Veeam Blog
Filters (Results: 74)
Results: 74
Filters (Results: 74)
  • Capabilities (2)
  • Business Types (1)
Stay up to date on the latest tips and news
By subscribing, you are agreeing to have your personal information managed in accordance with the terms of Veeam’s Privacy Policy
You're all set!
Watch your inbox for our weekly blog updates.
OK

Meet recovery objectives while accelerating compliance

Modern data protection challenges demand an assessment of recovery strategies and the maintenance of compliance with those strategies. This could be for regulatory reasons or simply to offer assurance that the business can bounce back quickly in the event of an outage.  If we want to meet recovery objectives in the face of modern challenges such as ransomware, then recovery at scale and in parallel becomes a critical component. Recovering individual VM’s, files or application items is all well and good for ‘everyday’ disasters (like recovering that critical email) but when infrastructure becomes unavailable the impact can be felt broadly.    Read more
Charles Clarke
Charles Clarke

Sr. Director, Solutions Architect

Jeff Reichard
Jeff Reichard

Senior Director, Enterprise Strategy

Designing for Cyber Resiliency

Veeam is proud to release the findings of yet another research project, the 2023 Data Protection Trends Report, which is the industry’s largest independent research on backup and data protection. This research is fully independent, representing the whole market, and not only from Veeam customers, and was conducted by a third-party research organization, with no one knowing that Veeam was involved. Read more
Jason Buffington
Jason Buffington

Vice President, Market Strategy

Dave Russell
Dave Russell

Vice President, Enterprise Strategy

Never waste a good crisis: How to handle a ransomware attack

At VNOG, we provide essential fire-fighting services and assistance in the event of accidents, disasters and crises to the 870,000 citizens of North and East Gelderland in the Netherlands. In this blog post, I’ll tell the story of my most memorable day as VNOG’s Chief Information Security Officer (CISO). Read more
Edwin Moraal
Edwin Moraal

Chief Information Security Officer, Veiligheidsregio Noord- en Oost-Gelderland

What Is Business Continuity?

Business continuity, simply put, is enabling your business to continue operating at an acceptable level in the event of an incident - large or small. Continuity for your business means being proactive, ready for inevitable disruption and able to react to resume critical services.   Read more
Ian Wright
Ian Wright

Enterprise Systems Engineer

Veeam & Infinidat: Enterprise Ransomware Protection Solution

Remember the days when your data protection strategy was designed around system failures or loss of a data center due to a catastrophe, whether manmade or natural? While preparing for these types of disasters is still very much a priority, in the past decade a new menace has surfaced, demanding the attention of organizations everywhere. Read more
Steve Firmes
Steve Firmes

Solutions Architect

Protecting your critical enterprise applications

Enterprises routinely face challenges when it comes to protecting their critical workloads. Meeting demanding Service Level Agreements (SLAs), unsought multi-team workflows, and convoluted or sprawling toolsets are just a few of the common constraints that organizations routinely face. When these challenges start to compound, you quickly wind up in situations where simple tasks can grind your applications to a halt.  Read more
Matt Crape
Matt Crape

Senior Technical Product Marketer

How to Recover Quickly From a Ransomware Attack

Ransomware attacks need to be viewed under the same category as power outages and natural disasters. The requirement to recover quickly is a necessity. Recently, I'm seeing many vendors in the data protection industry advertise immutability and ransomware detection features. Both of which should absolutely be part of a company's ransomware strategy, but an immutable copy coming from spinning disk or tape can result in too much downtime for the business. It's an easy decision for a CEO or CFO if an attacker's ransom is $100,000 and the cost of downtime for a day is $500,000. The only question at that point becomes how do we make a Coinbase account to transfer Bitcoin? Read more
Brad Linch
Brad Linch

Director of Technical Strategy

How to Scan Backups for Ransomware

Protect, Detect and Recover! The three key pillars a backup vendor is expected to offer when it comes to the NIST Cybersecurity Framework. The top priority on that list is protecting your data. A secure backup both on premises and in a private or public cloud offers immense protection. This can protect data from both a hacker accessing the backup server as well as the backup repository. Secondly, the ability to recovery quickly is crucial. Read more
Brad Linch
Brad Linch

Director of Technical Strategy