Veeam Data Platform Advanced for Proxmox VE

Key Takeaways: Proven protection for Proxmox VE. Veeam Data Platform delivers enterprise‑grade backup, recovery, and monitoring for virtual machines running on Proxmox VE. Seamless migration support. Restore workloads from other hypervisors or clouds into Proxmox VE with minimal risk and no steep learning curve. Immutable backup options. Prevent data tampering and ensure integrity with immutable …

Veeam Data Platform Advanced for Proxmox VE Read More »

Announcing Amazon Quick Suite: your agentic teammate for answering questions and taking action

Today, we’re announcing Amazon Quick Suite, a new agentic teammate that quickly answers your questions at work and turns those insights into actions for you. Instead of switching between multiple applications to gather data, find important signals and trends, and complete manual tasks, Quick Suite brings AI-powered research, business intelligence, and automation capabilities into a …

Announcing Amazon Quick Suite: your agentic teammate for answering questions and taking action Read More »

New general-purpose Amazon EC2 M8a instances are now available

Today, we’re announcing the availability of Amazon Elastic Compute Cloud (Amazon EC2) M8a instances, the latest addition to the general-purpose M instance family. These instances are powered by the 5th Generation AMD EPYC (codename Turin) processors with a maximum frequency of 4.5GHz. Customers can expect up to 30% higher performance and up to 19% better …

New general-purpose Amazon EC2 M8a instances are now available Read More »

Veeam Cyber Secure: Elite Services for Full Data Resilience

Key Takeaways The market reality: Cyber resilience isn’t optional. Cyberattacks are constant, move fast, target backups, and boards expect provable plans and recovery. The new Veeam Cyber Secure program: From security assessments to threat actor intelligence security briefings and Coveware-led cyber extortion readiness & response, the Veeam Cyber Secure program helps improve organization’s security posture …

Veeam Cyber Secure: Elite Services for Full Data Resilience Read More »

Veeam Now Supports Scale Computing HyperCore™ operating system: Secure, Simple, Scalable Modern Virtualization Protection

The IT industry has been rapidly evolving over the past year with many changes in the virtualization market driving organizations looking for cost effective, scalable alternatives to legacy infrastructure solutions. Major challenges for IT teams include migrating hypervisors and securing data from cyberthreats while controlling costs. If you’re an IT leader, these changes aren’t just …

Veeam Now Supports Scale Computing HyperCore™ operating system: Secure, Simple, Scalable Modern Virtualization Protection Read More »

Introducing new compute-optimized Amazon EC2 C8i and C8i-flex instances

After launching Amazon Elastic Compute Cloud (Amazon EC2) memory-optimized R8i and R8i-flex instances and general-purpose M8i and M8i-flex instances, I am happy to announce the general availability of compute-optimized C8i and C8i-flex instances powered by custom Intel Xeon 6 processors available only on AWS with sustained all-core 3.9 GHz turbo frequency and feature a 2:1 …

Introducing new compute-optimized Amazon EC2 C8i and C8i-flex instances Read More »

AWS IAM Identity Center now supports customer-managed KMS keys for encryption at rest

Starting today, you can use your own AWS Key Management Service (AWS KMS) keys to encrypt identity data, such as user and group attributes, stored in AWS IAM Identity Center organization instances. Many organizations operating in regulated industries need complete control over encryption key management. While Identity Center already encrypts data at rest using AWS-owned …

AWS IAM Identity Center now supports customer-managed KMS keys for encryption at rest Read More »

AWS Weekly Roundup: Amazon Bedrock, AWS Outposts, Amazon ECS Managed Instances, AWS Builder ID, and more (October 6, 2025)

Last week, Anthropic’s Claude Sonnet 4.5—the world’s best coding model according to SWE-Bench – became available in Amazon Q command line interface (CLI) and Kiro. I’m excited about this for two reasons: First, a few weeks ago I spent 4 intensive days with a global customer delivering an AI-assisted development workshop, where I experienced firsthand …

AWS Weekly Roundup: Amazon Bedrock, AWS Outposts, Amazon ECS Managed Instances, AWS Builder ID, and more (October 6, 2025) Read More »

Remote Access Risks & the Path to Resilient Organizations

Key Takeaways Remote access compromises, especially VPN exploits, are now the leading initial vector in ransomware attacks. Most breaches succeed due to missed basics: weak authentication, unpatched vulnerabilities, and misconfigurations. Resilience depends on consistent processes: enforce MFA, patch promptly, audit accounts, and monitor VPN activity. Remote access security is inseparable from business continuity and backup …

Remote Access Risks & the Path to Resilient Organizations Read More »

Veeam and Pure Storage: Cyber Resilience Delivered as-a-Service for the Modern Enterprise

Navigating a New Era of Resilient Enterprise Data Protection Enterprises face a relentless barrage of cyber threats while grappling with growing IT complexity and data sprawl. The cost of downtime and data loss is soaring, and traditional backup alone is no longer enough. Enterprises demand true cyber resilience—continuous, automated, and verifiable protection and clean recovery …

Veeam and Pure Storage: Cyber Resilience Delivered as-a-Service for the Modern Enterprise Read More »

Scroll to Top