[Azure Updates] We are excited to announce the general availability of customer managed unplanned failover for Azure Data Lake Storage (ADLS) and storage accounts with SSH […]
[Azure Updates] Azure Confidential Ledger is now SOC 2 Type II compliant. The SOC 2 Type II certification is a rigorous standard for data security, availability, […]
[Azure Updates] The provisioned v2 model for Azure Files HDD (standard) pairs predictability of total cost of ownership with flexibility, allowing you to create a file […]
[Azure Updates] We are excited to announce Azure NetApp Files volume enhancement with support for 50 GiB minimum volume sizes.Customers can now create an Azure NetApp Files […]
[Azure Updates] The default maximum request rate for general-purpose v2 and Blob storage accounts has been increased from 20,000 to 40,000 requests per second in the […]
[Azure Updates] We have published an availability Service Level Agreement (SLA). The SLA can be found here, and will provide peace of mind for those of […]
[Azure Updates] In today’s digital landscape, cloud administrators face the challenge of ensuring data and applications remain protected, compliant, and resilient amidst evolving cyber threats. We’re […]
[Azure Updates] We are excited to unveil key advancements in Azure Container Storage, our purpose-built storage solution for stateful containers on Azure Kubernetes Service (AKS). These […]
[Azure Updates] Announcing the general availability of cool access feature support with large volumes. This allows tiering of infrequently accessed data on large volumes under standard, […]
[Azure Updates] Secure by default with soft delete for Azure Backup enables you to recover your backup data even after it’s deleted. With enabling soft delete […]
[Azure Updates] Azure Backup users will now have immutable WORM storage for their backups when immutability is enabled and locked on a Recovery Services Vault. When […]
[Azure Updates] Azure File Sync support for managed identities is now in public preview.Managed Identity eliminates the need for shared keys as a method of authentication […]