will demonstrate the product in action for you.

Read more

Hyper-V initial configuration

This blogpost is a continuation of my series for those who have already started their Hyper-V journey and discovered the great benefits that Hyper-V technology brings to companies and system admin. I will now describe the first steps of Hyper-V deployment, the initial configuration and how to launch your first virtual machine (VM) there. Read more
Andrey Stadler
Andrey Stadler

Global Technologist, Product Strategy

Backup Copy Job – it can do more than just a copy!

Veeam's Backup Copy Job can provide more than its name suggests. The primary task of Backup Copy Job is to copy existing backup data to another disk system in order to restore it later or even to send backup data to an offsite location (see the 3-2-1 Rule).

Additionally, Backup Copy Job performs an integrity check of the backup data. Veeam saves a checksum for every data block in the backup file. Backup Copy Job verifies if the checksum fits and therefore, it can detect if the data has been changed (for example, to ensure there was no so-called “silent data corruption”, i.e. any overlooked errors).

Read more
Hannes Kasparick
Hannes Kasparick

Senior Analyst, Product Management

How to get benefits with Hyper-V virtualization

According to the latest Gartner report regarding x86 Server Virtualization Infrastructure, about 80% of server workloads are virtualized, and Hyper-V platform is among the leaders in the area of virtualization. Have you ever wondered why server virtualization became so popular? Today, I will share a few advantages because of which companies should really consider Hyper-V virtualization in order to not be in the 20% of non-virtualized (legacy) organizations. Read more

Backup repositories: VMware backup best practices (Part 3)

I’m enjoying this series of blogs! This is a great way to share information about the best practices for the VMware backup experience. This post will now vary slightly from the other two and talk about the backup repository. This was another breakout session from Anton Gostev at VeeamON 2015 (those who attended were lucky to get the live experience) and will surely be a great one to catch in 2017 in New Orleans. This will be written in mind of Veeam Backup & Replication v9, but can be a starting point to making good changes in your environment.

Read more
Rick Vanover
Rick Vanover

Senior Director, Product Strategy

Veeam and Nimble Storage integration: First-hand configuration and recovery

Veeam is extending its storage integration offerings to the support of Nimble Storage arrays in the upcoming Veeam Availability Suite 9.5. The Beta is already available for testing, and I used this chance to get first-hand experience. In this post, I’ll share insights from my experience and review the functional use cases delivered by this Veeam-Nimble Integration.

The Veeam-Nimble integration follows the same approach as Veeam’s existing integration capabilities with other enterprise storage solutions. It’s all about leveraging the underlying storage hardware and snapshot capability. The Veeam-Nimble integration offers the benefits of minimum impact on the virtual infrastructure during the backup process, RTPO of less than 15 minutes and verified recoverability.

Read more

How to protect your data from ransomware and encryption Trojans

Media coverage on the various versions of encryption Trojans are coming fast and furious. These threats are meant to extort money out of the infected and are otherwise known as ransomware.

Trojan malware like Locky, TeslaCrypt and CryptoLocker are the variations currently used to attack companies. The breach gateways are often security loopholes in web browsers and their plugins or inadvertently opened email attachments. Once inside the company, the ransomware can spread at breakneck speeds and begin to encrypt valuable data. The FBI recommends companies implement a solid ransomware backup and recovery strategy for effective protection against data loss caused by CryptoLocker or any other Trojan.

Read more