AWS News Blog

Category: Storage

New – Simplify Access Management for Data Stored in HAQM S3

Update (4/27/2023): HAQM S3 now automatically enables S3 Block Public Access and disables S3 access control lists (ACLs) for all new S3 buckets in all AWS Regions. Today, we are introducing a couple new features that simplify access management for data stored in HAQM Simple Storage Service (HAQM S3). First, we are introducing a new […]

AWS Back Support for VMware diagram

New for AWS Backup – Support for VMware and VMware Cloud on AWS

Today, I am happy to announce AWS Backup support for VMware, a new capability that enables you to centralize and automate data protection of virtual machines (VMs) running on VMware on premises and VMware CloudTM on AWS. You can now use a single, centrally managed policy in AWS Backup to protect these VMware environments together […]

New – Use HAQM S3 Event Notifications with HAQM EventBridge

We launched HAQM EventBridge in mid-2019 to make it easy for you to build powerful, event-driven applications at any scale. Since that launch, we have added several important features including a Schema Registry, the power to Archive and Replay Events, support for Cross-Region Event Bus Targets, and API Destinations to allow you to send events […]

Console screenshot.

New for AWS Compute Optimizer – Resource Efficiency Metrics to Estimate Savings Opportunities and Performance Risks

By applying the knowledge drawn from HAQM’s experience running diverse workloads in the cloud, AWS Compute Optimizer identifies workload patterns and recommends optimal AWS resources. Today, I am happy to share that AWS Compute Optimizer now delivers resource efficiency metrics alongside its recommendations to help you assess how efficiently you are using AWS resources: A dashboard […]

Scalable, Cost-Effective Disaster Recovery in the Cloud

Should disaster strike, business continuity can require more than just periodic data backups. A full recovery that meets the business’s recovery time objectives (RTOs) must also include the infrastructure, operating systems, applications, and configurations used to process their data. The growing threats of ransomware highlight the need to be able to perform a full point-in-time […]