Veeam

The Overlooked Risk in Your Microsoft 365 Defense: Why Identity Protection Matters More Than Ever

Cybersecurity is a moving target, and as organizations increasingly rely on Microsoft 365, Entra ID has become the latest battleground in the war on information security. In our recent webinar, “The Overlooked Risk in Your Microsoft 365 Defense: Identity Protection”, Veeam expert Karinne Bessette and industry leader Joseph Carson explored the real-world risks organizations face, …

The Overlooked Risk in Your Microsoft 365 Defense: Why Identity Protection Matters More Than Ever Read More »

Veeam Achieves TX-RAMP Level 2 Security Certification for Veeam Data Cloud Products

Veeam® Software, the leader in Data Protection and Ransomware Recovery, today announced that its Veeam Data Cloud (VDC) offerings have been awarded the Texas Risk and Authorization Management Program (TX-RAMP) Level 2 security certification. This achievement underscores Veeam’s commitment to delivering industry-leading, secure cloud data protection solutions to public sector organizations across Texas. TX-RAMP Level …

Veeam Achieves TX-RAMP Level 2 Security Certification for Veeam Data Cloud Products Read More »

Veeam in a Multi-Hypervisor World

The hypervisor landscape is undergoing significant change. With VMware’s acquisition by Broadcom and the resulting strategic shifts, new opportunities are emerging for alternative virtualization platforms. This technological evolution is bringing fresh momentum to the IT market – along with new challenges in data protection. Veeam is more than just backup for VMware environments. Our commitment …

Veeam in a Multi-Hypervisor World Read More »

Fortify Cyber Resilience Through Hyperautomation with Veeam + Torq

Cyberthreats continue to expand in frequency and complexity. They increase pressure on security operations and IT teams to preempt, detect, respond to, and recover from attacks faster, more accurately and confidently. Many organizations remain hindered by limited visibility, fragmented tools, and manual processes. These obstructions and complexities slow their ability to respond effectively to a …

Fortify Cyber Resilience Through Hyperautomation with Veeam + Torq Read More »

Clean Recovery and Business Continuity: Expert Insights from Veeam and Coveware

Recovery isn’t just about getting systems back online; it’s about proving that IT operations are essential to business continuity. Veeam’s Leah Troscianecki sat down with Ray Umerley, Field CISO, Coveware by Veeam, for a tactical conversation about what actually happens when ransomware hits, and how clean recovery can turn the tide from operational fire drills …

Clean Recovery and Business Continuity: Expert Insights from Veeam and Coveware Read More »

Targeted social engineering is en vogue as ransom payment sizes increase

“Don’t say the “S…” word. But which adjective starting with S are we talking about? Three specifically come to mind in Q2, as these groups were both prolific in the sheer volume of attacks and novel iterations of social engineering in their intrusion vectors. Below, we dissect each one. Scattered SpiderAttack Approach: TargetedCharacterized By: Social …

Targeted social engineering is en vogue as ransom payment sizes increase Read More »

8 Reasons Veeam Data Cloud is the #1 Choice for Microsoft 365 SaaS Backup

Choosing a backup solution for your Microsoft 365 SaaS environment isn’t just a checkbox for IT, it’s a make-or-break decision for your entire business. The stakes are high: misconfigurations, accidental deletions, unauthorized data access, and compliance violations are everywhere, and the cost of a failed backup solution in a critical moment can have devastating business …

8 Reasons Veeam Data Cloud is the #1 Choice for Microsoft 365 SaaS Backup Read More »

YARA Rules Guide: What They Are and How to Write Them

YARA (Yet Another Recursive Acronym) rules are powerful pattern-matching tool used by security teams to  identify and classify malware based on known signature, strings, and behaviors. In backup recovery, YARA scanning adds a valuable layer of protection. Combined with immutable backups and secure restore workflow, YARA rules ensure safe and clean recovery. In this article, …

YARA Rules Guide: What They Are and How to Write Them Read More »

Backing Up Microsoft Entra ID Conditional Access Policies Matters

Veeam automates the backup and restore of conditional access policies for full protection. Conditional access policies in Microsoft Entra ID (formerly Azure AD) are at the heart of modern identity security. They determine who gets access to what, under which conditions, based on factors like user identity, device state, location, and application sensitivity. But these …

Backing Up Microsoft Entra ID Conditional Access Policies Matters Read More »

How Veeam’s Focus on Data Resilience Inspires Industry Recognition

At Veeam, our customers are at the heart of everything we do. Their needs, challenges, and feedback inspire us to continually enhance our solutions and maintain a steadfast commitment to our customer-first philosophy. In a world where data is the backbone of business operations, ensuring its resilience and availability is more critical than ever. That’s …

How Veeam’s Focus on Data Resilience Inspires Industry Recognition Read More »

Scroll to Top