Red Hat Evolves Cloud Offering with Amazon Web Services

Red Hat Evolves Cloud Offering with Amazon Web Services

Businesses can now quickly and easily purchase supported Red Hat Enterprise Linux via AWS’ on demand, pay as you go Amazon Elastic Compute Cloud (Amazon EC2), thanks to an expansion of partnership between Red Hat and Amazon Web Services.

This expansion of relationship will also allow customers to bring their own licenses to AWS. All customers in every AWS Region will be able to use this new offering in the coming weeks, note the companies.

If you are an existing Red Hat Enterprise Linux customer you can easily instantiate Red Hat Enterprise Linux 5 and 6 in all Amazon EC2 Regions now under the Red Hat Cloud Access capability of Red Hat subscriptions.
Both companies will work together to additionally enable on-demand instances and support options and migrate existing on-demand beta customers to Amazon supported on-demand instances.

We are pleased to offer supported enterprise-class Red Hat Enterprise Linux on demand for our customers,” said Terry Wise, director of Business Development for Amazon Web Services. “Our customers have been vocal about their need to provision supported Red Hat Enterprise Linux in the same way that they provision AWS EC2 and only pay for what they use. This announcement is the result of an extensive collaboration between Red Hat and AWS to satisfy real customer needs.”

Giving developers broad access to Red Hat Enterprise Linux using Amazon EC2 is an important step in our evolution in the cloud,” said Scott Crenshaw, vice president and general manager, Cloud Business at Red Hat. “This is about giving customers and developers choice on how they deploy Red Hat Enterprise Linux and work to build the industry’s next-generation applications.”

Businesses all across the world standardize on Amazon EC2 web service as it provides highly available, secure, on demand, resizable compute capacity in the cloud.

This service can make web-scale computing easier for developers, commercial ISVs and enterprise IT organizations all across the world.

By Anuradha Shukla

Sorry, comments are closed for this post.

Comics
Through the Looking Glass: 2017 Tech and Security Industry Predictions

Through the Looking Glass: 2017 Tech and Security Industry Predictions

2017 Tech and Security Industry Predictions As we close out 2016, which didn’t start off very well for tech IPOs, momentum and performance has increased in the second half, and I believe that will continue well into 2017. M&A activity will also increase as many of the incumbents will realize that they need to inject…

Are Cloud Solutions Secure Enough Out-of-the-box?

Are Cloud Solutions Secure Enough Out-of-the-box?

Out-of-the-box Cloud Solutions Although people may argue that data is not safe in the Cloud because using cloud infrastructure requires trusting another party to look after mission critical data, cloud services actually are more secure than legacy systems. In fact, a recent study on the state of cloud security in the enterprise market revealed that…

Your Biggest Data Security Threat Could Be….

Your Biggest Data Security Threat Could Be….

Paying Attention To Data Security Your biggest data security threat could be sitting next to you… Data security is a big concern for businesses. The repercussions of a data security breach ranges from embarrassment, to costly lawsuits and clean-up jobs – particularly when confidential client information is involved. But although more and more businesses are…

The Cloud Is Not Enough! Why Businesses Need Hybrid Solutions

The Cloud Is Not Enough! Why Businesses Need Hybrid Solutions

Why Businesses Need Hybrid Solutions Running a cloud server is no longer the novel trend it once was. Now, the cloud is a necessary data tier that allows employees to access vital company data and maintain productivity from anywhere in the world. But it isn’t a perfect system — security and performance issues can quickly…

Cyber Security: McAfee on IoT Threats and Autonomous Cars

Cyber Security: McAfee on IoT Threats and Autonomous Cars

IoT Threats and Autonomous Cars Autonomous cars are just around the corner, there have been controversies surrounding their safety, and a few doubts still hang in the minds of people who don’t like the idea of a computer driving their car. However, the biggest news stories surrounding this topic have been to do with how…

Cyber Criminals Are Business People Too

Cyber Criminals Are Business People Too

Cyber Crime Business You’re on the morning train on the way to work and take a look at the guy next to you. He’s clean-cut, wearing a crisp suit and holding a leather briefcase just like dozens of others. Just another worker headed to the office, right?. Yes, but not in the way you think…

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart  Breaches Formal verification is not a new concept. In a nutshell, the process uses sophisticated math to prove or disprove whether a system achieves its desired functional specifications. It is employed by organizations that build products that absolutely cannot fail. One of the reasons NASA rovers are still roaming Mars…

Cloud Security Risks: The Top 8 According To ENISA

Cloud Security Risks: The Top 8 According To ENISA

Cloud Security Risks Does cloud security risks ever bother you? It would be weird if it didn’t. Cloud computing has a lot of benefits, but also a lot of risks if done in the wrong way. So what are the most important risks? The European Network Information Security Agency did extensive research on that, and…

Three Challenges of Network Deployment in Hyperconverged Infrastructure for Private Cloud

Three Challenges of Network Deployment in Hyperconverged Infrastructure for Private Cloud

Hyperconverged Infrastructure In this article, we’ll explore three challenges that are associated with network deployment in a hyperconverged private cloud environment, and then we’ll consider several methods to overcome those challenges. The Main Challenge: Bring Your Own (Physical) Network Some of the main challenges of deploying a hyperconverged infrastructure software solution in a data center are the diverse physical…