Truth in IT
    • Sign In
    • Register
        • Videos
        • Channels
        • Pages
        • Galleries
        • News
        • Events
        • All
Truth in IT Truth in IT
  • Data Management ▼
    • Converged Infrastructure
    • DevOps
    • Networking
    • Storage
    • Virtualization
  • Cybersecurity ▼
    • Application Security
    • Backup & Recovery
    • Data Security
    • Identity & Access Management (IAM)
    • Zero Trust
    • Compliance & GRC
    • Endpoint Security
  • Cloud ▼
    • Hybrid Cloud
    • Private Cloud
    • Public Cloud
  • Webinar Library
  • TiPs

City of Phoenix Achieves Sub-5-Minute Recovery with Veeam

Veeam
02/27/2026
49
0 (0%)
Share
  • Comments
  • Download
  • Transcript
Report Like Favorite
  • Share/Embed
  • Email
Link
Embed

Transcript


TL;DR

  • City of Phoenix selected Veeam for data resilience leadership and seamless integration with Pure Storage virtualized environments to support disaster recovery initiatives across municipal services.
  • The IT team restored a critical Dial-a-Ride server for disabled residents in under five minutes using Veeam, demonstrating zero-tolerance approach to data loss in public services.
  • Phoenix leverages Veeam's CyberSecure maturity program to establish credibility with their information security office and demonstrate adherence to cybersecurity protocols and testing standards.

Summary

This customer testimonial features the City of Phoenix IT leadership discussing their deployment of Veeam for data protection and disaster recovery. Jerry Simpson, Deputy CIO, along with Disaster Recovery Manager Godefred Wononuah and Backup & Recovery Engineer Eric Forman, explain how the city selected Veeam for its leadership in data resilience and integration with their Pure Storage virtualized environment. The team highlights a critical recovery scenario involving the Dial-a-Ride program for disabled residents, where Veeam enabled server restoration in under five minutes with no service interruption. The city emphasizes the importance of mature cybersecurity frameworks like CyberSecure for establishing credibility and meeting information security office requirements. Looking forward, Phoenix plans to expand their Veeam implementation with Vault and Recovery Orchestrator to strengthen their overall data protection posture across all municipal services, from airport operations to water services and waste collection.

Chapters

0:00 - Introduction and City Overview
0:18 - Why Phoenix Chose Veeam
1:19 - Critical Recovery Success Story
2:34 - Future Plans and Partnership

Key Quotes

0:18 "So the reason we chose Veeam was for its, well, for its leadership in the area of data resilience."
1:41 "Within less than five minutes, my team was able to bring back the server up and we resumed services uninterrupted."
2:56 "So Veeam is more than just a vendor for the city of Phoenix. They've become a partner and it's been pretty seamless."
Categories:
  • » Data Protection » Backup & Recovery
  • » Data Protection
Channels:
News:
Events:
Tags:
  • Customer Story
  • Data Protection
  • Backup & Recovery
  • Getting Started
  • Data resilience
  • Disaster recovery
  • Public sector IT
  • Virtualization backup
  • Pure Storage integration
  • CyberSecure maturity
  • Municipal services continuity
  • Rapid recovery
  • Customer testimonial
Show more Show less

Browse videos

  • Related
  • Featured
  • By date
  • Most viewed
  • Top rated
  •  

              Video's comments: City of Phoenix Achieves Sub-5-Minute Recovery with Veeam

              Upcoming Webinar Calendar

              • 04/21/2026
                02:00 PM
                04/21/2026
                How Purpose Brands scales IT with Zendesk ITAM
                https://www.truthinit.com/index.php/channel/1881/how-purpose-brands-scales-it-with-zendesk-itam/
              • 04/22/2026
                01:00 PM
                04/22/2026
                Evolving Service Account Security: Transitioning from Legacy to Agentic Identities in AI
                https://www.truthinit.com/index.php/channel/1885/evolving-service-account-security-transitioning-from-legacy-to-agentic-identities-in-ai/
              • 04/22/2026
                01:00 PM
                04/22/2026
                Harnessing the Power of AI for Rapid Advancements
                https://www.truthinit.com/index.php/channel/1892/harnessing-the-power-of-ai-for-rapid-advancements/
              • 04/23/2026
                01:00 PM
                04/23/2026
                Cultivating Trust as a Foundation for the Agentic Consumer in 2026
                https://www.truthinit.com/index.php/channel/1883/cultivating-trust-as-a-foundation-for-the-agentic-consumer-in-2026/
              • 04/29/2026
                12:00 PM
                04/29/2026
                Strategies for Safeguarding AI in Applications, Agents, and APIs
                https://www.truthinit.com/index.php/channel/1893/strategies-for-safeguarding-ai-in-applications-agents-and-apis/
              • 04/30/2026
                10:00 AM
                04/30/2026
                Insights from the 2026 Keepit Annual Data Report on SaaS Data Protection
                https://www.truthinit.com/index.php/channel/1868/insights-from-the-2026-keepit-annual-data-report-on-saas-data-protection/
              • 04/30/2026
                01:00 PM
                04/30/2026
                The New Economics of VMware Exit
                https://www.truthinit.com/index.php/channel/1880/the-new-economics-of-vmware-exit/
              • 05/06/2026
                02:00 AM
                05/06/2026
                Harnessing AI to Identify Attacks Before They Evolve into Breaches
                https://www.truthinit.com/index.php/channel/1886/harnessing-ai-to-identify-attacks-before-they-evolve-into-breaches/
              • 05/12/2026
                01:00 PM
                05/12/2026
                Transforming Black Box Mysteries into Transparent Insight: Addressing AI Risks through Data Lineage
                https://www.truthinit.com/index.php/channel/1895/transforming-black-box-mysteries-into-transparent-insight-addressing-ai-risks-through-data-lineage/
              • 05/12/2026
                11:30 PM
                05/12/2026
                Effective Strategies for Safeguarding Active Directory and Minimizing Data Risks
                https://www.truthinit.com/index.php/channel/1888/effective-strategies-for-safeguarding-active-directory-and-minimizing-data-risks/

              Upcoming Events

              • Apr
                21

                How Purpose Brands scales IT with Zendesk ITAM

                04/21/202602:00 PM ET
                • Apr
                  22

                  Evolving Service Account Security: Transitioning from Legacy to Agentic Identities in AI

                  04/22/202601:00 PM ET
                  • Apr
                    22

                    Harnessing the Power of AI for Rapid Advancements

                    04/22/202601:00 PM ET
                    • Apr
                      23

                      Cultivating Trust as a Foundation for the Agentic Consumer in 2026

                      04/23/202601:00 PM ET
                      • Apr
                        29

                        Strategies for Safeguarding AI in Applications, Agents, and APIs

                        04/29/202612:00 PM ET
                        More events
                        Truth in IT
                        • Sponsor
                        • About Us
                        • Terms of Service
                        • Privacy Policy
                        • Contact Us
                        • Preference Management
                        Desktop version
                        Standard version