AWS Partner Network (APN) Blog

Category: Security, Identity, & Compliance

Menlo-Security-APN-Blog-111925

Protect your Amazon S3 files with Menlo File Security

Menlo Security’s File Security technology integrates with Amazon S3 to provide automated Content Disarm and Reconstruction (CDR) that eliminates both known and unknown file-based threats without generating false positives. This solution processes files at the component level through AWS Lambda and Amazon API Gateway, automatically sanitizing uploads while preserving file functionality, all without disrupting user workflows or processing speeds.

BeyondTrust-APN-Blog-110325.png

Enhance Cloud Identity Security with BeyondTrust on AWS

Discover how AWS and BeyondTrust deliver comprehensive identity security solutions that enable organizations to implement zero trust principles, manage privileged access, and accelerate secure cloud adoption. Learn about six essential identity security controls including just-in-time access, enhanced remote access features, and automated secrets management that help organizations reduce identity-based risks while maintaining operational efficiency across cloud, hybrid, and on-premises environments.

SurePathAI-APN-Blog-103125

Securing Generative AI: How Enterprises Can Govern Workforce Use of Generative AI with SurePath AI

The rapid adoption of generative AI tools by employees is revolutionizing workflow efficiency and productivity across industries. The workforce usage of public AI models requires unique security considerations that traditional approaches struggle to address. This post delves into how SurePath AI empowers organizations to navigate these challenges, implementing robust security frameworks for Gen AI adoption. We will see how SurePath AI enables safe innovation while helping protect sensitive data, and maintaining regulatory compliance.

Orca Security-APN-Blog-131025

Reduce Vulnerabilities on AWS with Orca Security’s Reachability Analysis

Orca Security’s innovative Reachability Analysis solution addresses the growing challenge of vulnerability management in AWS environments, offering a critical response to the 34% year-over-year increase in vulnerability exploitation reported in 2025. The solution combines Agentless Reachability Analysis, utilizing patented SideScanning™ technology for deep static inspection, with Dynamic Reachability Analysis through their eBPF-based Orca Sensor, providing comprehensive visibility across AWS services including Amazon ECR, EC2, Lambda, ECS, and EKS. Through this dual approach, organizations can achieve a 90% reduction in exploitable vulnerabilities while significantly reducing alert fatigue, as the system intelligently distinguishes between truly exploitable vulnerabilities and those that pose minimal risk in production environments.

Cisco-APN-Blog-10052025

Enhance Identity Governance and Protection on AWS using Cisco Duo IAM

Decentralization of work and infrastructure in hybrid environments is leading to identity and access management challenges due to lack of centralized visibility and governance. In this blog, let’s learn how customers can solve these challenges and enhance their identity governance and security with Cisco Duo Identity Federation and advanced access management features. Cisco Duo seamlessly integrates with AWS IAM Identity Center and other identity sources and acts as an identity aggregator that efficiently routes user authentication to appropriate sources. This integrated solution delivers both improved security with end-to-end phishing resistance and AI-driven identity intelligence, and a simplified user experience through passwordless authentication.

nfoblox-APN-Blog-09052025

How to Enhance Asset Visibility with Infoblox and AWS

As organizations execute digital transformations and cloud-first initiatives, cloud sprawl and unintentional resource expansion become critical challenges. Infoblox and AWS are partnering to help organizations optimize cloud costs and improve security through enhanced asset visibility. Learn how Infoblox Universal Asset Insights discovers and organizes AWS assets across accounts and regions, helping companies reduce cloud waste while strengthening their security posture.

Build Secure Generative AI Solutions with AWS and Zscaler

Generative AI is rapidly transforming how enterprises operate, but security remains a critical concern. According to the Zscaler ThreatLabz 2025 AI Security Report, while AI/ML tool usage has surged 36x year-over-year, 60% of this traffic was blocked due to security concerns. This post demonstrates how AWS and Zscaler’s integrated security controls help protect AI workloads while maintaining compliance and data protection.

Corbado-APN-Blog

Maximizing Passkey Adoption with Amazon Cognito and Corbado

Corbado’s Passkey Adoption Platform works with Amazon Cognito to create a high-adoption passkey experience, offering a phishing-resistant alternative to traditional passwords. Corbado provides optimized UI components, detailed analytics, and fine-grained management controls for passkey rollout. The solution helps organizations maximize passkey adoption across diverse user segments, minimize authentication recovery costs, and enable risk-controlled implementation.

APN-Blog-092425

SailPoint Harbor Pilot: Simplified Identity Security with Agentic AI on AWS

Harbor Pilot is an agentic AI system built on AWS in close collaboration with AWS OneTeam, designed to automate identity management tasks using natural language input. Within 30 days of release, over 50% of customers adopted the solution, which helps reduce manual workflow creation from hours to minutes while integrating with SailPoint’s Identity Security Cloud.

Second Front - Featured - 090425

How Second Front Game Warden enables classified workloads on AWS

Second Front’s Game Warden platform streamlines the deployment and management of mission-critical software in classified defense environments. Built on AWS and designed by former military cyber operators, the platform helps software vendors navigate complex security requirements while maintaining compliance across Department of Defense (DoD) and Intelligence Community (IC) classification levels.