Quantcast
Channel: Veeam Software Official Blog
Browsing all 472 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Top 5 Veeam CDP Improvements in V12.1 for Service Providers

Veeam Backup & Replication v11 marked the initial launch of Continuous Data Protection (CDP), which provides the lowest recovery point objectives (RPOs) for organizations that can’t afford to lose...

View Article


Expand Security with SIEM Integration and Backup

What Is SIEM Integration? SIEM integration involves consolidating a variety of cybersecurity tools, including firewalls, intrusion detection systems, antivirus solutions, IAM (Identity and Access...

View Article


Image may be NSFW.
Clik here to view.

Guide to Server Backups: Creating a Backup Strategy

It’s common for businesses to store huge amounts of information from customer and financial records to emails and business-critical documents. Servers are used for almost everything, making server...

View Article

Become a Top-Tier Backup Reseller

Today’s business landscape demands adaptability and growth, especially when it comes to data protection. Cybercriminals are constantly evolving and getting smarter, so you must too. A large part of...

View Article

Image may be NSFW.
Clik here to view.

Veeam Data Platform: Winning Against Ransomware

In the relentless battleground of cybersecurity, the specter of ransomware looms large, posing an existential global threat to businesses of all sizes. As organizations increasingly fall prey to...

View Article


Image may be NSFW.
Clik here to view.

Raising the Bar in Kubernetes Data Protection

Great news! For the fourth year in a row, Veeam has been named a leader and outperformer in the newest edition of GigaOm’s Radar Report for Kubernetes Data Protection v4.0. We’re proud to say that...

View Article

Image may be NSFW.
Clik here to view.

2024 Predictions with Veeam’s Data Protection Trends Report 

Veeam is proud to release the findings of yet another independent research project, the 2024 Data Protection Trends Report. This is the fifth annual release of the Data Protection Trends Report in its...

View Article

What is Zero Trust? Principles, Benefits, and Use Cases

Zero Trust is a model that requires all users, devices, and applications to be continuously authenticated, whether inside the organization’s perimeter or in a location on the other side of the globe....

View Article


Key Insights: Preparing for Radical Resiliency in 2024

Cyberattacks almost double each year, and last year was no different. These days, CEOs and business owners are the ones who answer for security breaches, and those who aren’t prepared to face an attack...

View Article


Image may be NSFW.
Clik here to view.

Secure and Compliant Protection for Your Data 

In the world of IT, the importance of maintaining a comprehensive security posture while adhering to compliance standards and requirements is growing every day. Attackers are consistently targeting...

View Article

Image may be NSFW.
Clik here to view.

The State of Enterprise Kubernetes

As we kick off the new year, it’s the perfect time for a fresh start and a shift in perspectives. With this in mind, in the latter part of 2023 we joined forces with Dzone and surveyed software...

View Article

Image may be NSFW.
Clik here to view.

Data Protection Budget & Interest Trends

It’s always been a myth that nobody changes backup solutions, but this year’s market research disproves that myth yet again as to who will or won’t be interested in making changes around their data...

View Article

Small Business Ransomware: What You Need to Know

It’s a common misconception that small businesses do not get attacked by cybercriminals as often, but unfortunately, bad actors do not discriminate. According to Veeam’s 2023 Data Protection Trends...

View Article


Mastering Data Protection: A Comprehensive Guide to Salesforce Backup Best...

In the digital age, where data reigns supreme, businesses face the challenge of safeguarding their most critical asset. As organizations increasingly turn to Salesforce for managing their customer...

View Article

Image may be NSFW.
Clik here to view.

Introduction to Key Management Systems (KMS)

When it comes to managing encryption, keys needed for secure data encryption and decryption – the essential tools for encoding and decoding data – Key Management Systems (KMS) are crucial. KMS...

View Article


Image may be NSFW.
Clik here to view.

Modern Data Protection: Embracing Enterprise Features for Today’s Challenges

Introduction to Modern Data Protection Veeam is proud to release the findings of yet another research project, the 2024 Data Protection Trends Report, which is the industry’s largest independent...

View Article

Image may be NSFW.
Clik here to view.

How To Ensure Your CRM Data Security

In the era of Digital Transformation, where businesses thrive on data-driven insights, the security of customer relationship management (CRM) data stands as the foundation for success. As...

View Article


Unlocking Opportunities as a Cloud Backup Reseller

Backups and data protection are concerns for businesses of all sizes. Ransomware, data corruption, and infrastructure failures make secure backups a must. If you provide IT solutions to your clients,...

View Article

Image may be NSFW.
Clik here to view.

RPO and RTO: What’s the Difference?

When it comes to disaster recovery, two critical metrics for organizations are the recovery point objective (RPO) and recovery time objective (RTO), which address the amount of data loss and the time...

View Article

Image may be NSFW.
Clik here to view.

What is the 3-2-1 backup rule?

In the realm of data protection and Veeam, the 3-2-1 Rule has long served as a foundational guideline. This rule outlines the importance of maintaining multiple copies of your data, but as technology...

View Article
Browsing all 472 articles
Browse latest View live