AWS Partner Network (APN) Blog

Category: Customer Solutions

How to Shift Left Security in Infrastructure as Code Using AWS CDK and Checkmarx KICS

Integrating security scanning into infrastructure as code (IaC) allows detecting misconfigurations early in development. This post explores using the KICS plugin from Checkmarx with AWS CDK. Learn how KICS performs static code analysis to find vulnerabilities and compliance issues in IaC and scans the CDK code to report findings, failing the command for high-severity issues. This shifts security left, mitigating risks in deployed infrastructure.

Road-Services-Adobe-2024-1

How Road Services Seamlessly Integrate with Transportation Management via Bosch L.OS on AWS

The logistics industry lacks transparency due to fragmentation and complex supply chains. Bosch L.OS offers a cloud platform integrating services like transportation and fleet management systems. Learn how Bosch collaborated with AWS and Storm Reply to develop an SDK for seamlessly integrating truck parking booking services from providers. The reusable SDK simplifies integration for logistics companies, reducing development effort.

Comprinno-APN-Blog-030724

AWS Well-Architected Framework Reviews Powered by Tevico: Transforming Challenges into Engaging Adventures

The AWS Well-Architected Framework provides best practices for cloud architectures across six pillars. Comprinno’s Tevico enhances the Well-Architected review experience through collaboration tools, automatic risk identification, integrated remediation planning, and a knowledge base. Key features include visual diagramming, multi-user collaboration, auto-discovery of risks, and more. With AWS integration, Tevico helps customers comprehensively evaluate their workloads and swiftly remediate high-risk issues.

Revolutionize Your Business with AWS Generative AI Competency Partners

With the ability to automate tasks, enhance productivity, and enable hyper-personalized customer experiences, businesses are seeking specialized expertise to build a successful generative AI strategy. To support this need, we’re excited to announce the AWS Generative AI Competency—an AWS Specialization that helps AWS customers more quickly adopt generative AI solutions and strategically position themselves for the future.

Transforming Hybrid Mainframe Data Access with VirtualZ Lozen and AWS

Traditional mainframe applications create data integration challenges when modernizing on the cloud. VirtualZ’s Lozen allows secure, real-time access to mainframe data from AWS without replication. This simplifies application migration while retaining the mainframe system of record. Lozen utilizes efficient data transformation and optimized protocols to improve performance, and is zIIP-eligible for additional cost savings.

Hightouch-APN-Blog-030424

The Composable CDP: Activating Data from Amazon Redshift to 200+ Tools Using Hightouch

Customer data is critical for modern digital organizations, but is often scattered across tools which can render it useless. Historically, customer data platforms (CDPs) aimed to consolidate data for insights and activation, but organizations now prefer a composable CDP architecture on AWS to sync data from Amazon Redshift and Amazon S3 into downstream tools. Hightouch facilitates this composable CDP approach, making it easy to activate AWS data across channels without engineering work.

Protegrity-APN-Blog-030424

Data Tokenization with Amazon Redshift Dynamic Data Masking and Protegrity

As data becomes increasingly valuable, robust security measures are critical. This post reviews how Protegrity’s tokenization integration with Amazon Redshift Dynamic Data Masking enables organizations to effectively protect sensitive data. It provides an overview of key concepts like Protegrity Vaultless Tokenization and Redshift Dynamic Data Masking, including code examples to better safeguard sensitive information within their Redshift data warehouse both at rest and in use.

Simplifying Mobile Device Management for Apple Devices with Jamf Pro

Amazon EC2 Mac instances provide Apple hardware to develop for iOS and macOS at scale. Dependencies for building apps require privileged access, normally needing manual user approval. By enrolling EC2 Macs into Mobile Device Management (MDM) with Jamf Pro, administrators can automate remote configuration and software deployment without per-instance interaction. After launching an instance and installing required profiles with Jamf, users should create an AMI to retain the instance state.

Stratus10-APN-Blog-030124

How to Streamline AMI Management Through Enhanced Automation with Stratus10

Amazon Machine Images (AMIs) allow quick deployment of EC2 instances, but managing multiple customized AMIs is complex. Stratus10’s Image Management Solution automates and streamlines AMI building, testing, and deployment using EC2 Image Builder. It provides consistency, integrates with current processes, reduces costs, and improves security. By eliminating manual processes, engineering teams can focus on innovation while hardened images ensure best practices.

How Accenture Accelerates Building a Secure Cloud Foundation Natively on AWS

Enterprise cloud adoption enables scalability but can introduce security and compliance challenges from decentralized builders and disparate growth. Accenture’s Secure Cloud Foundation on AWS provides a well-defined, automated account provisioning process with guardrails to enable secure and streamlined self-service innovation across teams. It establishes robust cloud foundations to automate security and break organizational barriers for accountability and outcomes.