<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Veeam Software Official Blog</title>
	<atom:link href="https://www.veeam.com/blog/feed" rel="self" type="application/rss+xml" />
	<link>https://www.veeam.com/blog</link>
	<description>Availability technologies overviews and discussions. News, thoughts &#38; updates about Veeam solutions.</description>
	<lastBuildDate>Wed, 08 Apr 2026 15:25:09 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.1</generator>

<image>
	<url>https://img.veeam.com/blog/wp-content/uploads/2023/12/14182530/favicon-228x228-1-120x120.png</url>
	<title>Veeam Software Official Blog</title>
	<link>https://www.veeam.com/blog</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Introducing Command the Expand: Fueling your Business Growth in 2026</title>
		<link>https://www.veeam.com/blog/command-the-expand-customer-growth-2026.html</link>
		
		<dc:creator><![CDATA[Laura Maniscalco]]></dc:creator>
		<pubDate>Tue, 07 Apr 2026 13:47:38 +0000</pubDate>
				<category><![CDATA[Business]]></category>
		<category><![CDATA[Service Providers]]></category>
		<guid isPermaLink="false">https://www.veeam.com/blog?p=212413</guid>

					<description><![CDATA[<p>If I told you that your existing customer base could ignite your growth for the year, would you believe me? Veeam is seeing success and results, such as increased ARR and higher retention. And the best part? Organizations remain resilient against any threat.</p>
<p>The post <a href="https://www.veeam.com/blog/command-the-expand-customer-growth-2026.html">Introducing Command the Expand: Fueling your Business Growth in 2026</a> appeared first on <a href="https://www.veeam.com/blog">Veeam Software Official Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>If I told you that your existing customer base could ignite your growth for the year, would you believe me? Veeam is seeing success and results, such as increased ARR and higher retention. And the best part? Organizations remain resilient against any threat.</p>



<p>For our valued partners, that’s where the Command the Expand initiative comes in. It’s a strategic approach to maximizing your existing customer base and uncovering new revenue streams. Veeam has brought more to its portfolio in the past few years, moving from a product sale to a platform conversation, proving ample opportunities to fuel your growth in 2026.</p>



<h2 class="wp-block-heading">Why Customer Expansion Matters</h2>



<p>Expanding within your current customer accounts isn’t just easier, it’s smarter. Existing customers already trust your expertise and solutions, making them far more likely to invest in additional products and services. Engaging existing customers as part of your customer lifecycle management process can also prevent them from leaving your services. You are continually checking to ensure they are satisfied, and not just because it’s time to renew.  Customer expansion delivers higher margins (companies that excel at cross-selling are 30% more profitable), increases retention up to 50% more (when multiple products are sold vs. a single product), and lowers customer acquisition costs. Plus, with Veeam, you have a proven platform to help customers remain resilient.</p>



<h2 class="wp-block-heading">The Four Key Expansion Scenarios</h2>



<p>Command the Expand focuses on four primary scenarios to drive growth:</p>



<h3 class="wp-block-heading">1. Leverage the full power of Veeam Data Platform</h3>



<p>Upgrade customers to higher Veeam Data Platform editions, unlocking advanced features like monitoring, analytics, and ransomware protection. This includes Advanced and Premium editions.</p>



<h3 class="wp-block-heading">2. Secure data off-site with Veeam Data Cloud Vault</h3>



<p>Veeam Vault makes it easy to meet the 3-2-1-1-0 rule with seamless integration with Veeam Data Platform, enhancing data resiliency and disaster recovery readiness.</p>



<h3 class="wp-block-heading">3. Shifting Veeam Backup for Microsoft 365 customers to Veeam Data Cloud</h3>



<p>The same great protection your customers know and love, but as-a-service. Eliminate the need to manage infrastructure, storage, patching, and more. Protect SaaS with SaaS! Create a more predictable route to recurring revenue, stronger retention, and more services.</p>



<h3 class="wp-block-heading">4. Protect additional workloads with Veeam Data Cloud&nbsp;</h3>



<p>You’re likely already protecting Microsoft 365 apps. Ensure your customers have Entra ID, Salesforce, and cloud-native workloads like Microsoft Azure protected too. Veeam Data Cloud makes it easy to add new workloads with the same web portal for easy management. Veeam Data Cloud scales with your customers without incremental infrastructure investments.</p>



<p>Each scenario addresses critical needs — from compliance and security to operational simplicity — and offers tangible value to both customers and partners. Check out our <a href="https://www.veeam.com/resources/wp-command-expand-partner-playbook-revenue-growth.html" title="Command the Expand Partner Playbook" data-wpel-link="internal" target="_blank" rel="follow">partner playbook</a>, which dives into each scenario with key resources to get you up to speed.</p>



<p>Stay tuned for part two of our blog series, where we’ll dive into cross-selling Veeam Data Cloud and maximizing your cloud opportunities!</p>
<p>The post <a href="https://www.veeam.com/blog/command-the-expand-customer-growth-2026.html">Introducing Command the Expand: Fueling your Business Growth in 2026</a> appeared first on <a href="https://www.veeam.com/blog">Veeam Software Official Blog</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Veeam Ransomware Detection Service: AI That Proactively Detects Attacks</title>
		<link>https://www.veeam.com/blog/veeam-ransomware-detection-service.html</link>
		
		<dc:creator><![CDATA[]]></dc:creator>
		<pubDate>Tue, 07 Apr 2026 07:48:01 +0000</pubDate>
				<category><![CDATA[Business]]></category>
		<category><![CDATA[Ransomware & Cyber Resilience]]></category>
		<guid isPermaLink="false">https://www.veeam.com/blog?p=211054</guid>

					<description><![CDATA[<p>Ransomware attacks in 2024–2025 have become far more deliberate. Attackers often spend time stealing credentials, moving laterally, and exfiltrating data before triggering encryption. When the payload finally runs, many variants use intermittent or selective encryption, encrypting only portions of files or skipping large data segments, to disguise activity and accelerate impact. Because of this, detections that rely solely on sudden resource spikes can miss early warning signs, leaving organizations unaware until recovery becomes impossible.</p>
<p>The post <a href="https://www.veeam.com/blog/veeam-ransomware-detection-service.html">Veeam Ransomware Detection Service: AI That Proactively Detects Attacks</a> appeared first on <a href="https://www.veeam.com/blog">Veeam Software Official Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p><strong><u>Key Takeaways:</u></strong></p>
<ul>
<li><strong>Ransomware is on the rise.</strong> Nearly 69 percent of organizations faced a ransomware incident in 2024–2025 (<a title="2025 Ransomware Trends: From Risk to Resilience" href="https://go.veeam.com/ransomware-trends" data-wpel-link="internal" target="_blank" rel="follow"><em>Veeam Risk to Resilience Report 2025</em></a>).</li>
<li><strong>Traditional backups recover data but cannot detect active threats. </strong>Attackers now run slow, stealth campaigns that evade resource‑spike alerts and standard monitoring tools.</li>
<li><strong>Veeam’s Ransomware Detection Service adds AI‑powered threat intelligence on top of the core/traditional backup workflow. </strong>It uses unsupervised machine learning to identify encryption patterns and anomalies before damage spreads.</li>
<li><strong>Built on Random Cut Forest (RCF) models, it learns continuously without manual training. </strong>This efficiency reduces cost while improving accuracy and time to detection.</li>
<li><strong>Dual attack profiles cover both rapid and stealth encryption attempts. </strong>Outputs are combined through ensemble methods for maximum precision.</li>
<li><strong>Privacy‑preserving and human‑verified. </strong>Curated, derived statistics are analyzed by the RCF models, and security operators verify detected anomalies through a controlled API.</li>
</ul>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<p>Ransomware attacks in 2024–2025 have become far more deliberate. Attackers often spend time stealing credentials, moving laterally, and exfiltrating data before triggering encryption. When the payload finally runs, many variants use intermittent or selective encryption, encrypting only portions of files or skipping large data segments, to disguise activity and accelerate impact. Because of this, detections that rely solely on sudden resource spikes can miss early warning signs, leaving organizations unaware until recovery becomes impossible.</p>
<p>At Veeam, we designed the <strong>Ransomware Detection Service</strong> to close that visibility gap. It adds an artificial intelligence layer to your backup and recovery strategy, using unsupervised machine learning to spot ransomware indicators directly within backup data. The system learns what “normal” looks like for every protected object and flags anomalies that deviate from historical patterns — whether it’s a sudden burst of file entropy or a subtle change in extensions over time.</p>
<p>Powered by the <strong>Random Cut Forest (RCF) models</strong>, Veeam’s approach is efficient, granular, and patent‑pending. It runs multiple models per user or protected object, continuously learning and adapting to resource-specific data patterns without manual retraining. Dual attack profiles detect signs of both fast-moving and stealth attack profiles by looking at trends of curated signals over time.</p>
<p>The result is AI‑driven ransomware defense that adapts as fast as attackers do. It delivers early, efficient detection for every object you protect with Veeam backups.</p>
<h2>Why Ransomware Detection Needs AI in 2026</h2>
<p>Artificial intelligence enables defenses that can adapt to threat actors changing tactics. Veeam’s <strong>Ransomware Detection Service</strong> uses machine learning models that continuously learn and adjust to new data access patterns. Each model can recognize subtle signals of compromise, such as unusual file modification rates or entropy changes that may indicate encryption activity.</p>
<p><strong><u>These models employ several advanced techniques:</u></strong></p>
<ul>
<li><strong>Unsupervised training: </strong>They learn normal behavior without needing manually labeled examples, reducing operational cost and improving time to detection.</li>
<li><strong>Online learning: </strong>They update continuously as new backup data arrives, improving precision over time without downtime or retraining.</li>
<li><strong>Ensemble methods: </strong>Outputs from multiple models are combined to improve prediction accuracy and minimize false positives.</li>
</ul>
<p>According to the <a title="2025 Data Breach Investigations Report | Verizon" href="https://www.verizon.com/business/resources/reports/dbir/" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer"><em>Verizon DBIR 2025 Report</em>,</a> ransomware now accounts for nearly one‑third of all data‑encryption breaches. AI‑based detection brings the adaptability and efficiency required to identify threats before they disrupt operations, and before recovery becomes the only option left.</p>
<h2>How Veeam’s Ransomware Detection Service Works</h2>
<p>The <strong>Veeam Ransomware Detection Service</strong> uses a machine learning technique known as <strong>Random Cut Forest (RCF)</strong> to identify anomalies in backup data. RCF is an <strong>unsupervised machine learning algorithm</strong> that detects outliers by analyzing statistical patterns across large data sets. In Veeam’s implementation, the models examine derived metrics from each backup, such as file entropy, file‑type distribution, and modification rates, to determine when activity deviates from normal behavior.</p>
<h3>Random Cut Forest Approach</h3>
<p>Veeam’s RCF models continuously integrate new data and learn from historical observations. Because the models adapt automatically, they require <strong>no manual retraining or rule updates</strong>. This unsupervised, continuous learning significantly reduces cost while improving both accuracy and time to detection. Only derived statistics are analyzed, never the raw backup content, ensuring <strong>privacy‑preserving detection</strong> that complies with data‑residency and confidentiality requirements.</p>
<h3>Dual Detection Profiles</h3>
<p>Two complementary detection profiles run in parallel to ensure full coverage across different ransomware behaviors:</p>
<ul>
<li><strong>Fast Attack Profile: </strong>Detects rapid encryption bursts that occur during large‑scale, high‑speed attacks.</li>
<li><strong>Extended Attack Profile: </strong>Monitors gradual, low‑volume encryption across a series of backups to identify stealth or slow‑moving attacks.</li>
</ul>
<p>Outputs from both profiles are combined using <strong>ensemble methods</strong>, which merge multiple model results to strengthen prediction accuracy and reduce false positives.</p>
<h3>Human‑Verified Threat Assessment</h3>
<p>When an anomaly is detected, it is first flagged for review and correlation. Security operators then validate the event through a <strong>role‑based‑access‑controlled (RBAC)</strong> API before escalation. This human verification ensures that only confirmed threats trigger alerts or workflow responses, maintaining operational continuity, and preventing unnecessary disruption.</p>
<p>Together, these capabilities create a layered detection system that learns, adapts, and validates in real time. By embedding AI directly into backup analytics, Veeam extends data protection beyond recovery, delivering early‑warning visibility into ransomware activity.</p>
<h3>Threat Center</h3>
<p>Threats are available to view under the management section in the Veeam Data Cloud UI. This contains two tabs:</p>
<ul>
<li><strong>Malware Threats</strong>: lists users whose OneDrive, Teams or SharePoint files were flagged as containing malware during a backup session.</li>
<li><strong>Ransomware Threats</strong>: lists resource where anomalous encryption activity was detected.</li>
</ul>



<figure class="wp-block-image size-full"><img fetchpriority="high" decoding="async" width="873" height="411" src="https://img.veeam.com/blog/wp-content/uploads/2026/01/18114936/Malware_Threats_Veeam_Ransomware_Detection-Service_Picture1.png" alt="Malware Threats Veeam Ransomware Detection Service" class="wp-image-212240" srcset="https://img.veeam.com/blog/wp-content/uploads/2026/01/18114936/Malware_Threats_Veeam_Ransomware_Detection-Service_Picture1.png 873w, https://img.veeam.com/blog/wp-content/uploads/2026/01/18114936/Malware_Threats_Veeam_Ransomware_Detection-Service_Picture1-250x118.png 250w, https://img.veeam.com/blog/wp-content/uploads/2026/01/18114936/Malware_Threats_Veeam_Ransomware_Detection-Service_Picture1-700x330.png 700w, https://img.veeam.com/blog/wp-content/uploads/2026/01/18114936/Malware_Threats_Veeam_Ransomware_Detection-Service_Picture1-768x362.png 768w, https://img.veeam.com/blog/wp-content/uploads/2026/01/18114936/Malware_Threats_Veeam_Ransomware_Detection-Service_Picture1-120x56.png 120w" sizes="(max-width: 873px) 100vw, 873px" /></figure>



<h3>Investigating a Ransomware Threat</h3>
<p>In Veeam Data Cloud, you can click the Ransomware Threats tab to see detections based on anomalous backup behavior. To investigate, click any row in the Ransomware Threats tab, or click the 3 button action menu and select View Details. Ransomware detections are scoped at the site or resource level. Details include the Entity Name, Resource Type, Number of Impacted Objects, and Date of Occurrence.</p>



<figure class="wp-block-image size-full"><img decoding="async" width="892" height="613" src="https://img.veeam.com/blog/wp-content/uploads/2026/01/18115309/Ransomware_Threats_Veeam_Ransomware_Detection-Service_Picture1.png" alt="Ransomware Threats Veeam Ransomware Detection Service" class="wp-image-212243" srcset="https://img.veeam.com/blog/wp-content/uploads/2026/01/18115309/Ransomware_Threats_Veeam_Ransomware_Detection-Service_Picture1.png 892w, https://img.veeam.com/blog/wp-content/uploads/2026/01/18115309/Ransomware_Threats_Veeam_Ransomware_Detection-Service_Picture1-250x172.png 250w, https://img.veeam.com/blog/wp-content/uploads/2026/01/18115309/Ransomware_Threats_Veeam_Ransomware_Detection-Service_Picture1-700x481.png 700w, https://img.veeam.com/blog/wp-content/uploads/2026/01/18115309/Ransomware_Threats_Veeam_Ransomware_Detection-Service_Picture1-768x528.png 768w, https://img.veeam.com/blog/wp-content/uploads/2026/01/18115309/Ransomware_Threats_Veeam_Ransomware_Detection-Service_Picture1-120x82.png 120w" sizes="(max-width: 892px) 100vw, 892px" /></figure>



<h3>Investigating a Malware Threat</h3>
<p>Malware Threats are provided by Microsoft and scoped at the site or resource level. You are provided with similar details to the ransomware threats, including Entity Name, Resource Type, Files Flagged as Malware, and Date of Occurrence.</p>



<figure class="wp-block-image size-full"><img decoding="async" width="944" height="701" src="https://img.veeam.com/blog/wp-content/uploads/2026/01/18115822/Malware_Threats_Veeam_Ransomware_Detection-Service_Picture2.png" alt="Malware Threats Veeam Ransomware Detection Service" class="wp-image-212246" srcset="https://img.veeam.com/blog/wp-content/uploads/2026/01/18115822/Malware_Threats_Veeam_Ransomware_Detection-Service_Picture2.png 944w, https://img.veeam.com/blog/wp-content/uploads/2026/01/18115822/Malware_Threats_Veeam_Ransomware_Detection-Service_Picture2-250x186.png 250w, https://img.veeam.com/blog/wp-content/uploads/2026/01/18115822/Malware_Threats_Veeam_Ransomware_Detection-Service_Picture2-700x520.png 700w, https://img.veeam.com/blog/wp-content/uploads/2026/01/18115822/Malware_Threats_Veeam_Ransomware_Detection-Service_Picture2-768x570.png 768w, https://img.veeam.com/blog/wp-content/uploads/2026/01/18115822/Malware_Threats_Veeam_Ransomware_Detection-Service_Picture2-120x89.png 120w" sizes="(max-width: 944px) 100vw, 944px" /></figure>



<h3>What Does Veeam Monitor?</h3>
<p>Veeam’s <strong>Random Cut Forest (RCF)</strong> models analyze signals including, but not limited to:</p>
<ul>
<li><strong>File entropy:</strong> the randomness or disorder within file content, which increases significantly during encryption.</li>
<li><strong>File change rates:</strong> unusual spikes or steady deviations in the number or frequency of file modifications.</li>
<li><strong>Known malicious extensions: </strong>abnormal file‑type patterns or renamed extensions commonly associated with ransomware.</li>
</ul>
<p>These signals collectively form a statistical fingerprint of each backup over time. When the observed metrics deviate from historical baselines, the model flags a potential anomaly.</p>
<h3>How Are Anomalies Flagged?</h3>
<p>The RCF models evaluate each backup incrementally, comparing new observations against previous patterns. When a backup shows statistically significant deviation, whether a rapid surge in entropy or a subtle, persistent drift, the system generates an alert. Each alert is automatically categorized by severity and context, ensuring that legitimate system changes (such as normal patch deployments or large file uploads) are not mistaken for ransomware indicators.</p>
<h3>How Is Data Protected During Analysis?</h3>
<p>All analysis occurs <strong>within Veeam’s secure infrastructure perimeter</strong>. The models operate exclusively on <strong>derived statistics</strong> rather than actual customer data, maintaining compliance with privacy regulations and respecting data‑residency boundaries. This approach ensures that ransomware detection never compromises the confidentiality of the information being protected.</p>
<h2>Key Benefits for CIOs and CISOs</h2>



<figure class="wp-block-table is-style-stripes"><table class="has-fixed-layout"><tbody><tr><td><strong>Personalized Threat Detection</strong></td><td><br>Each protected object has dedicated ransomware detection models that continuously learn from object-specific data access patterns. This granular, tailored approach catches anomalies that less-granular models would miss.<br><br></td></tr><tr><td><strong>Privacy-Preserving Architecture</strong></td><td><br>Anomaly detection operates solely on derived statistics (file counts, entropy scores). File content stays within the backup system and never enters the ML model.<br><br></td></tr><tr><td><strong>Comprehensive Coverage</strong></td><td><br>Detects multiple strains of ransomware attacks (e.g. fast “blitz” attacks and slow-moving “stealth” attacks).<br><br></td></tr><tr><td><strong>Real-time Unsupervised Learning</strong></td><td><br>Unsupervised learning incrementally adapts to your environment in real-time. No need for manual configuration or re-train models from scratch.<br><br></td></tr></tbody></table></figure>



<h2>Real‑World&nbsp;Use&nbsp;Cases</h2>
<p>AI‑driven ransomware detection is already helping organizations identify and contain threats before they cause damage. The following examples illustrate how Veeam’s&nbsp;Ransomware&nbsp;Detection&nbsp;Service delivers measurable security and operational value.</p>
<h3>Accelerated&nbsp;Detection&nbsp;of&nbsp;Modern&nbsp;Ransomware&nbsp;Threats</h3>
<p>Traditional security tools often detect ransomware only after encryption is complete. Veeam’s&nbsp;machine&nbsp;learning&nbsp;models provide early visibility by identifying encrypted files inside backups before attackers spread across systems or environments. This allows organizations to isolate affected data sets and begin recovery immediately, reducing downtime and preventing secondary compromise.</p>
<h3>Compliance&nbsp;and&nbsp;Audit&nbsp;Support</h3>
<p>Every anomaly detected by the system is documented automatically, creating a verifiable audit trail of detection events. These reports simplify compliance with regulatory requirements such as&nbsp;GDPR,&nbsp;HIPAA,&nbsp;and&nbsp;SOX&nbsp;by showing proactive threat detection and validated response steps. Security teams can export these reports directly for audits or internal risk assessments, improving transparency and accountability.</p>
<h3>Strategic&nbsp;Impact</h3>
<p>By integrating detection directly into backup workflows, organizations gain continuous ransomware surveillance without adding manual overhead. The models learn and adapt automatically, while human‑verified alerts ensure only confirmed threats require action. This combination of automation and oversight transforms backup data into a live security layer. It helps CIOs and CISOs close the visibility gap between prevention and recovery.</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<p>Ransomware is relentless, and recovery alone is no longer enough. In 2025, attackers move quietly, encrypting data over time and targeting backup environments directly. Detection must now happen inside the data protection layer itself.</p>
<h3><strong>Veeam’s Ransomware Detection Service</strong> Provides That Visibility.</h3>
<p>Built on efficient, patent‑pending technology, it analyzes every file that is backed up, without sampling or shortcuts. Using the <strong>Random Cut Forest algorithm</strong> and <strong>dual attack profiles</strong>, it recognizes both fast and stealth encryption patterns, adapting automatically as new data arrives.</p>
<p>This approach delivers <strong>granular, personalized protection</strong> for each user and workload, combined with privacy‑preserving analysis and human‑verified alerts. The result is intelligence that learns continuously, detects threats early, and strengthens resilience before recovery is required.</p>
<p>With Veeam, organizations gain more than backup. They gain a proactive defense that sees ransomware as it happens. <span data-teams="true"><a href="https://www.veeam.com/resources/wp-ransomware-detection-service.html" data-wpel-link="internal" target="_blank" rel="follow"><strong><u>Read this white paper</u></strong></a> to learn more about Veeam’s advanced threat detection capabilities.</span></p>
<p><strong>Explore how Veeam’s AI‑driven protection can help your business detect, defend, and recover faster.</strong></p>



<div class="wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex">
<div class="wp-block-button"><a class="wp-block-button__link wp-element-button" href="https://www.veeam.com/products/veeam-data-cloud.html" data-wpel-link="internal" target="_blank" rel="follow">Learn&nbsp;more&nbsp;about&nbsp;Veeam&nbsp;Data Cloud</a></div>
</div>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h2>FAQs</h2>
<p><strong>1. What is Veeam’s Ransomware Detection Service and how does it work?</strong></p>
<p>Veeam’s Ransomware Detection Service is an AI‑powered capability that analyzes backup  data to identify signs of ransomware encryption before damage spreads.</p>
<p>It uses the <strong>Random Cut Forest machine learning algorithm</strong> to spot anomalies in signals such as file entropy and modification patterns.</p>
<p>Dual attack profiles detect both rapid and slow encryption attempts, and human review verifies findings for accuracy before alerts are escalated.</p>
<p><strong>2. Why does ransomware detection require machine learning in 2025?</strong></p>
<p>Modern ransomware is stealthier than ever, often encrypting data gradually to bypass  traditional alerting based on resource spikes.</p>
<p>Machine learning algorithms like Random Cut Forest learn normal backup behavior and  detect subtle deviations that signal malicious activity.</p>
<p>According to the <em>Verizon DBIR 2025 Report</em>, ransomware accounts for nearly one‑third of data encryption breaches, making AI‑based detection essential for early intervention.</p>
<p><strong>3. How does Veeam protect data privacy while using AI for ransomware detection?</strong></p>
<p>The service analyzes <strong>derived statistics only, </strong>such as entropy scores and file change rates, never the actual backup content.</p>
<p>All processing takes place within Veeam’s secure infrastructure perimeter, maintaining data residency and compliance with privacy regulations.</p>
<p>This privacy‑preserving architecture ensures ransomware detection adds security without compromising confidentiality or performance.</p>
<p>The post <a href="https://www.veeam.com/blog/veeam-ransomware-detection-service.html">Veeam Ransomware Detection Service: AI That Proactively Detects Attacks</a> appeared first on <a href="https://www.veeam.com/blog">Veeam Software Official Blog</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>7 Reasons to Move to Veeam Data Cloud for Microsoft 365</title>
		<link>https://www.veeam.com/blog/move-to-veeam-data-cloud-microsoft-365.html</link>
		
		<dc:creator><![CDATA[Ian Findling]]></dc:creator>
		<pubDate>Mon, 06 Apr 2026 13:24:33 +0000</pubDate>
				<category><![CDATA[Business]]></category>
		<category><![CDATA[Cloud]]></category>
		<category><![CDATA[M365]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[Microsoft 365]]></category>
		<category><![CDATA[SaaS]]></category>
		<category><![CDATA[Solutions for Enterprise]]></category>
		<guid isPermaLink="false">https://www.veeam.com/blog?p=212334</guid>

					<description><![CDATA[<p>If you&#8217;re running Veeam Backup for Microsoft 365 today, you&#8217;ve already made the most important decision in SaaS protection: you built independent backups because you know <a title="Microsoft 365 Shared Responsibility Model" href="https://www.veeam.com/blog/office365-shared-responsibility-model.html" data-wpel-link="internal" target="_blank" rel="follow">&#8220;cloud&#8221; doesn&#8217;t automatically mean &#8220;recoverable&#8221;</a>. What&#8217;s changed is the pressure on recovery itself. As Microsoft 365 environments expand and identity-driven incidents demand faster response at larger scale, the day-to-day overhead of self-managed backup grows alongside the consequences of falling behind.</p>
<p>Veeam Data Cloud for Microsoft 365 keeps the core principles you rely on, including independent copies, retention control, and granular recovery, while shifting the infrastructure, storage, and ongoing maintenance to a managed service run by Veeam. The result is less time babysitting backup and more confidence that recovery, both operational and disaster-grade, will hold up when the incident is bigger than a single mailbox.</p>
<h2 class="wp-block-heading">Key Takeaways</h2>
<p>Move from self-managed backup software to a managed service that bundles software, backup infrastructure, and storage into one operating model.Strengthen disaster-recovery readiness with bulk restore capabilities designed for Microsoft 365 scale.Reduce cost surprises and planning cycles with an all-inclusive, per-user pricing model that includes unlimited backup storage.Protect collaboration data and identity together by pairing Microsoft 365 protection with Veeam Data Cloud for Microsoft Entra ID.</p>
<h2 class="wp-block-heading">Why Recovery Demands More Than It Used To</h2>
<p>The specifics of the threat landscape still matter because they shape what &#8220;recovery-ready&#8221; means for your environment today. Identity has become the dominant attack surface. Microsoft documents <a title="Overlooked Risk in Your Microsoft 365 Defense" href="https://www.veeam.com/blog/microsoft-365-identity-risk-entra-id-backup-protection.html" data-wpel-link="internal" target="_blank" rel="follow">600 million identity-based attacks daily</a>, with password attacks up 75% year over year. CrowdStrike found 79% of detections in 2024 were malware-free, up from 40% in 2019. And IBM research shows credential breaches can take 246 to 292 days to resolve, in part because separating legitimate access from compromised access across interconnected systems often means rebuilding trust at a foundational level.</p>
<p>Restoring a file is straightforward. Restoring trust across users, permissions, and identity configurations under operational pressure is not, and it requires the ability to recover content and identity together at speed.</p>
<h2 class="wp-block-heading">7 Reasons to Move from Veeam Backup for Microsoft 365 to Veeam Data Cloud for Microsoft 365</h2>
<h3 class="wp-block-heading">1. Protect Microsoft 365 and Microsoft Entra ID as One Recovery Surface</h3>
<p>Because Microsoft 365 data and identity are connected, a compromised identity layer makes content recovery harder even when your backups are intact. Veeam Data Cloud for Microsoft 365 <a href="https://www.veeam.com/blog/entra-id-backup-solutions.html" title="Entra ID Backup Solutions" data-wpel-link="internal" target="_blank" rel="follow">brings Microsoft 365 data and Microsoft Entra ID protection together</a> under a consistent operating model, so teams can recover identities and the data they govern without switching tools.</p>
<p>The backup and recovery capabilities you rely on for Exchange, SharePoint, OneDrive for Business, and Teams now extend to Entra ID. That includes object and attribute coverage for users, groups, applications, and sign-in and audit logs, with accelerated change detection and granular restore. Additional Entra ID users beyond your Microsoft 365 user count are included at no extra cost within the 3X fair use policy.</p>
<h3 class="wp-block-heading">2. Upgrade Recovery Readiness for Large Incidents</h3>
<p>Most teams feel confident restoring a mailbox or a handful of files. The real test is the large incident: ransomware, destructive automation, a tenant-wide mistake, or an identity-driven event that forces recovery across many users and workloads simultaneously. Traditional backup approaches often hit limits well before that point, as bandwidth constraints, Microsoft 365 throttling, and service-side bottlenecks that get worse as environments grow.</p>
<p>Veeam Data Cloud is built for these scenarios. It <a title="Veeam Powered with Microsoft 365" href="https://www.veeam.com/blog/veeam-microsoft-backup-storage.html" data-wpel-link="internal" target="_blank" rel="follow">integrates with Microsoft 365 Backup Storage</a> to enable backup and bulk restore with throughput designed for disaster recovery at Microsoft 365 scale in one solution, rather than leaving teams to cobble together point restores under pressure. If you&#8217;ve been managing backup proxies and storage scaling to keep up with tenant growth, this is a meaningful shift. The throughput improvements are handled at the service infrastructure level, so you benefit from them without re-engineering your backup architecture or managing additional proxies.</p>
<h3 class="wp-block-heading">3. Replace Self-Managed Complexity with a Single Service</h3>
<p>Veeam Data Cloud for Microsoft 365 shifts you from managing a backup environment to managing backup outcomes. The service <a title="What is Veeam Data Cloud?" href="https://www.veeam.com/blog/backup-service-microsoft-365-azure.html" data-wpel-link="internal" target="_blank" rel="follow">bundles the backup software, backup infrastructure, and storage into one experience</a>, and Veeam handles updates, patching, and scaling. The capabilities you&#8217;ve built expertise around — policy configuration, retention controls, and granular restore options — carry forward into the managed service.</p>
<h3 class="wp-block-heading">4. Make Cost and Capacity Planning Predictable</h3>
<p>The <a title="8 Reasons Veeam Data Cloud is the #1 Choice" href="https://www.veeam.com/blog/veeam-microsoft-365-saas-backup-top-reasons.html" data-wpel-link="internal" target="_blank" rel="follow">total cost of self-managed Microsoft 365 backup</a> is easy to underestimate because it&#8217;s spread across infrastructure, storage, and admin time. Storage growth adds a second layer of unpredictability, turning capacity planning into a recurring project. In an IDC EMEA cloud survey (2024), 38% of organizations said SaaS data such as Microsoft 365 is their fastest or second-fastest growing business data, which explains why storage planning rarely stays &#8220;done&#8221; for long.</p>
<p>Veeam Data Cloud for Microsoft 365 replaces that cost structure with a fixed, all-inclusive per-user price that includes unlimited backup storage, with no separate storage charges and no paid add-ons for advanced features. Costs grow linearly with the users you protect rather than unpredictably with data volume.</p>
<p>This model also helps teams avoid a common trap with consumption-based SaaS backup pricing, where per-user thresholds and paid add-ons reintroduce the very unpredictability a service model is supposed to eliminate.</p>
<h3 class="wp-block-heading">5. Stay Current Without Turning Upgrades into Projects</h3>
<p>In a self-managed model, new capabilities arrive with planning, validation, maintenance windows, and the ongoing risk that updates fall behind as other work takes priority. Proxy server patching, version compatibility checks across backup components, and coordinating maintenance windows with production teams are real costs that compound over time.</p>
<p>With Veeam Data Cloud for Microsoft 365, <a title="8 Veeam Data Cloud for Microsoft 365 Best Practices" href="https://www.veeam.com/blog/veeam-data-cloud-365-best-practice.html" data-wpel-link="internal" target="_blank" rel="follow">updates are delivered automatically</a> as part of the service, so your environment stays current and gains new capabilities without ongoing upgrade work. Beyond convenience, new capabilities like disaster recovery enhancements, threat detection, and AI-powered features reach Veeam Data Cloud first. Your team gets access to the latest innovations ahead of the self-managed release cycle, without scheduling a maintenance window to adopt them.</p>
<h3 class="wp-block-heading">6. Meet Sovereignty and Compliance Requirements with Ease</h3>
<p>Veeam Data Cloud is certified to ISO/IEC 27001 and ships with security baked in: 256-bit encryption for all data in-transit and at-rest, multi-factor authentication (MFA), role-based access control (RBAC), and service-level immutability.</p>
<p>For organizations operating under frameworks like <a title="Data Sovereignty in SaaS" href="https://www.veeam.com/blog/saas-data-sovereignty-microsoft-365.html" data-wpel-link="internal" target="_blank" rel="follow">GDPR, DORA, HIPAA, or regional data residency rules</a>, where backup data resides is a requirement rather than a preference. Veeam Data Cloud for Microsoft 365 supports data sovereignty by allowing customers to store backup data across a wide range of Microsoft Azure regions globally. Beyond data location, the service supports compliance operations with policy-based retention, advanced search for eDiscovery workflows, and exportable audit trails to document how controls are applied.</p>
<h3 class="wp-block-heading">7. Keep Control of Your Data with an Exit Strategy That Stays Yours</h3>
<p><a title="Smart Strategies for Handling Vendor" href="https://www.veeam.com/blog/vendor-lock-in-vs-lock-out-data-portability-insights.html" data-wpel-link="internal" target="_blank" rel="follow">Vendor lock-in creates risk</a>, and moving to a managed service raises reasonable questions about what happens if your strategy changes. Veeam&#8217;s position is that your data remains yours, and the tooling reflects that: Veeam provides free search and recovery tools that allow customers to restore their data even after ending a Veeam Data Cloud subscription, so adopting the service doesn&#8217;t require perpetual payments just to access your own backups.</p>
<p>Many providers store backups in proprietary environments that become inaccessible when a subscription lapses. Veeam is designed to protect your options, so your backup data remains accessible and recoverable regardless of where your strategy goes next.</p>
<h2 class="wp-block-heading">What You Risk by Waiting</h2>
<p>If you stay on a self-managed model, you may still be protected, but you&#8217;re also choosing to keep the operational weight that comes with it. Over time, the weight tends to concentrate in a few specific areas. Recovery readiness drifts as environments grow and restore testing competes with day-to-day work. Storage and capacity planning turn into recurring procurement cycles. And when the large incident arrives, the gap between “we have backups” and “we can actually recover at scale” tends to be wider than anyone expected, especially when identity and Microsoft 365 protection are still siloed.</p>
<p>The capabilities you&#8217;ve built with Veeam Backup for Microsoft 365 are a strong foundation. Veeam Data Cloud for Microsoft 365 carries that foundation forward while removing the operational overhead that grows alongside your environment.</p>
<p><a title="Request a Demo" href="https://www.veeam.com/backup-microsoft-office-365/vdc-demo.html?" data-wpel-link="internal" target="_blank" rel="follow">Request a demo of Veeam Data Cloud today</a>.  </p>
<p>The post <a href="https://www.veeam.com/blog/move-to-veeam-data-cloud-microsoft-365.html">7 Reasons to Move to Veeam Data Cloud for Microsoft 365</a> appeared first on <a href="https://www.veeam.com/blog">Veeam Software Official Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>If you&#8217;re running Veeam Backup <em>for Microsoft 365</em> today, you&#8217;ve already made the most important decision in SaaS protection: you built independent backups because you know <a title="Microsoft 365 Shared Responsibility Model" href="https://www.veeam.com/blog/office365-shared-responsibility-model.html" data-wpel-link="internal" target="_blank" rel="follow">&#8220;cloud&#8221; doesn&#8217;t automatically mean &#8220;recoverable&#8221;</a>. What&#8217;s changed is the pressure on recovery itself. As Microsoft 365 environments expand and identity-driven incidents demand faster response at larger scale, the day-to-day overhead of self-managed backup grows alongside the consequences of falling behind.</p>



<p>Veeam Data Cloud <em>for Microsoft 365</em> keeps the core principles you rely on, including independent copies, retention control, and granular recovery, while shifting the infrastructure, storage, and ongoing maintenance to a managed service run by Veeam. The result is less time babysitting backup and more confidence that recovery, both operational and disaster-grade, will hold up when the incident is bigger than a single mailbox.</p>



<h2 class="wp-block-heading">Key Takeaways</h2>



<ul class="wp-block-list">
<li>Move from self-managed backup software to a managed service that bundles software, backup infrastructure, and storage into one operating model.</li>



<li>Strengthen disaster-recovery readiness with bulk restore capabilities designed for Microsoft 365 scale.</li>



<li>Reduce cost surprises and planning cycles with an all-inclusive, per-user pricing model that includes unlimited backup storage.</li>



<li>Protect collaboration data and identity together by pairing Microsoft 365 protection with Veeam Data Cloud <em>for Microsoft Entra ID</em>.</li>
</ul>



<h2 class="wp-block-heading">Why Recovery Demands More Than It Used To</h2>



<p>The specifics of the threat landscape still matter because they shape what &#8220;recovery-ready&#8221; means for your environment today. Identity has become the dominant attack surface. Microsoft documents <a title="Overlooked Risk in Your Microsoft 365 Defense" href="https://www.veeam.com/blog/microsoft-365-identity-risk-entra-id-backup-protection.html" data-wpel-link="internal" target="_blank" rel="follow">600 million identity-based attacks daily</a>, with password attacks up 75% year over year. CrowdStrike found 79% of detections in 2024 were malware-free, up from 40% in 2019. And IBM research shows credential breaches can take 246 to 292 days to resolve, in part because separating legitimate access from compromised access across interconnected systems often means rebuilding trust at a foundational level.</p>



<p>Restoring a file is straightforward. Restoring trust across users, permissions, and identity configurations under operational pressure is not, and it requires the ability to recover content and identity together at speed.</p>



<h2 class="wp-block-heading">7 Reasons to Move from Veeam Backup <em>for Microsoft 365</em> to Veeam Data Cloud <em>for Microsoft 365</em></h2>



<h3 class="wp-block-heading">1. Protect Microsoft 365 and Microsoft Entra ID as One Recovery Surface</h3>



<p>Because Microsoft 365 data and identity are connected, a compromised identity layer makes content recovery harder even when your backups are intact. Veeam Data Cloud <em>for Microsoft 365</em> <a href="https://www.veeam.com/blog/entra-id-backup-solutions.html" title="Entra ID Backup Solutions" data-wpel-link="internal" target="_blank" rel="follow">brings Microsoft 365 data and Microsoft Entra ID protection together</a> under a consistent operating model, so teams can recover identities and the data they govern without switching tools.</p>



<p>The backup and recovery capabilities you rely on for Exchange, SharePoint, OneDrive for Business, and Teams now extend to Entra ID. That includes object and attribute coverage for users, groups, applications, and sign-in and audit logs, with accelerated change detection and granular restore. Additional Entra ID users beyond your Microsoft 365 user count are included at no extra cost within the 3X fair use policy.</p>



<h3 class="wp-block-heading">2. Upgrade Recovery Readiness for Large Incidents</h3>



<p>Most teams feel confident restoring a mailbox or a handful of files. The real test is the large incident: ransomware, destructive automation, a tenant-wide mistake, or an identity-driven event that forces recovery across many users and workloads simultaneously. Traditional backup approaches often hit limits well before that point, as bandwidth constraints, Microsoft 365 throttling, and service-side bottlenecks that get worse as environments grow.</p>



<p>Veeam Data Cloud is built for these scenarios. It <a title="Veeam Powered with Microsoft 365" href="https://www.veeam.com/blog/veeam-microsoft-backup-storage.html" data-wpel-link="internal" target="_blank" rel="follow">integrates with Microsoft 365 Backup Storage</a> to enable backup and bulk restore with throughput designed for disaster recovery at Microsoft 365 scale in one solution, rather than leaving teams to cobble together point restores under pressure. If you&#8217;ve been managing backup proxies and storage scaling to keep up with tenant growth, this is a meaningful shift. The throughput improvements are handled at the service infrastructure level, so you benefit from them without re-engineering your backup architecture or managing additional proxies.</p>



<h3 class="wp-block-heading">3. Replace Self-Managed Complexity with a Single Service</h3>



<p>Veeam Data Cloud <em>for Microsoft 365</em> shifts you from managing a backup environment to managing backup outcomes. The service <a title="What is Veeam Data Cloud?" href="https://www.veeam.com/blog/backup-service-microsoft-365-azure.html" data-wpel-link="internal" target="_blank" rel="follow">bundles the backup software, backup infrastructure, and storage into one experience</a>, and Veeam handles updates, patching, and scaling. The capabilities you&#8217;ve built expertise around — policy configuration, retention controls, and granular restore options — carry forward into the managed service.</p>



<h3 class="wp-block-heading">4. Make Cost and Capacity Planning Predictable</h3>



<p>The <a title="8 Reasons Veeam Data Cloud is the #1 Choice" href="https://www.veeam.com/blog/veeam-microsoft-365-saas-backup-top-reasons.html" data-wpel-link="internal" target="_blank" rel="follow">total cost of self-managed Microsoft 365 backup</a> is easy to underestimate because it&#8217;s spread across infrastructure, storage, and admin time. Storage growth adds a second layer of unpredictability, turning capacity planning into a recurring project. In an IDC EMEA cloud survey (2024), 38% of organizations said SaaS data such as Microsoft 365 is their fastest or second-fastest growing business data, which explains why storage planning rarely stays &#8220;done&#8221; for long.</p>



<p>Veeam Data Cloud <em>for Microsoft 365</em> replaces that cost structure with a fixed, all-inclusive per-user price that includes unlimited backup storage, with no separate storage charges and no paid add-ons for advanced features. Costs grow linearly with the users you protect rather than unpredictably with data volume.</p>
<p>This model also helps teams avoid a common trap with consumption-based SaaS backup pricing, where per-user thresholds and paid add-ons reintroduce the very unpredictability a service model is supposed to eliminate.</p>



<h3 class="wp-block-heading">5. Stay Current Without Turning Upgrades into Projects</h3>



<p>In a self-managed model, new capabilities arrive with planning, validation, maintenance windows, and the ongoing risk that updates fall behind as other work takes priority. Proxy server patching, version compatibility checks across backup components, and coordinating maintenance windows with production teams are real costs that compound over time.</p>



<p>With Veeam Data Cloud <em>for Microsoft 365</em>, <a title="8 Veeam Data Cloud for Microsoft 365 Best Practices" href="https://www.veeam.com/blog/veeam-data-cloud-365-best-practice.html" data-wpel-link="internal" target="_blank" rel="follow">updates are delivered automatically</a> as part of the service, so your environment stays current and gains new capabilities without ongoing upgrade work. Beyond convenience, new capabilities like disaster recovery enhancements, threat detection, and AI-powered features reach Veeam Data Cloud first. Your team gets access to the latest innovations ahead of the self-managed release cycle, without scheduling a maintenance window to adopt them.</p>



<h3 class="wp-block-heading">6. Meet Sovereignty and Compliance Requirements with Ease</h3>



<p>Veeam Data Cloud is certified to ISO/IEC 27001 and ships with security baked in: 256-bit encryption for all data in-transit and at-rest, multi-factor authentication (MFA), role-based access control (RBAC), and service-level immutability.</p>



<p>For organizations operating under frameworks like <a title="Data Sovereignty in SaaS" href="https://www.veeam.com/blog/saas-data-sovereignty-microsoft-365.html" data-wpel-link="internal" target="_blank" rel="follow">GDPR, DORA, HIPAA, or regional data residency rules</a>, where backup data resides is a requirement rather than a preference. Veeam Data Cloud <em>for Microsoft 365</em> supports data sovereignty by allowing customers to store backup data across a wide range of Microsoft Azure regions globally. Beyond data location, the service supports compliance operations with policy-based retention, advanced search for eDiscovery workflows, and exportable audit trails to document how controls are applied.</p>



<h3 class="wp-block-heading">7. Keep Control of Your Data with an Exit Strategy That Stays Yours</h3>



<p><a title="Smart Strategies for Handling Vendor" href="https://www.veeam.com/blog/vendor-lock-in-vs-lock-out-data-portability-insights.html" data-wpel-link="internal" target="_blank" rel="follow">Vendor lock-in creates risk</a>, and moving to a managed service raises reasonable questions about what happens if your strategy changes. Veeam&#8217;s position is that your data remains yours, and the tooling reflects that: Veeam provides free search and recovery tools that allow customers to restore their data even after ending a Veeam Data Cloud subscription, so adopting the service doesn&#8217;t require perpetual payments just to access your own backups.</p>



<p>Many providers store backups in proprietary environments that become inaccessible when a subscription lapses. Veeam is designed to protect your options, so your backup data remains accessible and recoverable regardless of where your strategy goes next.</p>



<h2 class="wp-block-heading">What You Risk by Waiting</h2>



<p>If you stay on a self-managed model, you may still be protected, but you&#8217;re also choosing to keep the operational weight that comes with it. Over time, the weight tends to concentrate in a few specific areas. Recovery readiness drifts as environments grow and restore testing competes with day-to-day work. Storage and capacity planning turn into recurring procurement cycles. And when the large incident arrives, the gap between “we have backups” and “we can actually recover at scale” tends to be wider than anyone expected, especially when identity and Microsoft 365 protection are still siloed.</p>



<p>The capabilities you&#8217;ve built with Veeam Backup <em>for Microsoft 365</em> are a strong foundation. Veeam Data Cloud <em>for Microsoft 365</em> carries that foundation forward while removing the operational overhead that grows alongside your environment.</p>
<p><a title="Request a Demo" href="https://www.veeam.com/backup-microsoft-office-365/vdc-demo.html?" data-wpel-link="internal" target="_blank" rel="follow">Request a demo of Veeam Data Cloud today</a>.  </p>
<p>The post <a href="https://www.veeam.com/blog/move-to-veeam-data-cloud-microsoft-365.html">7 Reasons to Move to Veeam Data Cloud for Microsoft 365</a> appeared first on <a href="https://www.veeam.com/blog">Veeam Software Official Blog</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Customers spoke, and Veeam was named a Gartner® Peer Insights™ Customers’ Choice for Backup and Data Protection Platforms</title>
		<link>https://www.veeam.com/blog/veeam-gartner-peer-insights-customers-choice-backup-data-protection.html</link>
		
		<dc:creator><![CDATA[Tony Colon]]></dc:creator>
		<pubDate>Fri, 03 Apr 2026 18:38:13 +0000</pubDate>
				<category><![CDATA[Business]]></category>
		<category><![CDATA[Data Protection & Recovery]]></category>
		<guid isPermaLink="false">https://www.veeam.com/blog?p=212161</guid>

					<description><![CDATA[<p>When you’re choosing a backup and data protection platform, you’re not just buying software. You’re choosing peace of mind knowing your company’s data is protected, and you’re setting the standard for what happens next: How confidently your team responds when an incident hits, how quickly you can restore, and how smoothly you keep moving afterward.</p>
<p>The post <a href="https://www.veeam.com/blog/veeam-gartner-peer-insights-customers-choice-backup-data-protection.html">Customers spoke, and Veeam was named a Gartner® Peer Insights™ Customers’ Choice for Backup and Data Protection Platforms</a> appeared first on <a href="https://www.veeam.com/blog">Veeam Software Official Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>When you’re choosing a backup and data protection platform, you’re not just buying software. You’re choosing peace of mind knowing your company’s data is protected, and you’re setting the standard for what happens next: How confidently your team responds when an incident hits, how quickly you can restore, and how smoothly you keep moving afterward.</p>
<p>We’re proud to share that Veeam has been recognized as a Customers&#8217; Choice in the 2026 Gartner Peer Insights<img src="https://s.w.org/images/core/emoji/17.0.2/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" /> Voice of the Customer for Backup and Data Protection Platforms, based on feedback from the individual end users based on their own experiences and who rely on Veeam every day. That matters to us because it reflects experience, not promises, and it highlights what customers value most when it’s time to recover.<br><br></p>



<figure class="wp-block-image size-full is-resized"><img decoding="async" width="477" height="400" src="https://img.veeam.com/blog/wp-content/uploads/2026/03/17090341/Gartner-Peer-Insights-Customers-Choice-2026.jpg" alt="Gartner Peer Insights Customers Choice 2026" class="wp-image-212228" style="width:300px" srcset="https://img.veeam.com/blog/wp-content/uploads/2026/03/17090341/Gartner-Peer-Insights-Customers-Choice-2026.jpg 477w, https://img.veeam.com/blog/wp-content/uploads/2026/03/17090341/Gartner-Peer-Insights-Customers-Choice-2026-250x210.jpg 250w, https://img.veeam.com/blog/wp-content/uploads/2026/03/17090341/Gartner-Peer-Insights-Customers-Choice-2026-120x101.jpg 120w" sizes="(max-width: 477px) 100vw, 477px" /></figure>



<h2>What Your Reviews Say About the Veeam Experience</h2>
<p>We believe the Voice of the Customer recognition is about more than having a strong product. In our opinion, it signals that customers are consistently having a strong experience with Veeam, both in what the platform can do and how it performs in real environments. That’s what makes this feedback so meaningful.</p>
<p>124 verified reviewers gave Veeam an overall 4.8 out of 5 and a 98% willingness to recommend as on 31st of March 2026. When customers rated specific parts of the experience, the results were just as clear: 4.8/5 for Product Capabilities by 123 verified users, 4.7/5 for Support Experience by 121 verified users, and 4.7/5 for Deployment Experience by 122 verified users. We feel the comments behind those scores fill in the why: strong capabilities, smoother implementation, and support that helps teams keep moving when time matters.</p>
<h2>What Customers’ Choice Says About Veeam</h2>
<p>We believe earning Customers’ Choice reflects a combination of strong customer experience and adoption signals across the market. Here’s what we take away from that, and how it maps to what customers tell us they value about Veeam:</p>
<ul>
<li><strong>Trust built on recoverability, not promises.</strong> Backups are table stakes. What customers care about is confident recovery across the environments they actually run, including hybrid, multicloud, and SaaS. Gartner defines backup and data protection platforms as technologies that capture point-in-time copies of enterprise data for the purpose of recovering it from multiple data loss scenarios, enhancing data protection initiatives, and expanding data insights and access capabilities.</li>
<li><strong>Consistency across industries, regions, and company sizes.</strong> We feel Voice of the Customer factors in review coverage across industry, company size, and region. That matters because the right solution has to work whether you’re a lean IT team, a global enterprise, or anywhere in between. We believe earning Customers’ Choice signals that customers around the world are having a strong experience with Veeam, not just one pocket of the market.</li>
<li><strong>A platform people would recommend.</strong> Reviews capture not only overall experience, but also Willingness to Recommend. That kind of confidence is earned through day-to-day reliability, responsive support, and a platform that keeps up as environments change.</li>
</ul>
<h2>Customers Say It Best:</h2>
<p>The most important perspective isn’t ours, it’s the people using Veeam every day.</p>
<ul>
<li>“Veeam is one of the best solutions on the market for virtual machine backups. We rely on Veeam globally to safeguard and backup our critical systems.&#8221; &#8211; <a href="https://www.gartner.com/reviews/market/backup-and-data-protection-platforms/vendor/veeam/product/veeam-data-platform/review/view/6642044?utm_source=veeam&amp;utm_medium=social&amp;utm_campaign=ReviewSnippets" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer">Manager, It Security And Risk Management</a></li>
<li>“With many years of proven use, it has consistently demonstrated high reliability, answering with stable performance over time. The solution also stays up to date with the latest features available on the market, allowing it to evolve alongside current industry trends and technological advancements.” &#8211; <a href="https://www.gartner.com/reviews/market/backup-and-data-protection-platforms/vendor/veeam/product/veeam-data-platform/review/view/6614356?utm_source=veeam&amp;utm_medium=social&amp;utm_campaign=ReviewSnippets" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer">IT Associate, Healthcare and Biotech</a></li>
<li>Veeam provides us with the peace of mind for our backup solution. Their support is wonderful and to the point. &#8211; <a href="https://www.gartner.com/reviews/market/backup-and-data-protection-platforms/vendor/veeam/product/veeam-data-platform/review/view/6269014" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer">Network Administrator, Education</a></li>
</ul>
<p>We’re grateful customers take the time to share their experiences, and we don’t take that feedback lightly. We use it to keep improving what’s working, and to get better where we need to, so Veeam continues to earn your trust in the moments that matter most.</p>
<h2>What’s Next: Keep Raising the Bar for Resilience</h2>
<p>This recognition is based on customers taking time to share detailed experiences. Those reviews help other teams evaluate solutions, set expectations, and make decisions with more confidence.</p>
<p>So, if you’ve left feedback on Gartner Peer Insights, thank you. You didn’t just help Veeam, you helped the broader community. We’ll keep doing the work that earns trust: Making protection and recovery simpler to manage, stronger against modern threats, and flexible across where your data lives.</p>
<p>If you’re a Veeam customer, <a title="Veeam Customer Advocacy | Share Your Success" href="https://www.veeam.com/resources/customer-stories/customer-advocacy.html" data-wpel-link="internal" target="_blank" rel="follow">share your story</a> about what’s working well, what you’d change, and what you want to see next. Your feedback helps shape what we build and improve.</p>
<p> </p>
<p><span style="font-size: 12pt;"><em>Gartner, Voice of the Customer for Backup and Data Protection Platforms, Peer Community Contributor, 24 March 2026</em></span></p>
<p><span style="font-size: 12pt;"><em>Gartner, Peer Insights, and Customers&#8217; Choice are trademarks of Gartner, Inc., and/or its affiliates. </em></span></p>
<p><span style="font-size: 12pt;"><em>Gartner Peer Insights content consists of the opinions of individual end users based on their own experiences, and should not be construed as statements of fact, nor do they represent the views of Gartner or its affiliates. Gartner does not endorse any vendor, product or service depicted in this content nor makes any warranties, expressed or implied, with respect to this content, about its accuracy or completeness, including any warranties of merchantability or fitness for a particular purpose.</em></span></p>


<p>The post <a href="https://www.veeam.com/blog/veeam-gartner-peer-insights-customers-choice-backup-data-protection.html">Customers spoke, and Veeam was named a Gartner® Peer Insights™ Customers’ Choice for Backup and Data Protection Platforms</a> appeared first on <a href="https://www.veeam.com/blog">Veeam Software Official Blog</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Stop Ransomware Sooner: Introducing Veeam Ransomware Detection Service</title>
		<link>https://www.veeam.com/blog/stop-ransomware-veeam-detection-service.html</link>
		
		<dc:creator><![CDATA[Karinne Bessette]]></dc:creator>
		<pubDate>Tue, 31 Mar 2026 18:47:44 +0000</pubDate>
				<category><![CDATA[Business]]></category>
		<category><![CDATA[Ransomware & Cyber Resilience]]></category>
		<guid isPermaLink="false">https://www.veeam.com/blog?p=211341</guid>

					<description><![CDATA[<p>You can’t turn on the news without hearing about a new cybersecurity, malware, or ransomware attack. These attacks are growing more frequent and smarter, leaving a devastating amount of damage to companies' profits and reputations. We no longer just talk about if an attack will happen but when and how bad. This is why Veeam is introducing advanced threat detection for ransomware and malware. In this blog, I’ll be focusing on the early ransomware detection service in Veeam Data Cloud, which aims to help organizations stop attacks sooner. At the time of this blog, the service supports Microsoft 365 workloads with more workloads to come!</p>
<p>The post <a href="https://www.veeam.com/blog/stop-ransomware-veeam-detection-service.html">Stop Ransomware Sooner: Introducing Veeam Ransomware Detection Service</a> appeared first on <a href="https://www.veeam.com/blog">Veeam Software Official Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>You can’t turn on the news without hearing about a new cybersecurity, malware, or ransomware attack. These attacks are growing more frequent and smarter, leaving a devastating amount of damage to companies&#8217; profits and reputations. We no longer just talk about if an attack will happen but when and how bad. This is why Veeam is introducing advanced threat detection for ransomware and malware. In this blog, I’ll be focusing on the early ransomware detection service in <a title="Veeam Data Cloud | Secure &amp; Scalable Backup as a Service" href="https://www.veeam.com/products/veeam-data-cloud.html" data-wpel-link="internal" target="_blank" rel="follow">Veeam Data Cloud</a>, which aims to help organizations stop attacks sooner. At the time of this blog, the service supports Microsoft 365 workloads with more workloads to come!</p>
<h2>Ransomware Threat Landscape</h2>
<p>Ransomware is a booming market for cybercriminals with a multi-tiered profit scheme. First line threat actors try every way to gain access and pivot through to your business, gathering critical data like passwords, network configurations, software, and configure backdoors to package and sell to the dark web. Additional tactics are used to exfiltrate critical business data like patents and personal data which are held and used to extort a company for money. If that was not enough, cybercriminals will take control of your infrastructure and accounts to start deploying encryption algorithms rendering your data inaccessible until you pay a fee.</p>
<p>Luckily many of these kinds of attacks leave footprints in their wake, helping companies stop these intruders sooner and mitigating potential damage.</p>
<h2>Why Scan Backups for Ransomware</h2>
<p>Ransomware is an evolving technology that has gotten more sophisticated and harder to detect since its indoctrination into the criminal ecosystem. In early days we could detect things like signatures and file extensions but as intrusion detection systems caught up, ransomware evolved. In the modern software landscape, threat actors use things like algorithms and AI to evolve beyond traditional detection methods. This is where detection services for backups come in and offer an additional layer of security. With this feature you can gain in-depth analysis of your data as it changes without putting greater strain on your production workloads and processes.</p>
<h2>Why Use Veeam Ransomware Detection Service</h2>
<p>The Veeam Ransomware Detection Service has high accuracy when detecting the largest range of ransomware attacks on the market. This technology offers four key benefits:</p>
<ul>
<li>Personalized Threat Detection: Detection models are segmented per user and resource creating an individualized profile for behavior and anomaly detection.</li>
<li>Privacy-Preserving Architecture: Data used to detect patterns like file count and entropy stay within the backup ecosystem and is never entered in Machine Learning Models.</li>
<li>Comprehensive Coverage: The Veeam Ransomware Detection Service spans a wide range of ransomware strains for both extended and rapid attacks.</li>
<li>Real-time unsupervised learning: This service adapts to Protected objects to determine and learn usage patterns as they evolve over time. These patterns act as a historical baseline which the models use to identify meaningful deviations.</li>
</ul>
<p>This kind of detection system provides the most comprehensive solution to the most complex and hardest to detect strains of ransomware, extended attacks. Extended attacks fool key metrics in modern systems that rely on signatures and threshold change detection alone. The Veeam Ransomware Service has uses advanced algorithms beyond this to detect key entropy points.</p>
<h2>How Does Veeam Ransomware Service Work?</h2>
<p>Veeam Ransomware Service is backed by the Random Cut Forest algorithm; a machine learning algorithm that&#8217;s purpose-built for detecting outliers and anomalies from data. This model works by building an individualized baseline for each data set, then using advanced algorithms to detect outliers and anomalies that occur, making for the most accurate detection on the market. When building these baselines, the service scans every file, not just samples, leaving nothing to chance.</p>
<p>There are two main types of profiles this engine is optimized for to detect extended and fast attacks. In a fast attack you might experience a high volume of change in data which Veeam Ransomware Service can detect the early stages so you can lock down and mitigate the impact. An extended attack takes time entering an environment and can be very hard to lock down based on traditional methods like file count and change threshold. In this case, Veeam Ransomware Service is able to run deeper algorithm cuts on the backup data to detect these kinds of changes before they spread to the wider business. It’s worth noting that all ransomware details are captured in a threat center alongside malware alerts for a centralized view. To see more details about the model check out this <a href="https://www.veeam.com/resources/wp-ransomware-detection-service.html" data-wpel-link="internal" target="_blank" rel="follow">whitepaper</a>.</p>
<p> </p>
<h2>Bottom Line</h2>
<p>The threats to data are evolving at an alarming rate, but having a multilayered dynamic approach to protection and detection is the best way to mitigate damage in these kinds of targeted attacks. Take steps to start protecting yourself better with the Veeam Ransomware Detection Service, the most robust ransomware detection on the market.</p>
<p>For more information on Veeam Data Cloud, please visit: <a title="Veeam Data Cloud | Secure &amp; Scalable Backup as a Service" href="https://www.veeam.com/products/veeam-data-cloud.html" data-wpel-link="internal" target="_blank" rel="follow">https://www.veeam.com/products/veeam-data-cloud.html</a></p>



<div class="wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex"></div>
<p>The post <a href="https://www.veeam.com/blog/stop-ransomware-veeam-detection-service.html">Stop Ransomware Sooner: Introducing Veeam Ransomware Detection Service</a> appeared first on <a href="https://www.veeam.com/blog">Veeam Software Official Blog</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
