AWS Partner Network (APN) Blog

Category: Thought Leadership

Bosch-APN-Blog-081123

Build and Deploy Secure AI Applications with AIShield and Amazon SageMaker

Adversarial machine learning (AML) attacks, also known as “artificial intelligence attacks” (AI attacks), involve deliberate attempts to manipulate or compromise machine learning models or even make it reveal sensitive information. Explore how AIShield‘s seamless integration within the Amazon SageMaker environment alleviates AI security concerns by mitigating risks before and after deployment, enabling customers to develop and deploy AI applications with confidence.

Leveraging AWS Analytic Services and HCLTech Frameworks for OLAP Solutions

Online analytical processing (OLAP) is a method of organizing datasets in a multi-dimensional format for quick analysis and provides deeper insights for decision-makers. Multi-dimension analysis is widely adopted by analysts, knowledge users, and power users for their decision support process. Learn how utilizing AWS analytic services and migration tools together with HCLTech frameworks to orchestrate OLAP solutions.

Demystifying Mainframe Modernization with Best Practices from AWS and Accenture

Various paths can be taken to address the perceived need for modernization. Some consider moving existing mainframe applications to distributed or cloud platforms to reduce costs, enhance performance, and increase business agility as a form of modernization. Learn how the Accenture AWS Business Group (AABG) simplifies mainframe modernization complexity with its Mainframe Zero Approach. Accenture offers comprehensive solutions to migrate and manage operations on AWS.

Streamlining Secrets Management for Enhanced Security Using CyberArk Secrets Hub and AWS

As organizations evolve with hybrid architectures and build on AWS, their developers want to rely on the native AWS Secrets Manager to simplify development and operations. Learn about a jointly developed solution between CyberArk and AWS that was designed to centralize control of secrets, automate rotation, and eliminate vault sprawl for security teams while making no changes to developer workflows. The CyberArk identity solution is CyberArk’s SaaS-delivered identity and access management.

Kyndryl-APN-Blog-080923

Simplify, Optimize, and Automate Cloud Operations with Kyndryl Cloud Native Services for AWS

Kyndryl Cloud Native Services for AWS (KCNS) is designed to accelerate and automate managed services for workloads leveraging AWS-native services. KCNS provides a web interface, called Control Plane, for users to perform various operations, including CloudOps, SecOps, and FinOps. This post explains how to simply, optimize, and automate cloud operations with KCNS for AWS and is targeted at pre-sales and delivery architects set out to design cloud-native solutions for customers.

Avahi-APN-Blog-080823

InovCares Opens Up Service Offering to Support Enterprises with Help from Avahi to Scale AWS Infrastructure

As applications go to market and the customer workload increases rapidly, a higher level of cloud expertise is typically needed to tune the AWS infrastructure. Learn how Avahi Technologies and AWS collaborated to help InovCares take on the challenge of tuning a cloud infrastructure to support applications as workloads increase. Avahi was well suited for this project for its ability to help customers drive change and compete at speed by leveraging a cloud-first strategy.

Building a Secure, Reliable, and Scalable Chainlink Environment on AWS

A prominent blockchain technology provider sought TrackIt‘s assistance in deploying a scalable Chainlink environment on AWS. Learn how TrackIt leveraged a comprehensive suite of AWS services to implement a customized Chainlink workflow, and explore the steps required to deploy a secure, reliable, and scalable Chainlink environment on AWS. Chainlink is a decentralized blockchain oracle network built on Ethereum designed to facilitate the transfer of tamper-proof data from off-chain sources to on-chain smart contracts.

Tech Mahindra’s BMC Helix ITSM Deployment on AWS for End-to-End Data Protection

This post describes how Tech Mahindra transitioned a segment of telecom customers in the EMEA region from a legacy monolithic application, BMC Remedy on-premises, to a self-managed microservices application, BMC Helix IT Service Management, utilizing Kubernetes operations with end-to-end data protection on AWS. Tech Mahindra is an AWS Premier Tier Services Partner with the Migration Consulting Competency that specializes in digital transformation, consulting, and re-engineering solutions.

OPSWAT-APN-Blog-080723

Best Practices from OPSWAT to Secure AWS Applications from File-Borne Threats

The AWS Shared Responsibility Model requires security architects to take proactive measures to detect and prevent zero-day risks and other malware at the perimeter of their network. Learn about the potential risks associated with cloud applications that handle file uploads and transfers, and explore best practices to help mitigate. This post provides guidance on modern threat prevention technologies such as OPSWAT MetaDefender that help augment and automate cybersecurity defense.

Privacera-APN-Blog-080423

Governing Databricks Data Access with AWS Lake Formation and Privacera

Many organizations have standardized or plan to standardize their unified data security governance on AWS Lake Formation. Some of these organizations are also leveraging Databricks and would like to create and manage data access policies for Databricks using AWS Lake Formation as well. Learn how Privacera’s integrated solution extends AWS Lake Formation source support to Databricks and provides data access policy authorship and maintenance from one safe and convenient location.