#1 Global Leader in Data Resilience

White Papers

Filters
Whitepaper | February 2025

When looking at Microsoft Azure backup and recovery solutions here are some key factors to consider when making your decision:

  • Transparent pricing, low backup costs, compression and storage options
  • Encryption, key management service, role-based access, reporting and health checks
  • Single console, data portability, flexible licensing and data intelligence

For more key factors to consider when making your decision download the Azure Backup and Recovery competitive e-book today for expert guidance.

Find out more
Whitepaper | February 2025

When looking at Amazon Web Services (AWS) backup and recovery solutions here are some key factors to consider when making your decision:

  • Transparent pricing, low backup costs, compression and storage options
  • Encryption, key management service, role-based access, reporting and health checks
  • Single console, data portability, flexible licensing and data intelligence

For more key factors to consider when making your decision download the AWS Backup and Recovery competitive e-book today for expert guidance.

Find out more
Whitepaper | February 2025

With cyberattacks becoming more sophisticated, securing Kubernetes deployments is critical. The complexity of Kubernetes environments, with their mix of third-party tools and open-source components, increases the risk of misconfigurations and vulnerabilities. This white paper explores the four key areas of Kubernetes security, offering practical insights to reduce risk and strengthen your defenses.

Read this guide to:

  • Understand the cloud provider’s and cloud user’s role in security
  • Learn effective strategies for securing Kubernetes nodes, APIs, and workloads
  • Discover how to reduce vulnerabilities through code reviews and automated tools
Find out more
Whitepaper | February 2025

Ransomware attacks have become a daily occurrence, affecting organizations of all sizes and industries. This e-book aims to provide a guide on ransomware recovery, drawing insights from real-life experiences and expert advice.

Get expert insight on:

  • Negotiating with threat actors
  • Orchestrating an immediate response
  • Deciding to pay the ransom or not
  • Containing the attack
  • And more!
  • Use this guide to prepare by implementing strong cybersecurity measures, a comprehensive backup strategy, and a powerful incident response plan.

    Find out more
    Whitepaper | January 2025

    Although backups have been around for as long as IT itself, cloud environments like Microsoft Azure introduce new backup challenges. This list is designed to give you practical guidance for your Azure backups.

    Check out this Conversational Geek checklist to learn more!

    Find out more
    Whitepaper | January 2025

    Although backups have been around for as long as IT itself, cloud environments like Microsoft Azure introduce new backup challenges. This list is designed to give you practical guidance for your Azure backups.

    Check out this Conversational Geek checklist to learn more!

    Find out more
    Whitepaper | January 2025

    Discover the transformative power of containerization with Kubernetes and how Red Hat OpenShift amplifies deployment, security, and management in a hybrid cloud world. This e-book provides insights into: 

    • Effortlessly orchestrating containers 
    • Migrating and scaling with agility
    • Securing and protecting enterprise data 
    Find out more
    Whitepaper | January 2025

    Ransomware poses a growing threat to Kubernetes environments by exploiting vulnerabilities such as misconfigurations, credential theft, and supply chain attacks. This e-book explores the prevalence and impact of ransomware on Kubernetes clusters and provides actionable strategies for prevention, recovery, and data protection.

    By reading this guide, you will:

    • Understand Kubernetes ransomware threats and attack vectors
    • Learn best practices for prevention and recovery
    • See how to leverage Veeam Kasten for secure, automated backups
    Find out more
    Whitepaper | January 2025

    Infrastructure-as-a-Service (IaaS), also known as a hosting service, provides remote IT resources and/or services enabling organizations to host websites, databases, applications and other critical systems, usually using a hypervisor platform. Customer data that resides in the Service Provider’s infrastructure should be protected, however this can be a great challenge without a proper solution in place. 

    Service Providers can build a Veeam-powered service to provide managed or unmanaged Backup and Disaster Recovery on top of their IaaS offering. This document describes the most effective way to architect Veeam Backup & Replication for this use case when using VMware vSphere or Cloud Director as your IaaS platform.

    Find out more
    Whitepaper | December 2024

    This white paper is designed for Australian Federal & State agencies as well as nominated critical infrastructure environments looking to achieve maturity level 2 or 3 compliance within the ASD & ACSC Essential Eight. The Essential Eight has been designed to protect organization’s internet and non-internet-connected information technology platforms and networks. It is a recommended security baseline for government and systems assigned to critical infrastructure. This is a guide focused on the evolving cyberthreat landscape to help agencies and organizations protect against the following:

    • Targeted cyber intrusions (advanced persistent threats) and other external adversaries who steal backup data
    • Ransomware and external adversaries who destroy backup data and prevent computers/networks from functioning
    • Malicious insiders who steal data
    • Malicious insiders who destroy backup data and prevent computers/networks from functioning

    This is a guide only, built around both Industry best practices and recommendations highlighted by the Australian Signals Directorate and Australian Cyber Security Centre, and will not guarantee data loss or cyberthreats occurring. By implementing the recommendations in this white paper, organizations will significantly increase recovery efforts in the event of a cyberattack for faster return to business continuity. They will be able to remove non-activated dormant threats during recovery operations, as well as reduce the blast radius from a cyberattack.

    Find out more