Veeam Blog
Filters (Results: 422)
Results: 422
Filters (Results: 422)
  • Capabilities (2)
  • Business Types (1)
Stay up to date on the latest tips and news
By subscribing, you are agreeing to have your personal information managed in accordance with the terms of Veeam’s Privacy Policy
You're all set!
Watch your inbox for our weekly blog updates.
OK

The Organizational Structure of Ransomware Threat Actor Groups is Evolving Before Our Eyes

As we approach the one year anniversary of two prominent ransomware group collapses (Lockbit and BlackCat/ALPHV), we find the ransomware ecosystem to be as fractured and uncertain as it did in the months following these events. The Ransomware-as-a-Service (RaaS) model remains irreversibly tarnished after the groups that pioneered this framework were exposed as being fraught with infighting, deception, lost profits, and compromised anonymity for their affiliates. Joint law enforcement actions over the last year have systematically impaired the resources ransomware actors depend on to operate. In the case of domestic threats, law enforcement efforts have even put a number of bad actors behind bars. While certain groups persist and new names continue to trickle in and out of the ransom-sphere, ... Read more
Bill Siegel
Bill Siegel

CEO & Co-founder of Coveware

The Power of Veeam Intelligent Diagnostics

In Veeam Availability Suite 9.5 Update 4, we released a feature called Veeam Intelligent Diagnostics. In Veeam Availability Suite v10, we enhanced VID by adding the ability to find potential issues with proxies and backup repositories in addition to Veeam Backup & Replication servers. Let’s take a look at how VID reduces risk in your Veeam environment and keeps it always ready to protect or restore your data. Read more
Kirsten Stoner
Kirsten Stoner

Technologist, Product Strategy

Melissa Palmer
Melissa Palmer

Team Lead/Senior Technologist, Product Strategy

What is the 3-2-1 backup rule?

The 3-2-1 Rule is a rule to live by. Here at Veeam, we have been advocating this rule for many years to help organizations ensure recoverability when it is needed most. In this blog post I’m going to explain the 3-2-1 Rule and show you the way to upgrade it to a more modern and resilient way of thinking! Read more
Rick Vanover
Rick Vanover

Senior Director, Product Strategy

Expand Security with SIEM Integration and Backup

SIEM integration involves consolidating a variety of cybersecurity tools, including firewalls, intrusion detection systems, antivirus solutions, IAM (Identity and Access Management), Endpoint security, and Cloud security, into a unified platform. This modernization encompasses a broader range of security measures, moving beyond the older solutions. Read more
Matt Crape
Matt Crape

Senior Technical Product Marketer

6 Best Practices for Kubernetes Disaster Recovery

Kubernetes adoption is accelerating as businesses become familiar with its many benefits. The platform offers portability and scalability, cost efficiency and productivity gains, which is why more than 5.6 billion developers use it today. Unfortunately, cyber-attacks and the potential for downtime are very real risks for cloud native environments, so backup and disaster recovery (DR) are critical components of any Kubernetes environment. This is especially true as the number of stateful applications such as databases are being deployed in Kubernetes.  Read more
Michael Cade
Michael Cade

Senior Technologist, Product Strategy