On Demand
Introducing Flash-to-Flash-to-Cloud (F2F2C), a solution designed for the scale and use cases of modern data backup and protection. Together, with Pure Storage and Veeam® Backup & Replication™, this architecture provides significant improvements in recovery times.
Veeam Availability for Nutanix AHV is an easy to use prism-like interface that gives you a possibility to look at snapshot jobs, do restores and recoveries, see job errors and more. Watch this video, which will walk you through the menu and interface, and get acquainted with all the functions and features of it.
In this episode Shawn Lieu, Jason Leiva, Ronn Martin and a special guest from Nutanix have discussed the NEW Veeam Availability for Nutanix AHV software solution that provides Nutanix AHV integration with Veeam Backup & Replication. This customer requested solution combines agentless AHV backups with Prism like management interface to deliver the world-class ease-of-use, reliability and Availability, that Veeam customers currently enjoy for VMware and Hyper-V environments.
As more businesses look to move workloads to the cloud, they can encounter challenges and constraints with their current data management solutions. In fact, 47% of IT leaders are concerned that their cloud workloads are not as portable as intended. It is your mission as an IT guru to obtain workload portability in the cloud.
One thing is certain about data today — it’s growing exponentially. With this rapid increase of data created by organizations, it’s no surprise that challenges such as storage capacity and cost are starting to take hold. In addition, compliance requirements are requiring businesses to hold onto data for longer and longer. It is your mission to manage data growth, while also addressing compliance requirements.
Nearly all commerce, communications, and data traffic going over the web is encrypted. As organizations transform operations, leverage more of the cloud, expanding locations, and utilizing remote workforces, IT’s lack of visibility into encrypted traffic puts the organization at risk for a cyberattack, data breach and compliance failures. Learn more.
Join us at this webcast as we discuss two early stage attack activities: LDAP reconnaissance and Password Spraying – that allow attackers to map out the target infrastructure to plan out their attack and begin to take over accounts. Detection strategies and mitigation steps will also be explained. Sign up.
Duration: 1 hour
Join Roger Grimes, KnowBe4's Data-Driven Defense Evangelist, as he explores techniques you can implement now to minimize cybersecurity risk due to phishing and social engineering attacks. Roger won't just cover one angle. He'll come at it from all angles! Read on.
In this webinar, MVP Derek Melber will guide you through how you can configure your SIEM to detect direct attacks and also improve your SIEM with technologies such as user behavior analytics. Find out more.
Don't let Active Directory fall victim to a cyber attack! When it comes to protecting your Active Directory, there is no room for error. In this On Demand Webcast , join Dale Meredith, cyber security expert as he explores ways to protect AD from cyber criminals. Watch now!
In this discussion, Dave Russell Vice President of Enterprise Strategy of Veeam reviews the considerations for adopting cloud-based object storage and how to leverage cloud object storage for the best outcome. Learn more.
In this webinar, we'll offer you best practices and key trends to help you maximize the return on your Azure cloud investment and gain control of your scaling cloud infrastructure. Learn more.
Duration: 1 hour
In today’s competitive world, using new technology to set your business apart can make the difference between getting ahead or falling behind. But staying in control of the growing complexity is tough. Learn more.
It's been said that North America has some of the wildest weather on Earth. With the summer months approaching, it's the season for thunderstorms, tornados, hurricanes, wildfires and floods. Is your business data prepared to weather any approaching storms? Learn more.
When attempting to protect your organization, you’re being pulled in a million directions, trying to secure every possible attack vector. Learn more.
Duration: 1 hour
The shift to the cloud always seems to focus on enhanced productivity for an organization overall. But cloud adoption also means IT must figure out how to integrate “all-things-cloud” with on-prem Active Directory. Learn more.
Duration: 1 hour
If there's one silver lining to the emergence of ransomware in the last few years, it's this -- it's brought into sharp relief how interrelated security, backup and recovery, disaster recovery, business continuity, training and organizational policies are in a solid defense strategy. Learn more.
Duration: 1 hour
When it comes to end-user security, hard-drive encryption is a key pillar to consider for your security strategy. Yet while it adds a layer of security and can be required for compliance, it also adds some challenges and creates risks of accidental data loss on individual PCs. Learn more.
Duration: 1 hour
Using your Veeam solution for backup and replication to the Microsoft Azure cloud is a great start, but did you know it’s possible to make it better and faster? Learn more.
Duration: 1 hour
Using your Veeam solution for backup and replication to the Microsoft Azure cloud is a great start, but did you know it’s possible to make it better and faster? Read on.
Duration: 1 hour