Veeam Blog
Filters (Results: 483)
Results: 483
Filters (Results: 483)
  • Capabilities (2)
  • Business Types (1)
Stay up to date on the latest tips and news
By subscribing, you are agreeing to have your personal information managed in accordance with the terms of Veeam’s Privacy Policy
You're all set!
Watch your inbox for our weekly blog updates.
OK

Introduction to Key Management Systems (KMS)

When it comes to managing encryption, keys needed for secure data encryption and decryption – the essential tools for encoding and decoding data – Key Management Systems (KMS) are crucial. KMS provides a secure environment for handling these keys, ensuring they are accessible only to authorized systems and individuals. KMS is vital for protecting the confidentiality and integrity of sensitive data, particularly in complex IT environments. Read more
Ivan Cioffi
Ivan Cioffi

Technical Advisor, GSI - Product Management, Alliances

VMware to Hyper-V Migration: Best Practices

The shift from VMware to Hyper-V is becoming an increasingly popular decision for many organizations. This move is not just a change in virtualization platforms; it's a strategic decision that can influence a company's operational efficiency and future scalability. Read more
Matthew Anania
Matthew Anania

Product Marketing Specialist

Virtualization Management: Optimize Your VMs

Virtualization has become a critical technology in modern IT infrastructure, with organizations investing in the creation of virtual hardware, software, storage, networks, and more. By abstracting these resources from the underlying physical infrastructure, virtualization provides substantial benefits like improved resource utilization, enhanced scalability and flexibility, and reduced costs. Read more
Billy Cashwell
Billy Cashwell

Principal Product Marketing Manager

Expand Security with SIEM Integration and Backup

SIEM integration involves consolidating a variety of cybersecurity tools, including firewalls, intrusion detection systems, antivirus solutions, IAM (Identity and Access Management), Endpoint security, and Cloud security, into a unified platform. This modernization encompasses a broader range of security measures, moving beyond the older solutions. Read more
Matt Crape
Matt Crape

Senior Technical Product Marketer

High Availability Virtualization Best Practices

High Availability (HA) involves designing systems that are always accessible and resilient to failures, rapidly recovering to minimize downtime. In today's business environments, where interruptions can have significant consequences, this is especially important. Read more
Matt Crape
Matt Crape

Senior Technical Product Marketer

Microsoft 365 Native Security: Unlocking Compliance and Monitoring Features

No business is exempt from meeting some kind of compliance or governing regulation. These controls are put in place (generally speaking) to help ensure trust and consistency when dealing with goods and services. When it comes to “as a Service” offerings, these regulations can enter grey areas and offer misconceptions of who is responsible — and at fault — if there is a violation. Read more
Karinne Bessette
Karinne Bessette

Technologist, Product Strategy

Open Virtualization: A Modern IT Shift

The IT infrastructure field is continuously adapting, and open virtualization has become an important aspect of this change. This approach stands as an alternative to conventional proprietary methods, notable for its flexibility and potential for cost savings. Read more
Billy Cashwell
Billy Cashwell

Principal Product Marketing Manager