SAML Authentication Against Multiple AD Forests

Microsoft Azure is more than ever one of the preferred choices when it comes to public cloud
computing. Customers and partners know that protecting the workloads in the cloud matter for
various reasons. This is underlined by the Shared Responsibility Model, which defined that from the
OS system onward or the data kept in PaaS and SaaS the customer is responsible for the data

Building a Cyber-Resilient Data Recovery Strategy

In today’s digital-first world, cybersecurity is a fundamental necessity. It’s not surprising that every
cybersecurity blog or whitepaper you read today inevitably revolves around ransomware. It’s tiresome
to hear about (we know!) but ransomware has become the biggest threat to organizations of all sizes
and targets our most critical infrastructure and industry sectors. It’s a game of cat and mouse, and
as new threats emerge, security teams must adapt to keep up. The pervasive digitization of business
operations, government functions, and personal activities has exponentially increased the volume
of sensitive data that’s stored and transmitted online. This shift has unfortunately also broadened
the attack surface for cybercriminals, which makes robust cybersecurity measures essential.

Veeam Agent for Microsoft Windows 2.0 Enterprise Deployment

This guide covers installing Veeam Agent for Microsoft Windows on many machines by deploying MSI or an installation
executable file directly. Any software deployment platform that supports MSI can be used to deploy Veeam Agent
for Microsoft Windows, this includes Active Directory Group Policies and Microsoft SCCM.

What is the Veeam WAN accelerator and how does it work?

This paper provides practical advice to help administrators, architects and IT professionals understand how they can maximize the data flow between locations in their infrastructure when using Veeam Backup & Replication WAN accelerator tools, so that they can confidently deploy their Veeam services.