AWS Partner Network (APN) Blog

Category: Intermediate (200)

BeyondTrust-APN-Blog-110325.png

Enhance Cloud Identity Security with BeyondTrust on AWS

Discover how AWS and BeyondTrust deliver comprehensive identity security solutions that enable organizations to implement zero trust principles, manage privileged access, and accelerate secure cloud adoption. Learn about six essential identity security controls including just-in-time access, enhanced remote access features, and automated secrets management that help organizations reduce identity-based risks while maintaining operational efficiency across cloud, hybrid, and on-premises environments.

Strengthen AWS Security Posture with Robust Infrastructure as Code Strategy

Learn how to enhance your AWS security within your organization through Infrastructure as Code using ControlMonkey together with AWS Control Tower. This post illustrates the usage of both tools to comply with the PCI DSS standard. We’ll first look at how AWS Control Tower provides a foundation for secure, compliant infrastructure. Afterwards, we’ll explore how ControlMonkey enhances this foundation by allowing teams to enable control policies that are directly added to the IaC review GitOps process.

ASAPP-APN-Blog-102825.png

ASAPP’s GenerativeAgent: Transforming Airline Customer Service with AWS

ASAPP, an AWS Advanced Partner, provides AI-powered solutions for customer service. Founded in 2014, ASAPP helps transform contact centers by automating tasks, assisting representatives, and improving customer experience. Their GenerativeAgent platform handles complex conversations while maintaining enterprise-level performance and safety standards. This blog explains how ASAPP’s GenerativeAgent platform, built on AWS infrastructure, combines cloud capabilities with specialized AI to transform customer service operations.

SurePathAI-APN-Blog-103125

Securing Generative AI: How Enterprises Can Govern Workforce Use of Generative AI with SurePath AI

The rapid adoption of generative AI tools by employees is revolutionizing workflow efficiency and productivity across industries. The workforce usage of public AI models requires unique security considerations that traditional approaches struggle to address. This post delves into how SurePath AI empowers organizations to navigate these challenges, implementing robust security frameworks for Gen AI adoption. We will see how SurePath AI enables safe innovation while helping protect sensitive data, and maintaining regulatory compliance.

Zendesk-APN-Blog-103125

From Idea to App in Minutes: Introducing Zendesk App Builder with Amazon Bedrock

Over the past few years, no-code and low-code platforms have revolutionized software development. As AI assistance becomes commonplace, organizations seek tools that bridge the gap between vision and execution. Zendesk App Builder, powered by Amazon Bedrock and built on AWS, offers a solution that allows customers to create custom apps that extend Zendesk’s capabilities to meet unique customer service needs.

Kong-APN-Blog-Unlock-Advanced-AI-Control-with-Kong-AI-Gateway-And-Amazon-Bedrock-06102025

Unlock Advanced AI Control with Kong AI Gateway And Amazon Bedrock

The integration of Amazon Bedrock and Kong AI Gateway provides organizations with a comprehensive solution for scaling generative AI implementations, addressing key challenges in cost management, model orchestration, and operational visibility. Through Kong AI Gateway’s token-based cost controls, automated semantic routing across multiple LLMs, and comprehensive AI observability features, organizations can effectively manage and govern their AI applications while leveraging Amazon Bedrock’s secure foundation of leading foundation models and managed infrastructure.

Orca Security-APN-Blog-131025

Reduce Vulnerabilities on AWS with Orca Security’s Reachability Analysis

Orca Security’s innovative Reachability Analysis solution addresses the growing challenge of vulnerability management in AWS environments, offering a critical response to the 34% year-over-year increase in vulnerability exploitation reported in 2025. The solution combines Agentless Reachability Analysis, utilizing patented SideScanning™ technology for deep static inspection, with Dynamic Reachability Analysis through their eBPF-based Orca Sensor, providing comprehensive visibility across AWS services including Amazon ECR, EC2, Lambda, ECS, and EKS. Through this dual approach, organizations can achieve a 90% reduction in exploitable vulnerabilities while significantly reducing alert fatigue, as the system intelligently distinguishes between truly exploitable vulnerabilities and those that pose minimal risk in production environments.

Cisco-APN-Blog-10052025

Enhance Identity Governance and Protection on AWS using Cisco Duo IAM

Decentralization of work and infrastructure in hybrid environments is leading to identity and access management challenges due to lack of centralized visibility and governance. In this blog, let’s learn how customers can solve these challenges and enhance their identity governance and security with Cisco Duo Identity Federation and advanced access management features. Cisco Duo seamlessly integrates with AWS IAM Identity Center and other identity sources and acts as an identity aggregator that efficiently routes user authentication to appropriate sources. This integrated solution delivers both improved security with end-to-end phishing resistance and AI-driven identity intelligence, and a simplified user experience through passwordless authentication.

Build Secure Generative AI Solutions with AWS and Zscaler

Generative AI is rapidly transforming how enterprises operate, but security remains a critical concern. According to the Zscaler ThreatLabz 2025 AI Security Report, while AI/ML tool usage has surged 36x year-over-year, 60% of this traffic was blocked due to security concerns. This post demonstrates how AWS and Zscaler’s integrated security controls help protect AI workloads while maintaining compliance and data protection.

Couchbase-APN-Blog-092525

Building Serverless RAG Applications with Couchbase and Amazon Bedrock

This blog post explores how combining Couchbase vector search capabilities with Amazon Bedrock’s foundation models creates a powerful, Serverless Retrieval Augmented Generation (RAG) solution that enables organizations to enhance AI interactions with their specialized knowledge while reducing operational overhead. The Serverless architecture, which integrates Couchbase Capella, Amazon Bedrock, AWS Lambda, and Amazon API Gateway, allows organizations to build intelligent applications that deliver contextually relevant responses while maintaining cost efficiency through automatic scaling and pay-per-use pricing.