The Modern Guide to OAuth

There are hundreds of articles and blog posts covering OAuth 2.0, but none of them present the modern, real-world use cases. This guide covers OAuth 2.0 from a real-world perspective and covers modern use cases of the specifications.

This guide is different than most of the others out there because it covers all of the ways that we actually use OAuth. It also covers all of the details you need to be an OAuth expert without reading all the specifications or writing your own OAuth server.

This book is based on hundreds of conversations and client implementations as well as our experience building FusionAuth, an OAuth server which has been downloaded over a million times.

View Now

Why Passkeys Improve User Security & How to Implement Them

Despite the challenges inherent in passwords, authentication has never been more important. Passkeys offer a significant advancement in digital authentication, using the principles of public key cryptography to create a desperately needed authentication alternative to traditional passwords.

Passkeys are an innovative solution to the problem of weak and vulnerable passwords. They utilize public key cryptography to provide a more secure and user-friendly authentication method. By eliminating the need for traditional passwords, passkeys reduce the risk of phishing, social engineering, and brute force attacks.

Get Whitepaper

Data Freedom Technical Webinar: Navigating Hypervisor Migration

In a landscape where businesses large and small grapple with the daunting task of workload migration, Veeam stands out as a beacon of simplicity and efficiency. This product demo is your opportunity to discover the edge Veeam can provide to its customers.

In this session, we will discuss:

  • Veeam’s Extensive Support: Dive into the vast array of hypervisor and cloud environments that Veeam seamlessly integrates with.
  • Strategic Workload Movement: Create a clear, streamlined strategy to transition your workloads with minimal complexity.
  • Leveraging Existing Tools: Learn how to effortlessly migrate workloads with Veeam’s powerful tools – many of which you may already possess.
  • Watch this product demo to see why Veeam customers always have an advantage when it comes to hypervisor migrations. Register now to take the first step toward mastering your migration journey.

View Now

451 Enterprise Buyers Guide

The Enterprise Buyers' Guide to Data Protection 2024 is designed to highlight key market trends and challenges while providing information on what capabilities and processes organizations should consider implementing to ensure their investment in data protection not only meets current requirements but can adapt to modern workloads, including software as a service and cloud‑native architectures, which require higher levels of scalability and data mobility relative to traditional and legacy applications.

Get Whitepaper

Building a Cyber Resilient Data Recovery Strategy

Building a holistic cybersecurity program can be complex and multifaceted, but organizations that leverage frameworks such as the NIST Cybersecurity Framework 2.0, can better establish standards, guidelines and best practices to manage their cybersecurity risk.

With insights and knowledge to utilize Veeam® Data Platform, IT organizations, security teams and responsible decisions makers can build a cyber-resilient data recovery strategy.

Read this new white paper and learn how to:

  • Improve cybersecurity through the industry recognized NIST Framework.
  • Empower IT to actively participate in the cybersecurity plan.
  • Harness Veeam capabilities for your cybersecurity strategy.

Get Whitepaper

The Forrester Wave™: Data Resilience Solutions, Q4 2024

Veeam has been named a Leader in The Forrester Wave™: Data Resilience Solutions, Q4 2024, and achieved the highest score in the strategy category. Additionally, Veeam received above average Customer Feedback in the evaluation.

We believe Veeam received this recognition due to expanding data resilience, data portability, security, and intelligence within our market-leading backup solution. Veeam presents a leading enterprise feature set from continuous product development through innovation and acquisition.

In this complementary report, Forrester evaluates critical factors that customers should consider for their purchase and evaluates each solution based on the following factors:

  • Strategy
  • Current Offering
  • Customer feedback

Download the Forrester Wave™: Data Resilience Solutions, Q4 2024 to find out why Veeam is a Leader.

Get Whitepaper

Is the Virtualization Shake-up Causing a Market Upheaval?

Following Broadcom's acquisition of VMware, 72% of surveyed organizations said that they plan to migrate their servers from VMware in the future, according to a new study conducted by Foundry and CIO.com.

Watch this on-demand webinar for an overview of the survey results and an in-depth discussion on:

  • How 550 CIOs are looking at Broadcom, vSphere, and their broader hybrid IT strategies moving forward.
  • What is driving these organizations to reconsider their hypervisor and cloud strategies, including timing, skills, tools, and more.
  • How Veeam can help users migrate, modernize, and secure their hybrid data estates anywhere.
  • How optimizing existing storage or turnkey backup can move data across hypervisors, clouds, virtual and physical servers, and applications.

And more!

View Now

Hypervisor Migration: Keeping Data Safe in a Changing Industry

Change is the only true constant in the world, and your virtual datacenter is no exception. Changing a hypervisor is not something that should be taken lightly, so when you are considering this type of switch, you need to review your data resilience strategy too. Whether you’re moving between vendors or migrating to new platforms or locations, Veeam keeps your business running safely, securely, and without loss at any scale.

Watch this webinar with Billy Cashwell and John Annand from Info-Tech to learn more about:

  • Migrating without changing your workflow or processes.
  • Secure, consistent protection across virtualization platforms.
  • How Veeam can protect you through the journey.

View Now

Research Report: Vmware Customers Weigh Alternatives

The Broadcom-VMware merger has left many long-standing customers mulling a change in their hypervisors. Foundry and CIO.com's comprehensive survey of over 550 enterprise IT leaders provides an in-depth analysis of this landscape change.

Download this brand new analyst research report and access key insights, like:

  • Over 56% of enterprises surveyed plan to decrease their use of VMware over the next year.
  • The majority is considering a range of alternatives, with 71% looking at on-prem options.
  • 89% expect to need at least one full-time engineer to achieve their desired strategy.

Get Whitepaper

AI and ML in Backup & Recovery

To gain insight into these AI and ML trends, TechTarget’s Enterprise Strategy Group surveyed 375 IT and data professionals familiar with and/or responsible for data protection (including backup and recovery) decisions and data science for their organization.

Read this exclusive ESG and Veeam eBook to find out more on:

  • What are the primary drivers and challenges of using Artificial Intelligence for Backup and Recovery.
  • What are the potential consequences of losing AI data that was not backed up or is otherwise unrecoverable.
  • How enhanced security can be achieved with the right AI/ML integration into backup and recovery.

Get Whitepaper

One Login to Rule Them All: Social vs SSO

In today's digital landscape, businesses struggle to balance security and user experience at the login step. Choosing between social login and single sign-on (SSO) doesn't have to be an either/or decision - understanding their strengths helps you implement the right mix for your business needs.

What You'll Learn:

  • Authentication Options Compared: The key differences between social login and SSO solutions
  • Strategic Implementation: How to match authentication methods to your specific business goals
  • Security Considerations: Protection measures that don't sacrifice user experience
  • Integration Approaches: When to use each method and how they can work together
  • Business Impact: How the right login strategy drives revenue while cutting costs

View Now

Website Authentication: Beyond Passwords

Traditional password protection is failing modern businesses. With 80% of data breaches stemming from compromised passwords and costs averaging $7.35 million per breach, businesses need stronger authentication methods that balance security with user experience - without requiring users to create, remember, and manage complex passwords across multiple platforms.

What You'll Learn:

  • Modern Security Approaches: How public key cryptography eliminates password storage risks
  • Defense Against Threats: Protection from phishing, brute force attacks, and data breaches
  • User Experience Benefits: Simplified logins that boost engagement and conversion rates
  • Implementation Options: From basic HTTP to token-based and passwordless systems
  • Business Advantages: Increased security that drives growth rather than hindering it
  • View Now

    Corporate Account Takeover: Protecting Your Business From Digital Identity Theft

    In today's digital landscape, corporate account takeover (CATO) attacks can devastate businesses in seconds. This guide exposes the mechanics behind these threats and provides practical defense strategies that protect your company's digital identity without sacrificing growth.

    What You'll Learn:

    • Attack Patterns: How cybercriminals target banking, e-commerce, and social platforms
    • Threat Detection: Simple ways to spot warning signs before breaches occur
    • Defense Tactics: Practical security measures that protect without complexity
    • Business Benefits: How strong identity protection drives revenue while cutting costs

    View Now