Imagine the situation: you browse your Amazon S3 bucket and suddenly discover that some files are missing. Since Amazon S3 offers high durability, it leaves almost no chance to these files to disappear due to a system failure or disaster. Apparently, they were deleted by a user. How to find out who did that?
We are always trying to stay on top of the new functionality introduced by Amazon. In this guide, we will describe how to create and access Amazon S3 endpoint in your VPC.
Amazon Virtual Private Cloud (Amazon VPC) is the Amazon service that allows you to create and manage virtual private networks. By default, all AWS resources are accessed via the public Internet. You may need to restrict access to your cloud network due to security requirements of your project. Before now, you had to allow internet communications between your VPC and AWS resources that you need. The recently introduced feature called VPC Endpoints allows you to keep your VPC truly private and grant access only to the resources that you need directly from the network itself. Continue reading →
Once you have used a cloud storage service, you are most likely going to be faced with its different types: block-, file- and object storage. These types determine how data is stored and used. We are going to explain in depth, one of the most commonly used storage types – object storage.Continue reading →
Amazon re:Invent is the biggest and the final conference about everything cloud in the world. And it's happening right now. CloudBerry Lab team traditionally went there to meet customers, share opinion with other experts and show the latest generation of CloudBerry Backup - the 5.8 with Ransomware Protection.
Meet us at our booth 530! The last day of the conference is 1st of December. Continue reading →
Microsoft and Amazon have recently increased the disk volume limits for their virtual machines running on Azure and EC2. At CloudBerry Lab, we always keep up with the latest developments and today announce the support for these increased disk sizes in the CloudBerry Backup 5.8. Continue reading →
By using cloud storage, in today’s world, we need to make additional efforts in keeping the data protected. If you create a cloud-based folder with the same sharing practices, hackers and industrial spies can access it, even if you do not show the URL on the Internet.
In this article, you will learn about some recent data leaks and how to keep your sensitive data safe by implementing encryption and IAM policy best practices. Continue reading →
Designing a comprehensive backup strategy is a task of utmost importance for any organization. In considering various aspects of this strategy, perhaps the most important objective is to strike a balance between a sensible retention policy and manageable storage fees. Traditional retention policies that work off file versions can quickly become too costly for long-term storage. Thus, a more cost-effective retention design and solution is required.
A disaster could hardly be planned, but disaster recovery planning is a must. The core of successful disaster recovery is, of course, backup.
Nowadays, cloud storage providers are widely used for storing backups. However, the biggest cloud storage providers have created various services to perform recovery in the cloud. Today we will discuss the need for cloud disaster recovery and its peculiarities.Continue reading →