Uncategorized

New general-purpose Amazon EC2 M8a instances are now available

Today, we’re announcing the availability of Amazon Elastic Compute Cloud (Amazon EC2) M8a instances, the latest addition to the general-purpose M instance family. These instances are powered by the 5th Generation AMD EPYC (codename Turin) processors with a maximum frequency of 4.5GHz. Customers can expect up to 30% higher performance and up to 19% better …

New general-purpose Amazon EC2 M8a instances are now available Read More »

Veeam Cyber Secure: Elite Services for Full Data Resilience

Key Takeaways The market reality: Cyber resilience isn’t optional. Cyberattacks are constant, move fast, target backups, and boards expect provable plans and recovery. The new Veeam Cyber Secure program: From security assessments to threat actor intelligence security briefings and Coveware-led cyber extortion readiness & response, the Veeam Cyber Secure program helps improve organization’s security posture …

Veeam Cyber Secure: Elite Services for Full Data Resilience Read More »

Veeam Now Supports Scale Computing HyperCore™ operating system: Secure, Simple, Scalable Modern Virtualization Protection

The IT industry has been rapidly evolving over the past year with many changes in the virtualization market driving organizations looking for cost effective, scalable alternatives to legacy infrastructure solutions. Major challenges for IT teams include migrating hypervisors and securing data from cyberthreats while controlling costs. If you’re an IT leader, these changes aren’t just …

Veeam Now Supports Scale Computing HyperCore™ operating system: Secure, Simple, Scalable Modern Virtualization Protection Read More »

Introducing new compute-optimized Amazon EC2 C8i and C8i-flex instances

After launching Amazon Elastic Compute Cloud (Amazon EC2) memory-optimized R8i and R8i-flex instances and general-purpose M8i and M8i-flex instances, I am happy to announce the general availability of compute-optimized C8i and C8i-flex instances powered by custom Intel Xeon 6 processors available only on AWS with sustained all-core 3.9 GHz turbo frequency and feature a 2:1 …

Introducing new compute-optimized Amazon EC2 C8i and C8i-flex instances Read More »

AWS IAM Identity Center now supports customer-managed KMS keys for encryption at rest

Starting today, you can use your own AWS Key Management Service (AWS KMS) keys to encrypt identity data, such as user and group attributes, stored in AWS IAM Identity Center organization instances. Many organizations operating in regulated industries need complete control over encryption key management. While Identity Center already encrypts data at rest using AWS-owned …

AWS IAM Identity Center now supports customer-managed KMS keys for encryption at rest Read More »

AWS Weekly Roundup: Amazon Bedrock, AWS Outposts, Amazon ECS Managed Instances, AWS Builder ID, and more (October 6, 2025)

Last week, Anthropic’s Claude Sonnet 4.5—the world’s best coding model according to SWE-Bench – became available in Amazon Q command line interface (CLI) and Kiro. I’m excited about this for two reasons: First, a few weeks ago I spent 4 intensive days with a global customer delivering an AI-assisted development workshop, where I experienced firsthand …

AWS Weekly Roundup: Amazon Bedrock, AWS Outposts, Amazon ECS Managed Instances, AWS Builder ID, and more (October 6, 2025) Read More »

Remote Access Risks & the Path to Resilient Organizations

Key Takeaways Remote access compromises, especially VPN exploits, are now the leading initial vector in ransomware attacks. Most breaches succeed due to missed basics: weak authentication, unpatched vulnerabilities, and misconfigurations. Resilience depends on consistent processes: enforce MFA, patch promptly, audit accounts, and monitor VPN activity. Remote access security is inseparable from business continuity and backup …

Remote Access Risks & the Path to Resilient Organizations Read More »

Veeam and Pure Storage: Cyber Resilience Delivered as-a-Service for the Modern Enterprise

Navigating a New Era of Resilient Enterprise Data Protection Enterprises face a relentless barrage of cyber threats while grappling with growing IT complexity and data sprawl. The cost of downtime and data loss is soaring, and traditional backup alone is no longer enough. Enterprises demand true cyber resilience—continuous, automated, and verifiable protection and clean recovery …

Veeam and Pure Storage: Cyber Resilience Delivered as-a-Service for the Modern Enterprise Read More »

Resilient by Design: Protecting Hybrid and Cloud‑Native Workloads with Veeam Kasten and Red Hat OpenShift

Key Takeaways:  Hybrid Cloud + Kubernetes Protection. Combining Veeam Kasten with Red Hat OpenShift delivers enterprise-grade backup, recovery, and mobility across VMs, containers, and cloud-native workloads. Future‑Proof Data Resilience. Immutable backups, policy-driven automation, and air-gapped storage defend against ransomware, human error, and compliance failures. Unified Platform for Modern Workloads. Veeam Kasten extends data protection to …

Resilient by Design: Protecting Hybrid and Cloud‑Native Workloads with Veeam Kasten and Red Hat OpenShift Read More »

Announcing Amazon ECS Managed Instances for containerized applications

Today, we’re announcing Amazon ECS Managed Instances, a new compute option for Amazon Elastic Container Service (Amazon ECS) that enables developers to use the full range of Amazon Elastic Compute Cloud (Amazon EC2) capabilities while offloading infrastructure management responsibilities to Amazon Web Service (AWS). This new offering combines the operational simplicity of offloading infrastructure with …

Announcing Amazon ECS Managed Instances for containerized applications Read More »

Scroll to Top