Veeam Blog
Filters (Results: 74)
Results: 74
Filters (Results: 74)
  • Capabilities (2)
  • Business Types (1)
Stay up to date on the latest tips and news
By subscribing, you are agreeing to have your personal information managed in accordance with the terms of Veeam’s Privacy Policy
You're all set!
Watch your inbox for our weekly blog updates.
OK

Protect FlashStack from Ransomware with Cisco and Veeam

Veeam and Cisco have good news for you. With best-of-breed ransomware prevention tools from Cisco, and best-of-breed ransomware recovery tools from Veeam, you can create a ransomware recovery plan that will allow to make ransomware infection much less likely, and ransomware recovery much more reliable and performant. Read more
Mark Polin
Mark Polin

Solutions Architect, Cisco/Pure

Beat Ransomware with Double-Play Immutability from Veeam

For the last few years, I have spent a lot of effort along with others at Veeam carefully watching the industry behavior when it comes to ransomware and its devasting impact it can have on an organization. I’ve also spent a lot of time putting together a lot of great works in the form of whitepapers, webinars and other assets to get the word out. Read more
Rick Vanover
Rick Vanover

Senior Director, Product Strategy

The continued rise of ransomware and its impact beyond the enterprise

To those of us in the security space, ransomware isn’t a new topic. Unfortunately, we’re, intimately familiar with ransomware and how it can devastate even the largest organizations that have the most sophisticated security measures. It’s no longer only CEOs and IT leaders that are worried about being tomorrow’s ransomware headline du jour though; everyday consumers are starting to worry about the impact it will have on their personal data. Read more
Rick Vanover
Rick Vanover

Senior Director, Product Strategy

Cybersecurity threats in 2022 – Here’s what you need to know

Cybersecurity threats are threats that focus on gaining access to an organization's digital environment. Unfortunately, it is called a threat for a reason. Attackers generally don't want to get inside to do good things to your computers and data. There are many different ways and reasons that attackers want to get into an IT environment, so let's take a closer look.  Read more
Melissa Palmer
Melissa Palmer

Team Lead/Senior Technologist, Product Strategy

The Latest and Greatest Veeam Backup & Replication v11

When Veeam Backup & Replication v11 went available in February of this year, I had no idea how much of an impact this release would have on the market. V11 came in my 11th year here are Veeam, and while I knew it was the biggest release we’ve ever had — call me impressed! Read more
Rick Vanover
Rick Vanover

Senior Director, Product Strategy

Best practices for data protection

With total enterprise data volumes projected to exceed 2.02 petabytes by 2022, smart safeguards must be implemented to keep it protected. Those strategies themselves are changing in lockstep industry trends. Now that hybrid and full-cloud deployments are dominant, multiple external variables can impact how data is stored and preserved. Additionally, over one quarter of Cloud Vision 2020’s survey respondents could shift 95% of critical workloads cloudward by 2025. Read more
Adam Bertram
Adam Bertram

Guest author

Protecting VMware vCenter by Using a “Least Privilege Model”

Third-party software that interacts with VMware vCenter must store credentials somewhere. These credentials are the target of attackers as they often provide high privileges on one of the central components of a busines IT infrastructure. This blog post shows how a “least privilege model” implementation with Veeam Backup & Replication can work. Read more
Hannes Kasparick
Hannes Kasparick

Senior Analyst, Product Management

How to protect your organization from ransomware attacks

One thing that all CIOs have had on their minds the last couple of years is if their infrastructure and services are safe from ransomware attacks. So far in 2021 we have seen a surge of ransomware attacks that have targeted even large enterprises like Colonial Pipeline which supply 45% of the East Coast's supply of diesel, petrol and jet fuel and ended up paying 5 million for getting back access to their data. The latest statistics show that there is a ransomware attack every 11 seconds, where the attackers utilize different attack vectors to try to get access. So how can we protect ourselves or at least reduce the risk from these types of attacks? Read more
Marius Sandbu
Marius Sandbu

Guest author, Guild Lead for Public Cloud at TietoEVRY

Recovery from Ransomware? Let’s look at Pure Storage and Veeam

May was a busy month! I had the opportunity to present at Pure//Accelerate again this year and we just wrapped up VeeamON 2021. By the way, both events now have content up for replay, so it’s the perfect time to catch up! wOne of the common themes that I had for both events was some perspective around ensuring reliable data recovery from a ransomware incident. With the current threat atmosphere today, this is the opportunity to shine for backup software as well as modern storage systems. Read more
Rick Vanover
Rick Vanover

Senior Director, Product Strategy

Veeam wins a 2021 Top Rated Award from TrustRadius

TrustRadius is a third-party review platform focused on business technology for companies and customers to read real, unbiased user reviews. And thanks to incredible high-score reviews from our customers, we have been recognized as a “Top Rated” company for above-average satisfaction for business technology. The other honor, the TRUE Certification, is a testament to our determination to be transparent, responsive, unbiased and ethical in sourcing and using customer reviews. Read more
Jim Kruger
Jim Kruger

Chief Marketing Officer