Join us for an insightful webinar to see what’s new in Veeam’s most secure and intelligent platform yet. Learn how to protect smarter, detect threats faster, and recover more cleanly through expert ...
With 2026 just starting, they already face escalating risks from ransomware, insider threats, accidental mass deletions, misconfigurations, retention gaps, rising governance and compliance demands, ...
In this timely virtual event, our panel of experts will share their proven backup and recovery best practices and identity-first resilience strategies. Sign up today to get the insights you need to ...
In this energizing session, Henrik Lundqvist, Olympic Gold Medalist and NHL Goaltender, and Veeam’s SVP, Shiva Pillay will explore the striking parallels between achieving Olympic greatness and what ...
Hackers can use tools like BloodHound to visualize the shortest path to owning your domain. But that doesn't mean you can't use it to find and protect your organization's weak spots. Here's how.
PowerShell seems to have the ability to automate just about anything. Active Directory (AD) is no different. By downloading a freely available PowerShell module, an IT admin can manage every facet of ...
Pester infrastructure tests can run as standalone tests or be integrated into a broader automation workflow. But first, what's an "infrastructure test" anyway? Pester was built for unit testing. Unit ...
Azure Cognitive Services is a suite of APIs provided by Microsoft that allows mere mortals to tap the power of artificial intelligence (AI) in many different ways. Broken out in six different areas ...
APIs seem to be everywhere these days. Every popular online service has one. APIs allow developers to interact with online services without actually having to point and click their way through a UI.
Windows environment variables give system administrators access to a plethora of information about the Windows operating system. Separated into system and user-level scopes, default environment ...
SMB files are ubiquitous across Windows environments and it's easy to lose track of them. However, using PowerShell, we can quickly and easily figure out not only what file shares exist on a remote ...