Veeam Software Official Blog

Targeted social engineering is en vogue as ransom payment sizes increase

“Don’t say the “S…” word. But which adjective starting with S are we talking about? Three specifically come to mind in Q2, as these groups were both prolific in the sheer volume of attacks and novel iterations of social engineering in their intrusion vectors. Below, we dissect each one. Scattered SpiderAttack Approach: TargetedCharacterized By: Social …

Targeted social engineering is en vogue as ransom payment sizes increase Read More »

8 Reasons Veeam Data Cloud is the #1 Choice for Microsoft 365 SaaS Backup

Choosing a backup solution for your Microsoft 365 SaaS environment isn’t just a checkbox for IT, it’s a make-or-break decision for your entire business. The stakes are high: misconfigurations, accidental deletions, unauthorized data access, and compliance violations are everywhere, and the cost of a failed backup solution in a critical moment can have devastating business …

8 Reasons Veeam Data Cloud is the #1 Choice for Microsoft 365 SaaS Backup Read More »

YARA Rules Guide: What They Are and How to Write Them

YARA (Yet Another Recursive Acronym) rules are powerful pattern-matching tool used by security teams to  identify and classify malware based on known signature, strings, and behaviors. In backup recovery, YARA scanning adds a valuable layer of protection. Combined with immutable backups and secure restore workflow, YARA rules ensure safe and clean recovery. In this article, …

YARA Rules Guide: What They Are and How to Write Them Read More »

Backing Up Microsoft Entra ID Conditional Access Policies Matters

Veeam automates the backup and restore of conditional access policies for full protection. Conditional access policies in Microsoft Entra ID (formerly Azure AD) are at the heart of modern identity security. They determine who gets access to what, under which conditions, based on factors like user identity, device state, location, and application sensitivity. But these …

Backing Up Microsoft Entra ID Conditional Access Policies Matters Read More »

How Veeam’s Focus on Data Resilience Inspires Industry Recognition

At Veeam, our customers are at the heart of everything we do. Their needs, challenges, and feedback inspire us to continually enhance our solutions and maintain a steadfast commitment to our customer-first philosophy. In a world where data is the backbone of business operations, ensuring its resilience and availability is more critical than ever. That’s …

How Veeam’s Focus on Data Resilience Inspires Industry Recognition Read More »

Securing the Future of Defense: Veeam Kasten Joins the DoD P1 Marketplace to Deliver Kubernetes Data Resilience

As the Department of Defense (DoD) rapidly modernizes its digital infrastructure, we are pleased to announce that Veeam Kasten is now awardable in the P1 Marketplace, marking an important advancement in securing cloud-native applications at scale. The P1 Solutions Marketplace is a digital repository of post-competition and readily awardable pitch videos that address the DoD’s …

Securing the Future of Defense: Veeam Kasten Joins the DoD P1 Marketplace to Deliver Kubernetes Data Resilience Read More »

HPE and Veeam: Enhancing Private Cloud Data Protection with Morpheus Software, VM Essentials, and Kubernetes

“Data is an organization’s most valuable asset and often its most vulnerable. We’re delivering to customers the industry’s most advanced private cloud solutions with data protection that is secure, resilient, and future-ready for the evolving IT landscape,” said Fidelma Russo, Executive Vice President of Hybrid Cloud and CTO of Hewlett Packard Enterprise (HPE). At HPE …

HPE and Veeam: Enhancing Private Cloud Data Protection with Morpheus Software, VM Essentials, and Kubernetes Read More »

Data Resilience Maturity Model: Your Questions Answered

Mastering Resilience: Essential Questions About the Data Maturity Model Data resilience should be a top priority for all organizations. But what does true resilience look like, and how can companies objectively measure and improve it? Enter the Data Resilience Maturity Model (DRMM), a comprehensive framework designed to help businesses assess their current capabilities, benchmark themselves …

Data Resilience Maturity Model: Your Questions Answered Read More »

Cyber Resilience Strategies from the Risk to Resilience Report

Ransomware attacks are evolving faster than ever, making cyber resilience a top priority for organizations of all sizes. In this post, our principal product marketing manager, Leah Troscianecki, EMEA field CTO, Edwin Weijdema, and VP, Technology GRC, Courtney Elder, answer some of the main questions from Veeam’s Risk to Resilience Report, share real-world insights from …

Cyber Resilience Strategies from the Risk to Resilience Report Read More »

Veeam Data Cloud for Microsoft 365 Joins the Unified Multi-Workload Experience  

As cyberthreats continue to rapidly evolve, protecting your Microsoft 365 and Entra ID data has become critical, since these platforms are the backbone of your organization’s productivity and access management. Safeguarding them requires more than just strong cybersecurity; you also need to navigate complex compliance requirements, overcome recycle bin limitations, guard against accidental deletions, and …

Veeam Data Cloud for Microsoft 365 Joins the Unified Multi-Workload Experience   Read More »

Scroll to Top