AWS Partner Network (APN) Blog
Category: Security, Identity, & Compliance
Continuous Compliance in the Cloud: Automating File Security for Regulated Industries
OPSWAT’s MetaDefender Storage Security delivers automated file security for regulated financial institutions on AWS, combining Deep Content Disarm and Reconstruction with multi-scanning and data loss prevention capabilities. A major U.S. bank achieved 75% faster security update deployments while maintaining compliance with GDPR, HIPAA, and GLBA through containerized deployment on Amazon ECS and EKS with seamless S3 integration. Available through AWS Marketplace, the solution provides continuous monitoring, automated compliance reporting, and reduced operational costs for organizations managing sensitive data across multiple cloud regions.
Unlocking API Security with Natural Language: How Salt Security’s MCP Server Transforms Insights into Action
Salt Security introduces its Model Context Protocol (MCP) server, enabling security teams to query API security data using natural language instead of navigating complex dashboards—transforming hours of analysis into seconds of actionable insights. This democratizes API security expertise across organizations while accelerating threat response for AWS customers running cloud-first environments.
Accelerating security response with Tines and AWS Security Hub
Tines connects AWS Security Hub with security and IT tools to enrich alerts and automate resolution. Through intelligent workflows, teams can balance human insight with automation to achieve faster, more reliable security outcomes.
Reinventing cloud risk management with TrendAI Vision One™
Discover how TrendAI Vision One™ and AWS services work together to address the most critical cloud security risks. Managing cloud risk requires more than merely deploying security features—it demands a continuous, integrated approach. TrendAI Vision One™ offers a comprehensive risk management platform that combines attack surface discovery, risk assessment and prioritization, and mitigation options to complement AWS solutions and strengthen your security posture in the cloud.
Build and Scale GenAI Development Agents Securely with Ona and Amazon Bedrock on AWS
Discover how AWS and Ona enable enterprises to build and scale GenAI development environments with complete security and compliance. This blog explores the powerful integration of Amazon Bedrock and Ona’s secure workspace platform, showing how organisations can accelerate AI-native development from initial experimentation to production-ready systems while maintaining HIPAA, SOC2, and FedRAMP compliance. Learn how leading enterprises are achieving 10x engineering output without expanding their security surface or risking vendor lock-in.
Protect your Amazon S3 files with Menlo File Security
Menlo Security’s File Security technology integrates with Amazon S3 to provide automated Content Disarm and Reconstruction (CDR) that eliminates both known and unknown file-based threats without generating false positives. This solution processes files at the component level through AWS Lambda and Amazon API Gateway, automatically sanitizing uploads while preserving file functionality, all without disrupting user workflows or processing speeds.
Enhance Cloud Identity Security with BeyondTrust on AWS
Discover how AWS and BeyondTrust deliver comprehensive identity security solutions that enable organizations to implement zero trust principles, manage privileged access, and accelerate secure cloud adoption. Learn about six essential identity security controls including just-in-time access, enhanced remote access features, and automated secrets management that help organizations reduce identity-based risks while maintaining operational efficiency across cloud, hybrid, and on-premises environments.
Securing Generative AI: How Enterprises Can Govern Workforce Use of Generative AI with SurePath AI
The rapid adoption of generative AI tools by employees is revolutionizing workflow efficiency and productivity across industries. The workforce usage of public AI models requires unique security considerations that traditional approaches struggle to address. This post delves into how SurePath AI empowers organizations to navigate these challenges, implementing robust security frameworks for Gen AI adoption. We will see how SurePath AI enables safe innovation while helping protect sensitive data, and maintaining regulatory compliance.
Reduce Vulnerabilities on AWS with Orca Security’s Reachability Analysis
Orca Security’s innovative Reachability Analysis solution addresses the growing challenge of vulnerability management in AWS environments, offering a critical response to the 34% year-over-year increase in vulnerability exploitation reported in 2025. The solution combines Agentless Reachability Analysis, utilizing patented SideScanning™ technology for deep static inspection, with Dynamic Reachability Analysis through their eBPF-based Orca Sensor, providing comprehensive visibility across AWS services including Amazon ECR, EC2, Lambda, ECS, and EKS. Through this dual approach, organizations can achieve a 90% reduction in exploitable vulnerabilities while significantly reducing alert fatigue, as the system intelligently distinguishes between truly exploitable vulnerabilities and those that pose minimal risk in production environments.
Enhance Identity Governance and Protection on AWS using Cisco Duo IAM
Decentralization of work and infrastructure in hybrid environments is leading to identity and access management challenges due to lack of centralized visibility and governance. In this blog, let’s learn how customers can solve these challenges and enhance their identity governance and security with Cisco Duo Identity Federation and advanced access management features. Cisco Duo seamlessly integrates with AWS IAM Identity Center and other identity sources and acts as an identity aggregator that efficiently routes user authentication to appropriate sources. This integrated solution delivers both improved security with end-to-end phishing resistance and AI-driven identity intelligence, and a simplified user experience through passwordless authentication.









