The need for a hybrid solution – Azure Stack HCI

  • Post author:

Microsoft's Azure Stack HCI is a hyper-converged infrastructure with virtualization, software-defined networking, and more. What separates it from the rest is it seamlessly integrates with Microsoft Azure. It's never been easier to unify your on-premises infrastructure with the power of Azure. We have listed below a few points for why you need this new & exciting hybrid solution for your business:- Azure Hybrid by design Extend…

Continue ReadingThe need for a hybrid solution – Azure Stack HCI

AWS Update:- Amazon EC2 now supports access to Red Hat Knowledgebase

  • Post author:

Starting today, customers running subscriptions included Red Hat Enterprise Linux on Amazon EC2 can seamlessly access Red Hat Knowledgebase at no additional cost. The Knowledgebase is a library of articles, frequently asked questions (FAQs), and best-practice guides to help customers solve technical issues.  Previously, subscriptions included RHEL customers on AWS who had to contact AWS Premium Support in order to access Red Hat Knowledgebase. Now, AWS…

Continue ReadingAWS Update:- Amazon EC2 now supports access to Red Hat Knowledgebase

AWS Update:- Amazon SNS now supports token-based authentication for APNs mobile push notifications

  • Post author:

For sending mobile push notifications to Apple devices, Amazon Simple Notification Service (Amazon SNS) now enables token-based authentication. You may now choose between token-based (.p8 key file) and certificate-based (.p12 certificates) authentication when creating a new platform application in the Amazon SNS dashboard or API.  Stateless communication between Amazon SNS and the Apple Push Notification service is enabled using token-based authentication (APNs). Because stateless communication does…

Continue ReadingAWS Update:- Amazon SNS now supports token-based authentication for APNs mobile push notifications

AWS Update:- Amazon ECS now adds container instance health information

  • Post author:

Customers may now see the health of their compute infrastructure using Amazon Elastic Container Service (Amazon ECS). The customers running their workloads using Amazon ECS on Amazon EC2 or on-premises with Amazon ECS anywhere can now examine the health status of the container runtime (i.e Docker) for their container instances directly from the Amazon ECS API. This would help customers to improve application resiliency.   In a very rare…

Continue ReadingAWS Update:- Amazon ECS now adds container instance health information

Microsoft 365 Update:- Viva Connections is now generally available!

  • Post author:

Viva Connections, part of Microsoft Viva, is your entry point to a modern employee experience. You get an all-in-one experience with the customized dashboard, the feed, and other relevant resources with the Viva connections app in Microsoft Teams mobile, web & desktop.   This GA (general availability) provides you with the ability to: -  Set a SharePoint home site from the SharePoint admin center  Create, author, and manage a dashboard from the home site Use the…

Continue ReadingMicrosoft 365 Update:- Viva Connections is now generally available!

Microsoft 365 Update:- Meeting Activities in Teams Audit Log

  • Post author:

Meeting Activities have been added to the Microsoft Teams audit log to help organizations respond more effectively to security events, forensic investigations, internal investigations, and compliance needs. This feature is available now.  Admins may now view TeamsMeetingActivities in the Microsoft 365 Audit Log and analyze specific activities across Microsoft 365 services with this feature upgrade.  Meeting Activities logs:  MeetingDetail: All about Teams meeting – the start time, end time & URL  MeetingParticipantDetail: This…

Continue ReadingMicrosoft 365 Update:- Meeting Activities in Teams Audit Log

Microsoft 365 Update:- Microsoft is retiring Security Policy Advisor in the Microsoft 365 Apps admin center

  • Post author:

Beginning November 8, 2021, Microsoft will stop supporting Security Policy Advisor. It is recommended that you use the Office cloud policy service.   Tenants who have not previously established a policy with Security Policy Advisor will have Security Policy Advisor disabled on November 8, 2021.  Microsoft will automatically start moving existing client policies from Security Policy Advisor to the Office cloud policy service after January 17, 2022. Security Policy Advisor will no…

Continue ReadingMicrosoft 365 Update:- Microsoft is retiring Security Policy Advisor in the Microsoft 365 Apps admin center

Azure Update:- Global Disaster Recovery via Azure Site Recovery

  • Post author:

Azure Site Recovery is a Cloud-driven, highly innovative, and automated disaster recovery solution (DRaaS). Azure's native platform capabilities for high availability and disaster recovery continue to ensure the highest levels of resilience from big and small outages. To ensure high availability and disaster recovery poster. In 2018, Microsoft became the first large public cloud provider to launch a first-class cloud-native disaster recovery solution with Azure-to-Azure Disaster…

Continue ReadingAzure Update:- Global Disaster Recovery via Azure Site Recovery

Azure Update:- Screen Capture Protection for Azure Virtual Desktop

  • Post author:

Azure Virtual Desktop is a service running in the cloud that enables your users to access the data, applications, and resources granted by the organization from any allowed and supported device,  anywhere and anytime, with just an active internet connection. Data protection has been a top priority for all organisations. Now Microsoft has enabled screen capture protection for Azure Virtual Desktop. This feature prevents sensitive data…

Continue ReadingAzure Update:- Screen Capture Protection for Azure Virtual Desktop

Azure Update:- Immutable Storage with versioning for Blob storage

  • Post author:

Azure blob storage is massively scalable and secure object storage for cloud-native workloads, archives, data lakes, high-performance computing and machine learning. It is very important to protect this data from unintentional deletion. Keeping this in mind Microsoft has recently announced Immutable storage with versioning for Blob Storage is which is now generally available. It provides the capability to store data in WORM (Write Once, Read Many)…

Continue ReadingAzure Update:- Immutable Storage with versioning for Blob storage

How is Cloud transforming Industries?

  • Post author:

Cloud technology has been impactful in transforming business. From cost savings to easy collaboration, the usage of the Cloud has significantly increased in the past few years. Cloud technology is so reliable when it comes to safety that 94% of businesses report significant improvements in online security after moving their data to the cloud. 91% said that the cloud makes it easier to meet government-compliant requirements.…

Continue ReadingHow is Cloud transforming Industries?

4 Tips for Protection Against Unsafe Emails

  • Post author:

Earlier, the spotting of malicious content in emails was quite an easy task. However, due to the rise in technology, it has become increasingly difficult to detect this malware. One of the primary reasons for it is that nowadays, these cyber-attacks are planned and executed by professionals, who make it seem like they have been sent from a known contact– might be a friend, your work…

Continue Reading4 Tips for Protection Against Unsafe Emails

How is hybrid cloud useful for midsize/large businesses?

  • Post author:

A hybrid cloud can be defined as a cloud computing environment that utilizes a combination of on-premises private cloud and third-party public cloud services with instrumentation between the two. Cloud service providers offer services such as data storage, work environments & security. Businesses can customize their experience to meet their demands and objectives. If we compare the hybrid cloud market to other cloud services in the…

Continue ReadingHow is hybrid cloud useful for midsize/large businesses?

How to Protect Your Data from a Ransomware Attack

  • Post author:

What is a Ransomware attack? It can be defined as a malware attack that is carried out deliberately to encrypt your data and/or the whole system. In most cases, a ransom is demanded by the assailant to decrypt your data, so that you can access it again. Lately, there has been a surge in the demand for cryptocurrency as a form of payment since it is…

Continue ReadingHow to Protect Your Data from a Ransomware Attack

Microsoft Teams Updates (June 2021)

  • Post author:

In this blog, we will be discussing the various Microsoft Teams updates in the month of June. Meeting Updates: Presenter Mode During the past few months, this feature has been heavily promoted by Microsoft, finally you can start using this latest meeting feature that gives you an added advantage with respect to how you want to present your content & video feed to your viewers. The…

Continue ReadingMicrosoft Teams Updates (June 2021)

Microsoft rebrands Windows Virtual Desktop as Azure Virtual Desktop

  • Post author:

Microsoft’s virtual desktop infrastructure platform has been rebranded under the Azure name and notified of new security and management capabilities that are currently under preview. Formerly known as the Windows Virtual Desktop (WVD), the platform will now be known as Azure Virtual Desktop (AVD), Microsoft said in an official statement on the 6th of June 2021. The organization has also launched early access to several features in…

Continue ReadingMicrosoft rebrands Windows Virtual Desktop as Azure Virtual Desktop

How Startups can succeed with Cloud Computing?

  • Post author:

Startups are an enjoyable but demanding professional experience. A host of entrepreneurially dedicated professionals pursue their passion and dive into the world of launching their own company with meteoric growth from businesses. E.g., Facebook, Uber, and Airbnb. It is noted that in the fast-paced world of startups, there are a lot of challenges that are not faced in the regular office environment. From infrastructure to marketing,…

Continue ReadingHow Startups can succeed with Cloud Computing?

A quick look at the 4 Most Used Services on Microsoft Azure

  • Post author:

1. Azure Compute Azure compute is an on-demand computing service for running cloud-based applications. Azure compute service can be divided broadly into three categories. Infrastructure as a service Virtual Machine: It is an IaaS service that allows us to deploy and manage VMs inside a virtual network (VNet). The most fundamental building block is the Azure virtual machine. We don’t need to buy any physical hardware and bear its maintenance…

Continue ReadingA quick look at the 4 Most Used Services on Microsoft Azure

Amazon CloudFront

  • Post author:

Amazon CloudFront is a brisk Content Delivery Network (CDN) service that safely transfers data, videos, applications, and Application Programming Interface (APIs) to patrons all around the world with low latency, high transfer speeds, in an environment that is developer-friendly.CloudFront is amalgamated with AWS- both are physical locations directly linked to the AWS global infrastructure, plus other services provided by AWS. CloudFront works immaculately with services like…

Continue ReadingAmazon CloudFront

AWS Security Features

  • Post author:

The Amazon Web Services (AWS) in terms of security follow a shared responsibility model. So, the security ‘of’ the cloud is on the shoulders of AWS, whereas you and your organization’s development team have to look after the security “in” the cloud. Hence, the protection of the infrastructure of the cloud, including hardware, software, and networking falls under the territory of AWS. All the other security objectives, including…

Continue ReadingAWS Security Features