AWS Storage Blog
Best practices for connecting your Veeam on-premises environment to Amazon S3
Many users safeguard their on-premises infrastructure with Veeam Backup & Replication (VBR). This is done to minimize the physical backup infrastructure they need to acquire and maintain. Additionally, they seek to make sure that their backups reside in highly durable, secure, and cost-effective storage solutions. By using Amazon Simple Storage Service (S3), VBR users can […]
Direct Supply bolsters availability migrating to Amazon FSx for Windows File Server
Direct Supply, the leading provider of products and services to the Long-Term Care industry, migrated the bulk of our IT systems to AWS in early 2019. In the run-up to our cut over, we had five Server Message Block (SMB) file systems that needed to live alongside the applications they support. This meant that roughly […]
Migrate data from Google Drive to Amazon S3 using Rclone
Whether you choose to operate entirely on AWS or in multicloud and hybrid environments, one of the primary reasons to adopt AWS is the broad choice of services we offer, enabling you to innovate, build, deploy, and monitor your workloads. Amazon S3 is a great option for Google Drive users seeking a comprehensive storage solution. […]
Securing your Amazon FSx for ONTAP Windows Share (SMB) against Viruses
Organizations want to securely store and access their data, while adhering to security best practices by deploying and enforcing various policies. This includes using antivirus programs to scan and disinfect data at rest and on-access to help align with various compliance standards. Since the release of Amazon FSx for NetApp ONTAP, many customers are migrating […]
A guide to budgeting for AWS Backup in VMware virtual environments
As VMware customers navigate the imperative to modernize their virtual environments, the need for reliable and cost-effective data protection has become paramount. Traditionally, evaluating data protection solutions has involved intricate calculations around software licensing, storage costs, and operational expenses. AWS Backup offers VMware customers a simpler, more transparent path forward. By eliminating upfront software fees […]
Designing sustainable disaster recovery strategies
Disaster recovery (DR) is an important part of resilience and defines the process of preparing and recovering from a disaster. A disaster can be defined as any event that causes a serious negative impact to your business. How you respond to these unforeseen events has traditionally been a tradeoff between the cost of the solution, […]
Automatically scan for public Amazon S3 buckets and block public access
Data is a valuable asset for an organization and users are always looking for simple tools to protect their data from unauthorized access. While some use cases do require data to be publicly accessible at times, most enterprise use cases and data privacy depend on strictly managed permissions and no public access. Enterprises use Amazon […]
Secure data in a multi-tenant environment by automatically enforcing prefix-level encryption keys in Amazon S3
Many organizations need to store and process data that belong to multiple entities, commonly referred to as multi-tenancy. In these situations, it is important to secure every tenant’s data and ensure that a consumer can only access the data that they require for their responsibilities and nothing more. In particular, if a user or application […]
Simplify Active Directory authentication with a custom identity provider for AWS Transfer Family
The secure exchange of files business-to-business is a common and important business practice in highly regulated industries. As organizations grow, maintaining separate user credentials for various platforms, such as file transfer services, can become increasingly complex and time-consuming. As customers build out Managed File Transfer (MFT) environments, often they end up having to create separate, […]
Building cyber resiliency with AWS Backup logically air-gapped vault
Enterprise users use AWS Backup for centralized data protection as part of a defense-in-depth architecture. Its features generally fulfill users’ data security and regulatory requirements, but there is demand for additional resiliency against ransomware incidents. Meeting the recovery objectives often involves creating multiple copies of data backups, developing and maintaining custom code for backup processes, […]