Category Archives: Blog

Announcing Additional Data Connectors for Amazon AppFlow

Gathering insights from data is a more effective process if that data isn’t fragmented across multiple systems and data stores, whether on premises or in the cloud. Amazon AppFlow provides bidirectional data integration between on-premises systems and applications, SaaS applications, and AWS services. It helps customers break down data silos using a low- or no-code, […]

New ML Governance Tools for Amazon SageMaker – Simplify Access Control and Enhance Transparency Over Your ML Projects

As companies increasingly adopt machine learning (ML) for their business applications, they are looking for ways to improve governance of their ML projects with simplified access control and enhanced visibility across the ML lifecycle. A common challenge in that effort is managing the right set of user permissions across different groups and ML activities. For […]

AWS Verified Access Preview — VPN-less Secure Network Access to Corporate Applications

Today, we announced the preview of AWS Verified Access, a new secure connectivity service that allows enterprises to enable local or remote secure access for their corporate applications without requiring a VPN. Traditionally, remote access to applications when on the road or working from home is granted by a VPN. Once the remote workforce is […]

Cloud vs. Bare Metal is not so clear-cut

Looking for hosting solutions, you’ve definitely come across VPS and dedicated server hosting many times. But in recent years the probability of coming across some other hosting services, namely cloud hosting and bare metal hosting has grown exponentially. If you still don’t know the difference between these later solutions, then this article is a must-read […]

Forrester offers guidance on getting zero trust right and achieving security goals

Tighter budgets, a near-record level of projects to be done with a smaller staff and a rising number of malware-free attacks are a few of the many challenges taking the security team’s time away from zero trust. CISOs tell VentureBeat that consolidating their tech stacks to improve visibility, reduce costs and make progress on zero-trust frameworks is the highest priority. However, […]