AWS Partner Network (APN) Blog

Category: Technical How-to

Shellkode-APN-Blog-020524

How Shellkode Uses Amazon Bedrock to Convert Natural Language Queries to NoSQL Statements

Large language models like Amazon Bedrock can generate MongoDB queries from natural language questions, transforming how users access NoSQL databases. By leveraging AI and language models, this solution allows business users to query MongoDB data through conversational English instead of code. It connects to MongoDB with PyMongo, generates queries with LangChain and Bedrock, retrieves and formats results into natural language answers.

Vcinity-APN-Blog-013124

Establishing a Continuous Data Pipeline with Vcinity on AWS

Vcinity’s data movement and remote data access solutions enable enterprises to build continuous data pipelines that provide secure, performant access to distributed data. By extending high-speed networking protocols over wide area networks, Vcinity allows AWS services to operate on remote data as if it were local, reducing data transfer costs and latency. This enables real-time analytics, AI/ML model training, cloud migrations, and other use cases.

Automated and Consistent Security Coverage for Amazon EC2 Workloads with Uptycs and AWS Systems Manager

Uptycs and AWS Systems Manager integration provides automated, consistent deployment of Uptycs sensors across Amazon EC2 instances. This enhances security by ensuring full coverage, reducing misconfigurations, and streamlining management. Uptycs is an AWS Specialization Partner offering cloud-native application protection and endpoint detection and response. The integration leverages AWS Systems Manager’s capabilities for centralized instance management.

Secure and Optimize Your Multicloud Deployments with Cisco Multicloud Defense

Cisco Multicloud Defense is a highly scalable, on-demand as-a-service solution that provides cloud-native and flexible security to your multicloud infrastructure. It unifies security controls across cloud environments, protects workloads from multiple directions, and drives operational efficiency with automation and orchestration of cloud-native constructs. Cisco Multicloud Defense consists of two major components: Multicloud Defense Controller and Cisco Multicloud Defense Gateway.

Clinical-Trials-1

Accelerate Clinical Research with Real-World Data Using AWS Data Exchange for Amazon Redshift 

Verana Health leverages an exclusive real-world data network and AI-enhanced data engine to transform healthcare data into curated, disease-specific data modules called Qdata. This powers Verana’s analytics solutions for real-world evidence generation, clinical trials, quality reporting, and registry data management to enhance patient care and quality of life. Through AWS Data Exchange and Amazon Redshift, Verana offers life sciences customers easy, convenient access to high-quality clinical real-world data for research.

Sustainability-Adobe-2024-1

Building Carbon Accounting Solutions with TensorIoT on AWS

TensorIoT leverages AWS services and the Guidance for Carbon Accounting framework to build carbon accounting solutions. It provides a technical walkthrough for calculating a facility’s Scope 2 emissions using EPA data on building energy use and electricity emissions factors. The solution allows input of building details like type, area, and zip code to estimate or calculate emissions, and AWS services provide adaptability, transparency, efficiency, and security.

VMware-Cloud-AWS-012524

Using IAM Roles Anywhere to Help Secure VMware Cloud on AWS Workloads

AWS IAM Roles Anywhere allow you to use identity and access management roles to obtain temporary credentials for workloads outside AWS. This minimizes exposed credentials, enables centralized access controls with AWS IAM, and provides granular permissions to virtual machines. Explore common use cases for using IAM Roles Anywhere for your workloads running on VMware Cloud on AWS and the relevant setup process on a virtual machine in VMware Cloud on AWS.

Devoteam-APN-Blog-012324

Automating OpenID Connect-Based AWS IAM Web Identity Roles with Microsoft Entra ID

For applications running outside AWS, developers often create IAM users with long-lived credentials which can increase security risks. Instead, learn how to integrate AWS IAM Web Identity Roles with Microsoft Entra ID for centralized user management. This post walks through manual setup steps to register an app in Entra ID and create a role in AWS, and describes an automated architecture to synchronize Entra ID service principals and AWS roles.

Red-Hat-APN-Blog-012324

Enhanced Threat Detection with AWS Security Hub and Red Hat Advanced Cluster Security for Kubernetes

AWS customers can run Kubernetes on managed services like Amazon EKS or self-managed options. To secure these environments, Red Hat Advanced Cluster Security for Kubernetes (RHACS) detects vulnerabilities and policy violations. Its findings can be sent to AWS Security Hub which aggregates security issues across AWS services. This post walks through installing RHACS on Red Hat OpenShift Service on AWS, creating policies in RHACS, and integrating with Security Hub to view findings.

How to Accelerate Asset Visibility with Claroty Edge on AWS Snowcone

Industrial IoT adoption is increasing the connectivity of operational technology to IT systems, necessitating better visibility into assets. Claroty Edge on AWS Snowcone enables asset discovery to build an accurate inventory and identify vulnerabilities. Combined with Claroty xDome, this provides comprehensive IT/OT asset management and vulnerability insights. xDome integrates with AWS Security Hub to simplify deploying asset visibility and enable organizations to defend and secure their connected environments.