VeeamON 2025: My Recap and Reflections < ProVirtualzone

VeeamON 2025: My Recap and Reflections < ProVirtualzone

The VeeamON 2025 in San Diego was another fantastic experience, and this one felt extra special to me personally. As a long-time Veeam Vanguard, this was my fourth (or maybe fifth?) time attending VeeamON, and it never gets old. It is always a pleasure to connect with the incredible Veeam community, catch up with friends, and soak in the energy and innovation that make this event unique.

What made VeeamON 2025 even more memorable for me was the opportunity to present a session with my good friend Paolo for the first time. We delivered a session about migrating your workloads from VMware (or another hypervisor) to a Proxmox VE Cluster using Veeam.

After returning home and taking a day to rest, I picked up my notes and started working on this recap blog post to share my reflections and highlights. Since I also wanted to include accurate visuals, I carefully reviewed the session slide decks provided during VeeamON. I found the right images that best illustrate each feature and announcement, helping me finish this recap with the level of detail and quality I believe this amazing event deserves.

Standing on that stage was a proud moment, and I’m deeply thankful to Veeam, especially Rick Vanover, for the invitation and the support. It was an honor to be part of the speaker lineup and to contribute to the event from the other side of the room.

Because of VMware’s current situation, many organizations are seriously considering moving away. When I asked the audience who was considering migrating their environment from VMware, around 60% of the room raised their hands. That says a lot about the mood and momentum in the market right now. I have been involved in two migration projects to Hyper-V since the beginning of the year.

VeeamON 2025: My Recap and Reflections

Now let’s discuss what news and announcements were shown at VeeamON 2025.

VeeamON 2025: Deep Dive into the Key Announcements and Features

VeeamON 2025 in San Diego was packed with innovation. From major product updates to new security-focused features and services, the announcements showed that Veeam is positioning itself as a backup company and a complete data resilience platform. Here’s a breakdown of everything important and how these changes can impact how customers protect, manage, and recover their data.

VeeamON 2025: My Recap and Reflections


Veeam Backup & Replication v13

Veeam flagship product continues to evolve with a strong focus on security and usability. The v13 release introduces changes that simplify daily operations while raising the bar for data protection and compliance.

Note: Anton Gostev presented most of these new features and news. Since I was a bit ill(huge headache) and needed to leave to get some medicine, I don’t have any images from the Welcome Keynote session. So, thanks to my friend Christopher Glémot for sharing his photos with me so I can add them to my blog post.

  • New Console UI: Clean interface with built-in SSO support.

Veeam Backup & Replication v13 introduces a completely redesigned user interface for its management console. The new UI not only looks more modern and intuitive, but it also adds native Single Sign-On (SSO) support. This allows administrators to authenticate securely using their organization’s identity provider, without needing separate Veeam-specific credentials. The result is faster logins, better compliance with corporate security policies, and a smoother experience when managing large environments.

  • Security Operator Role: Enforces role separation, aligning with compliance frameworks.

A major security improvement in v13 is introducing a predefined Security Operator role. This role focuses purely on security tasks — monitoring, threat detection, and managing security configurations — without granting full administrative rights. This separation of duties is crucial for organizations that must comply with strict regulatory standards such as GDPR, HIPAA, or ISO 27001. It helps prevent conflicts of interest and reduces the risk of insider threats by applying least-privilege access principles natively within the platform.

  • DISA STIG Compliance & SSH Disabled: Secure by default — especially useful in government and finance.

VeeamON 2025: My Recap and Reflections

Veeam hardened deployment options now meet DISA STIG (Defense Information Systems Agency Security Technical Implementation Guide) compliance standards. Critical security measures are enforced by default,  such as disabling SSH access, locking down unnecessary services, and applying strict OS-level security baselines. This is especially important for federal agencies, defense contractors, and highly regulated industries like finance or healthcare, where achieving compliance with STIG guidelines is a requirement for operating critical workloads.

  • Built-in Patch Management: Updates are now handled by Veeam.

To make operations even easier and safer, Veeam v13 introduces automated patch management. The hardened appliance deployments will now receive updates directly from Veeam without requiring manual intervention or root access to the underlying operating system. This minimizes the risk of exploited unpatched vulnerabilities and significantly reduces IT teams’ operational overhead. Keeping backup servers up-to-date with security fixes becomes seamless and low-risk.

  • Cockpit UI: Lightweight web console for node-level management.

The new Cockpit UI is a lightweight, web-based interface designed for basic system monitoring and configuration of the Veeam backup server (especially in hardened appliance deployments). It allows administrators to view hardware status, manage network settings, monitor system health, and apply basic updates,  all without needing to access the OS shell or log in to the server. This is ideal for highly secured environments where full OS access is restricted, but where basic management tasks still need to be performed safely and easily.

I believe these changes are not just cosmetic. They are fundamental improvements that strengthen how organizations approach backup management and security. By adding native Single Sign-On support, enforcing stronger role separation, automating patching, and building security best practices directly into the platform, Veeam makes it much easier for customers to reduce risks and avoid common misconfigurations that could expose their environments to vulnerabilities. These updates will especially help organizations where IT and security teams must work closely together to meet compliance and operational standards. With version 13, Veeam moves beyond being just a backup solution. It becomes a critical part of an organization’s operational security strategy, helping to protect data and the entire backup infrastructure.


Veeam Hardened Virtual Appliance

This new appliance is a big win for customers who want fast, secure deployments without dealing with OS-level maintenance. It reflects Veeam commitment to simplifying secure infrastructure.

  • Pre-configured OVA/ISO image for rapid deployment.

VeeamON 2025: My Recap and Reflections

The new Veeam Hardened Virtual Appliance is delivered as a pre-configured OVA or ISO image, designed to make deployment faster, easier, and more secure. This allows organizations to roll out new backup servers without spending time on manual Linux installation, configuration, and hardening tasks. Standardizing the deployment process eliminates variability between installations and ensures that every instance follows the same security standards right from the start. This particularly benefits larger enterprises and service providers managing multiple sites or tenants.

  • SSH disabled, root locked down: No backdoors, no guesswork.

Security is a primary focus of the Hardened Appliance. Out of the box, Secure Shell (SSH) access is disabled, and root account access is locked down. Administrators cannot modify or bypass system protections, removing the risk of accidental or intentional misconfiguration. This approach eliminates common backdoors that attackers could exploit and guarantees that the environment remains fully compliant with best practices for Zero Trust architecture. It also reassures customers that the hardened backup server cannot be tampered with outside of the Veeam-controlled update mechanisms.

  • Patching is fully automated: No need to manage OS updates manually.

Another major benefit of the Hardened Appliance is its fully automated patching system. Veeam handles all security updates for the appliance, meaning that administrators do not have to worry about manually applying patches or updates at the operating system level. This reduces operational overhead, eliminates human error in patch management, and ensures the backup infrastructure is always protected against the latest vulnerabilities. Organizations can be confident that their backup servers are kept up to date without additional administrative burden or downtime.

As someone who works with customers who do not always have deep Linux expertise, I believe this is a major step toward reducing complexity and enforcing Zero Trust principles without requiring constant administrative effort. Veeam simplifies one of the most critical parts of securing backup infrastructure by providing a pre-hardened, fully managed deployment option. It allows organizations to deploy backup servers quickly and confidently, knowing that security best practices are already in place.

It is also important to highlight that Veeam Backup & Replication version 13 and the Hardened Virtual Appliance are currently in beta and were showcased as upcoming features during VeeamON 2025. They are not yet available for general release, but the announcements show a clear direction in which Veeam is moving to strengthen operational security and ease of deployment.

VeeamON 2025: My Recap and Reflections


Veeam High Availability (HA) Cluster

VeeamON 2025: My Recap and Reflections

VeeamON 2025 introduced one of the most important infrastructure features for customers that prioritize uptime and operational continuity — the new Veeam High Availability (HA) Cluster. Until now, Veeam Backup & Replication was typically deployed as a standalone server, which meant that in the event of a failure or outage, manual recovery steps were required to restore backup services. The new HA Cluster architecture is designed to eliminate that limitation by enabling automated failover between multiple backup servers, improving service availability, fault tolerance, and disaster resilience. This is a major shift in how Veeam can be deployed in production environments where continuous access to backup and restore operations is critical.

  • Redundant Veeam Backup Server Deployment

The new Veeam HA Cluster introduces the ability to run multiple Veeam Backup & Replication servers in a highly available configuration. In this architecture, backup servers are deployed as part of a fault-tolerant cluster, where one node acts as the primary server while one or more secondary nodes remain on standby. In the event of a failure or planned downtime on the primary node, the cluster will automatically fail over to one of the standby servers, allowing backup and restore operations to continue without interruption. This built-in redundancy helps ensure mission-critical data protection services remain available, even during hardware failures, software crashes, or maintenance windows.

  • Improved Fault Tolerance and Resilience

Traditional backup infrastructures often rely on a single management server, which introduces a potential single point of failure. With the HA Cluster, Veeam eliminates this risk by allowing the continuous operation of core services through clustering. If one server becomes unavailable, the secondary node takes over seamlessly. This automatic failover ensures that backup jobs, configuration data, and system operations remain functional and synchronized. It is especially valuable for enterprise environments where backup availability must match the uptime expectations of production systems.

  • Simplified Management and Monitoring

The HA Cluster is designed to be easily managed through Veeam centralized console. Administrators can configure the cluster, monitor its health, and receive alerts from a single pane of glass. Veeam handles replication of configuration data between nodes in the cluster automatically, reducing the complexity of setup and synchronization. This centralized control reduces the risk of configuration drift and gives operators full visibility over their clustered backup environment, ensuring faster troubleshooting and operational efficiency.

  • Scalability for Growing Environments
    As organizations grow, so do the demands on their backup systems. Veeam HA Cluster supports scaling out by adding more nodes to the cluster, which helps balance workloads and reduce backup windows. This flexibility allows businesses to adapt their infrastructure to data growth and compliance requirements without re-architecting their backup systems. It is particularly beneficial for service providers and large enterprises managing large numbers of VMs, applications, and backup policies.

The introduction of the Veeam HA Cluster is, in my opinion,  one of the most impactful infrastructure features(together with the Veeam Appliance itself) announced at VeeamON 2025. It reflects Veeam commitment to making data protection secure, flexible, and continuously available. In many environments I work with, even short outages of the backup system can delay critical recovery tasks and introduce risk. This new HA model will help organizations protect against that risk by building resilience directly into the backup layer. With built-in redundancy, automatic failover, and simple management, this feature brings high enterprise-grade availability into the backup infrastructure’s heart. I believe it will become a standard for many customers who need to align their backup availability with the uptime of their production environments.


Veeam Data Cloud Services

Veeam continues to expand its Data Cloud portfolio with fully managed, secure services designed to simplify protection for widely used SaaS platforms. At VeeamON 2025, two major areas received deeper focus: Microsoft Entra ID (formerly Azure Active Directory) and Salesforce.

  • Backup for Microsoft 365 (Exchange, SharePoint, Teams, OneDrive)

Veeam Data Cloud Services now include a fully hosted Backup for Microsoft 365 solution. This service protects critical Microsoft 365 applications, including Exchange Online, SharePoint Online, OneDrive for Business, and Microsoft Teams. By offering it as a fully managed service, Veeam removes the complexity of maintaining backup infrastructure while giving customers full control over their data retention, compliance, and recovery options. The service is designed for scalability and includes improved role-based access control (RBAC) and self-service restore capabilities, making it easier for small and large organizations to meet their data protection and regulatory requirements.

  • Backup for Microsoft Entra ID (Azure AD)

VeeamON 2025: My Recap and Reflections

Building on its Microsoft 365 expertise, Veeam now offers dedicated protection for Microsoft Entra ID. This service goes beyond basic user data by backing up crucial identity and access management components. That includes sign-in logs, app registrations, roles, user groups, and conditional access policies — all of which are critical for maintaining security and continuity in hybrid environments. Identity systems are now at the heart of enterprise security, and having fast, reliable recovery for this layer ensures minimal disruption during a cyber incident or administrative misstep.

VeeamON 2025: My Recap and Reflections

Veeam Backup for Salesforce, already available in the self-managed model, is now also offered as a fully hosted service under Veeam Data Cloud. This protects Salesforce CRM data, including standard and custom objects, files, attachments, and metadata such as automation rules and object relationships. With regulatory compliance demands rising and data loss risks increasing, having a dedicated and reliable backup service for Salesforce becomes critical. The hosted model removes infrastructure management from the customer side while ensuring secure, policy-driven protection for vital business data.

  • Vault Cloud Storage: Immutable, scalable backup target

VeeamON 2025: My Recap and Reflections

Vault Cloud Storage is a new addition to Veeam portfolio, providing fully managed, secure, and scalable storage designed specifically for backup data. Vault storage is immutable by design, meaning that once data is written, it cannot be altered or deleted within the defined retention policy. This is a vital layer of defense against ransomware and malicious deletion. Vault Cloud Storage is integrated into Veeam Data Platform and Data Cloud Services, offering customers a seamless way to achieve off-site, long-term, and compliant backup storage without managing additional hardware or cloud infrastructure.

This is excellent news for lean IT teams or organizations that do not have the internal resources to maintain a complex backup infrastructure. With Veeam Data Cloud Services, customers can benefit from the full protection and reliability of Veeam technologies without the operational burden of managing hardware, software updates, or cloud storage configurations. It provides an opportunity to focus on core business priorities while trusting that critical Microsoft 365, Salesforce, and identity data are securely backed up, retained, and recoverable. For many organizations, this hosted model will allow faster adoption of enterprise-grade data protection practices without the traditional infrastructure investment or complexity.


Continuous Data Protection (CDP) for Windows & Linux

CDP has long been a premium feature for virtual machines, but now Veeam brings it to general-purpose workloads. This expands the number of customers benefiting from real-time protection using CDP.

Veeam announced a significant expansion of its Continuous Data Protection (CDP) capabilities at VeeamON 2025. Traditionally, CDP has been available primarily for VMware environments. Now, CDP will extend to support both Windows and Linux systems running outside of VMware infrastructure. This enhancement enables organizations to achieve near-zero Recovery Point Objectives (RPO) for their physical servers and cloud-native workloads. By replicating data at the I/O level in real time, Veeam minimizes the risk of data loss between recovery points. This is critically important for finance, healthcare, and online services industries, where even minimal data loss can have serious operational or regulatory consequences.

  • Works outside of VMware, including Windows and Linux workloads

With this upcoming release, Veeam CDP will no longer be limited to virtualized environments. It will support the protection of Windows and Linux workloads, whether physical, virtualized under another hypervisor, or running in cloud environments. This flexibility dramatically broadens the use cases for CDP technology, allowing organizations to extend real-time protection to critical applications across a hybrid or multi-cloud strategy. Customers can now protect their most important servers and services without being restricted by platform limitations, enabling faster, more flexible disaster recovery planning.

This evolution makes Continuous Data Protection more inclusive and accessible for various organizations. I am enthusiastic about this development because it addresses a critical gap many customers face today. Achieving near-zero RPO for physical servers, cloud-native workloads, and non-VMware environments changes the game for industries where data loss is unacceptable. I see this becoming a preferred solution for financial services, healthcare systems, government applications, and any business where losing even a few minutes of data can have operational, legal, or economic consequences. It also shows that Veeam listens to real-world needs, not limiting critical protection features to only virtualized infrastructures. This is a very important step forward, and I believe it will help many organizations strengthen their disaster recovery strategies significantly.


Kasten by Veeam: Protecting Red Hat OpenShift

Containerized workloads are now central to many enterprise IT strategies, and Red Hat OpenShift remains one of the most widely adopted platforms for running Kubernetes at scale. At VeeamON 2025, Veeam reinforced its commitment to protecting these environments by showcasing enhanced integration between Kasten and OpenShift.

  • Validated architecture for OpenShift protection

Kasten now supports OpenShift Virtualization and brings a validated architecture with secure, immutable backups and centralized control. This integration allows platform teams to protect virtual machines and container-native workloads under a unified policy and recovery framework. The deployment follows GitOps best practices, which align with how OpenShift environments are managed in production.

  • Security and compliance alignment

The integration includes FIPS 140-3 compliance support and offers protection for block and filesystem volume modes. Combined with strong role-based access controls and Red Hat Advanced Cluster Security support, the solution is designed to meet the expectations of teams operating in highly regulated or security-sensitive industries.

  • Unified backup strategy for hybrid workloads

What makes this especially valuable is the ability to include traditional and cloud-native workloads in the same protection model. With native support for OpenShift Virtualization, Kasten ensures that backup and recovery operations are not fragmented between legacy tools and container platforms.

This direction from Veeam aligns with what I see happening in the enterprise. Organizations are moving toward hybrid platforms, and OpenShift is often where innovation and core applications meet. Protecting those workloads without building separate processes for VMs and containers is exactly what platform engineering teams need. I see this as one of the most practical and valuable integrations Veeam shared at this year’s event.


Security-Driven Features Across the Platform

A major focus at VeeamON 2025 was Veeam growing role in security operations. Veeam is moving beyond the traditional role of data protection and positioning itself as an active player in incident response, threat detection, and infrastructure hardening. With cyber threats continuing to evolve, this shift reflects what many customers now expect: data protection tools that also help prevent attacks, not just recover from them.

  • Inline Malware Detection with YARA

Veeam integrates YARA-based scanning to detect malware within backup data in supported editions of the Veeam Data Platform, enabling inline threat detection during backup and restore operations. This allows backup administrators to flag and quarantine malicious payloads before data is reintroduced into the production environment. Scanning is built into the backup process, leveraging well-established security rulesets used across the cybersecurity community. This approach brings visibility into backup data that traditionally would have been considered safe by default, helping organizations detect threats that may have gone unnoticed at the endpoint level.

  • Microsoft Sentinel and ServiceNow integrations

Veeam is now integrating directly with Microsoft Sentinel and ServiceNow to enhance incident response and automation. These integrations allow threat alerts, audit trails, and restore actions to be surfaced into SIEM and ITSM systems in real time. Security and operations teams can coordinate responses more effectively, streamline ticketing, and build automated playbooks around ransomware events or anomalous behavior. These are crucial steps toward embedding backup workflows into broader enterprise security and compliance frameworks.

  • Expanded RBAC with new access control models

Veeam continues strengthening its role-based access control system by introducing more granular permission sets and dedicated roles, including the recently announced Security Operator role. These enhancements allow organizations to enforce the principle of least privilege more effectively. Administrators, operators, and security teams can be assigned tailored permissions that reflect their responsibilities, helping to reduce insider threats, enforce compliance, and meet audit requirements with precision.

  • CrowdStrike integration: Real-time threat context for backup operations

Veeam announced a new partnership with CrowdStrike to integrate backup telemetry with modern threat detection and response workflows. This integration connects Veeam with CrowdStrike Falcon and LogScale, CrowdStrike’s observability platform for security operations. Backup events and unusual activity are now surfaced directly into existing security operations workflows. Security teams can monitor when data is restored, who performed the operation, and whether the behavior aligns with expected recovery patterns.

For example, an unscheduled restore to an unusual location can trigger automated alerts, allowing teams to investigate and act immediately. This eliminates the visibility gap that often exists between IT operations and security. I see this as a strategic step forward. Backup systems contain valuable signals, which are frequently siloed from security processes. By integrating with CrowdStrike, Veeam helps unify data protection with incident response. It allows security teams to treat recovery events as part of the broader threat landscape. This integration is a clear benefit for organizations focused on resilience and rapid response.


Veeam Guardian

Backup infrastructure becomes increasingly difficult to manage as environments grow in size, complexity, and compliance requirements. Veeam Guardian, introduced at VeeamON 2025, addresses one of the most common pain points in large-scale data protection environments: ensuring policy consistency and configuration compliance across all backup systems. This tool is designed for central oversight, control, and standardization, giving IT and compliance teams the confidence that backup operations are being executed correctly across the board.

  • Centralized policy and configuration management

Veeam Guardian enables administrators to define backup policies and system configurations from a central location and apply them across multiple Veeam Backup & Replication servers. This centralized model eliminates the need for site-by-site configuration and manual updates, significantly reducing the chances of policy deviation. Administrators can create, audit, and enforce best practices for data retention, backup job parameters, and system behavior — all in one place.

  • Drift detection and compliance enforcement

One of the most valuable capabilities in Guardian is its ability to detect configuration drift. If a Veeam server deviates from the approved policy baseline, Guardian alerts the administrator, allowing immediate remediation. This ensures that backup environments stay aligned with internal security guidelines, regulatory requirements, and operational standards over time. It also makes compliance reporting more straightforward, reducing manual verification work during audits.

  • Supports MSPs and multi-tenant environments

Veeam Guardian is especially relevant for managed service providers (MSPs) and enterprises with multi-tenant or distributed environments. These organizations must often maintain a consistent security and operational baseline across hundreds of backup servers while supporting unique policies per client or department. Guardian provides the structure and visibility to manage that complexity efficiently.

Large enterprises and service providers have been asking for this type of tool. It allows them to scale backup operations without sacrificing control. By standardizing policy enforcement and automating configuration monitoring, Guardian will help reduce audit stress, eliminate human error, and ensure a reliable, compliant backup infrastructure, even across the most complex environments.


Data Resilience Maturity Model (DRMM)

While many organizations assume they are prepared for disaster recovery, the reality often becomes clear only after an actual incident. The Data Resilience Maturity Model (DRMM), introduced at VeeamON 2025, provides a structured and measurable approach to evaluating and improving data resilience across an organization. Developed in partnership with McKinsey and George Westerman from the Massachusetts Institute of Technology, the framework helps align operational recovery capabilities with business expectations.

  • Built with McKinsey and MIT

The DRMM is based on research-backed methodology and practical field experience. It provides IT teams and executive leadership a shared language and an actionable roadmap to assess and mature their recovery posture. The model is designed to be vendor-neutral and scalable, supporting both enterprise and mid-market environments.

  • Follows the 3-2-1-1-0 model with a push for offline, immutable copies

The framework emphasizes best practices such as the enhanced 3-2-1-1-0 rule: maintaining three copies of data on two different media types, with one copy off-site, one copy immutable, and zero recovery errors during testing. The focus is not just on having backups, but ensuring that they are resilient, secure, and operationally tested for recovery under pressure.

  • Five maturity levels from basic to orchestrated recovery

DRMM defines five stages of maturity. Organizations can start at a reactive, fragmented level and progress toward a fully orchestrated recovery with automated testing, consistent reporting, and embedded business alignment. This helps identify operational and technical gaps and allows teams to build a roadmap with achievable milestones.

I believe this model brings much-needed structure to a critical but often misunderstood area of IT operations. Many teams overestimate their level of readiness, often because they lack an objective framework to assess their capabilities. I have seen situations where recovery strategies looked complete on paper but failed during real incidents. With this model, teams can benchmark their maturity, engage leadership with clarity, and continuously improve without waiting for a failure to prove their weaknesses. In my view, this is one of the most important long-term strategies announced at VeeamON 2025, because it encourages organizations to think beyond backup and toward operational resilience.


Generative AI and Platform Evolution

While generative AI was not the main announcement at VeeamON 2025, it was clear that Veeam is investing heavily in integrating artificial intelligence into the core of its platform. These developments are not yet available as features, but they represent a clear direction for how backup platforms will evolve—from passive storage systems to intelligent, responsive data layers.

  • Auto-tagging and classification of backup data

Veeam is developing capabilities that allow backup data to be automatically tagged and classified based on its content, metadata, or origin. This would improve organization, enable automated compliance enforcement, and provide better visibility across datasets.

  • Policy recommendations based on usage patterns

Artificial intelligence analyzes backup activity over time and recommends better policy configurations. This includes suggestions for optimizing retention, identifying gaps in protection, or detecting over-provisioning of backup resources.

  • Smarter anomaly detection and alerting

AI is also being explored to detect unusual activity within the backup infrastructure. By learning normal operation patterns, the platform could raise alerts for misconfigurations, performance degradation, or even suspicious access patterns that could point to insider threats or early stages of a cyberattack.

  • Detecting Sensitive Data with AI

Another important direction involves using AI to scan backup data for sensitive or personal information. In one example shown during VeeamON, the platform could mount backups, extract documents, and analyze their contents using Named Entity Recognition (NER) models. The results were then visualized to show where sensitive data existed, all within the backup and restore workflow.

This process is illustrated below. It shows how backup data can be scanned for PII and other sensitive content using AI tools integrated into Veeam ecosystem.

I think this is a very promising direction for Veeam. While these capabilities are still in early development, they show that the company is investing in the future of intelligent data protection. I believe that backup platforms will need to evolve into more active components of IT operations capable of understanding context and supporting decision-making. The work Veeam is doing now with AI may soon allow backup systems to react faster and prevent problems before they happen. I am excited to see how this technology will shape the next versions of Veeam Data Platform.


Platform Portability: Supporting Your Infrastructure, Your Way

A clear message from VeeamON 2025 was that Veeam remains committed to supporting a wide range of platforms. In an industry where vendor lock-in is common, Veeam prioritizes flexibility, allowing customers to choose the infrastructure that fits their operational needs and strategic direction. Whether operating fully on-premises, in the cloud, or within a hybrid environment, organizations can rely on Veeam to maintain consistent data protection and recovery workflows.

  • Full support for VMware, Hyper-V, AWS, Azure, Google Cloud, Nutanix AHV, and Proxmox VE

Veeam fully supports the major hypervisors and cloud platforms used across modern IT environments. This includes VMware vSphere, Microsoft Hyper-V, Amazon Web Services, Microsoft Azure, Google Cloud, Nutanix AHV, and, beginning with version 12.2, official support for Proxmox VE. This expanded compatibility allows organizations to standardize their backup and recovery operations regardless of the platform, ensuring consistency across diverse infrastructures.

  • Community interest around Proxmox and hybrid models

During VeeamON 2025, there was notable community discussion about the increased interest in open-source hypervisors such as Proxmox VE. This reflects a growing market trend where organizations seek cost-effective, flexible virtualization alternatives. The addition of official Proxmox support confirms that Veeam is listening to its community and continuing to evolve with its user base’s changing demands.

I believe this kind of platform flexibility is becoming essential. Many customers are actively reevaluating their virtualization strategies, especially in response to recent changes around VMware. The image shared from VeeamON 2025 shows that 56 percent of organizations will likely decrease their VMware use within the next 12 months. Alternatives such as Hyper-V, Oracle Linux Virtualization, and even Proxmox are gaining attention, with a clear shift toward more open and cost-effective solutions. I have worked on multiple projects involving migrations away from VMware, and interest in Proxmox is growing. My session at VeeamON 2025 was focused on this exact scenario: how to move workloads to a Proxmox VE cluster using Veeam. Supporting that transition with a proven, reliable backup solution like Veeam is a real advantage. In my view, this level of adaptability is one of the platform’s strongest assets, especially as IT landscapes evolve.

Conclusion

Looking back, VeeamON 2025 felt like more than another tech conference. It showed how much Veeam is evolving, improving backup and recovery, and becoming a real player in security, operational resilience, and intelligent data management. The announcements around security-driven features, inline threat detection, tighter platform integration, and portability across hybrid infrastructures all point in the same direction: Veeam is ready for the future and ready to help customers stay protected no matter how fast the market changes.

For me personally, being part of the speaker lineup this year, sharing the stage with Paolo, and discussing migration paths to Proxmox at such a critical moment in the industry, made this VeeamON unforgettable. Seeing how many organizations are preparing to move away from VMware confirmed what I have been witnessing firsthand in the projects I am involved in.

After returning home, taking time to reflect, and carefully reviewing all the session materials, I felt even more confident that Veeam was moving in the right direction. The investments in security, intelligence, flexibility, and cloud services will be critical for customers in the years ahead.

I am proud to be part of this community and grateful for the opportunity to experience it up close again this year. I am already looking forward to what is coming next and, of course, to the next VeeamON.

Share this article if you think it is worth sharing. If you have any questions or comments, comment here, or contact me on Twitter(yes for me is not X but still Twitter).

©2025 ProVirtualzone. All Rights Reserved



Source link

Comments

No comments yet. Why don’t you start the discussion?

Leave a Reply

Your email address will not be published. Required fields are marked *