November 2024

Ransomware Resilience for Financial Services: Swift Recovery with Veeam Data Platform

In today’s digital landscape, financial institutions face an ever-growing threat from ransomware attacks. These attacks can cripple operations, compromise sensitive data, and lead to significant financial losses. However, with the right tools and strategies, financial services can not only defend against these threats but also recover swiftly when they occur. Enter the Veeam Data Platform, …

Ransomware Resilience for Financial Services: Swift Recovery with Veeam Data Platform Read More »

Replicate changes from databases to Apache Iceberg tables using Amazon Data Firehose (in preview)

Today, we’re announcing the availability, in preview, of a new capability in Amazon Data Firehose that captures changes made in databases such as PostgreSQL and MySQL and replicates the updates to Apache Iceberg tables on Amazon Simple Storage Service (Amazon S3). Apache Iceberg is a high-performance open-source table format for performing big data analytics. Apache …

Replicate changes from databases to Apache Iceberg tables using Amazon Data Firehose (in preview) Read More »

Centrally managing root access for customers using AWS Organizations

AWS Identity and Access Management (IAM) is launching a new capability allowing security teams to centrally manage root access for member accounts in AWS Organizations. You can now easily manage root credentials and perform highly privileged actions. Managing root user credentials at scale For a long time, Amazon Web Services (AWS) accounts were provisioned with highly …

Centrally managing root access for customers using AWS Organizations Read More »

Empowering Resellers: How to Drive Customized Value to IT Teams

“If You’re Selling to Everyone, You’re Selling to No One.” When selling any product or service, if you’re trying a one-size fits all approach and selling to everyone as if they’re all the same, you won’t make much progress in that sale. You want to drill down to the specifics of your customer, including their …

Empowering Resellers: How to Drive Customized Value to IT Teams Read More »

Introducing resource control policies (RCPs), a new type of authorization policy in AWS Organizations

Today, I am happy to introduce resource control policies (RCPs) – a new authorization policy managed in AWS Organizations that can be used to set the maximum available permissions on resources within your entire organization. They are a type of preventative control that help you establish a data perimeter in your AWS environment and restrict …

Introducing resource control policies (RCPs), a new type of authorization policy in AWS Organizations Read More »

Enterprise-scale, Cloud-native Resilience and Modern Virtualization with Veeam Kasten v7.5

This is the week we’ve all been waiting for! KubeCon + Cloud NativeCon North America has officially kicked off in Salt Lake City, UT. Join us there to learn more about cloud-native computing, see our Project Pavilion showcase, and get a first look at Veeam Kasten v7.5 at booth #K7. Plus, visit our event site …

Enterprise-scale, Cloud-native Resilience and Modern Virtualization with Veeam Kasten v7.5 Read More »

Veeam Ransomware Detection: Your Early Warning System

The Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC) has released a joint advisory with other international partners regarding the People’s Republic of China (PRC) cyber group APT40. This advisory serves as a warning about the current threat this group poses to not only Australian networks and citizen data, but internationally, including the United …

Veeam Ransomware Detection: Your Early Warning System Read More »

Scroll to Top