Veeam Blog
Filters (Results: 157)
Results: 157
Filters (Results: 157)
  • Capabilities (2)
  • Business Types (1)
Stay up to date on the latest tips and news
By subscribing, you are agreeing to have your personal information managed in accordance with the terms of Veeam’s Privacy Policy
You're all set!
Watch your inbox for our weekly blog updates.
OK

Introducing Kasten K10 V6.5: The Ultimate Solution for Secure and Scalable Kubernetes Data Protection

Kubernetes is rapidly becoming the platform of choice for deploying and managing cloud native applications. According to a recent ESG analyst study, the Kubernetes market is booming, as nearly half of the organizations surveyed use containers today and another 35% plan to do so in the near future. Read more
Gaurav Rishi
Gaurav Rishi

Vice President, Product Management • Kasten

What Is Cyber Resilience?

With the ever-increasing growth across the digital landscape, having a strong security posture is no longer enough. More than ever, organizations of all sizes need to have an end-to-end cyber resiliency strategy. But what exactly is Cyber Resilience? Read more
Jackie Ostlie
Jackie Ostlie

Sr. Product Marketing Manager

What Is Separation of Duties in Cybersecurity?

Separation of Duties (SOD) in cybersecurity, also known as Segregation of Duties, is a form of risk management that is often used in cybersecurity to mitigate insider threats and reduce the risk of errors or accidents when it comes to mission-critical data. By having more than one person responsible for key duties, organizations can prevent conflicts of interest and better maintain data integrity and availability. Read more
Jackie Ostlie
Jackie Ostlie

Sr. Product Marketing Manager

Comprehensive Guide to SIEM (Security Information & Event Management)

Security Information & Event Management (SIEM) systems are an essential part of any modern cybersecurity toolbox that helps the SOC collect, detect, investigate and respond to internal and external cyber threats. This critical tool helps cybersecurity teams collect, analyze and perform security operations while maintaining  and ensureing rapid, optimal incident response. We cover a lot of cloud security terminology in our , but SIEM is a complex topic worthy of its own page. Read on to learn more about the components of SIEM, best practices, use cases and trends. Read more
Matt Crape
Matt Crape

Senior Technical Product Marketer