top of page

Brad Linch
12 minutes ago4 min read
Veeam's Comprehensive Malware Detection: Before, During, and After a Backup
Companies are becoming more resilient against ransomware due to organizations being better prepared to respond and recover.
5 views0 comments

Brad Linch
Feb 112 min read
The Veeam Difference: Why Recovery is Your Currency
Cyber resilience is about more than just preventing attacks; it's about being prepared to recover when they inevitably occur.
74 views0 comments

Brad Linch
Mar 9, 20243 min read
Scan Cloud Workloads for Malware with Veeam
Ransomware attacks targeting cloud-based workloads and posing significant risks to organizations. Veeam helps with inline scanning backups.
283 views0 comments


Brad Linch
Feb 14, 20242 min read
Forward Critical Veeam Events to Splunk
By forwarding Veeam events to Splunk, organizations can take advantage of Splunk's robust log management and analysis features
749 views0 comments
Home: Blog2
bottom of page