AWS Partner Network (APN) Blog

Category: Amazon Security Lake

New-Relic-APN-Blog-032624

Using Amazon Security Lake with New Relic for Threat Detection and Incident Response

Amazon Security Lake centralizes security data from multiple AWS sources into a customer-owned data lake. A New Relic integration provides a single pane for performance and security telemetry, ingests Amazon Security Lake data, and allows threat detection via curated dashboards and anomaly alerts. This solution improves cloud security posture by consolidating data, providing insights, and enabling automated response to potential threats.

How Leidos Standardized its Application Logging into Amazon Security Lake with LOIS

As systems generate increasing data, making sense of it is critical. Application logs are unique and not standardized. Leidos addresses logging issues using the Open Cybersecurity Schema Framework (OCSF) and Amazon Security Lake via the Leidos OCSF Integration Suite (LOIS), which bridges applications to generate OCSF-compliant messages and ingest them into Amazon Security Lake for analysis and visualization.

Deloitte-PANW-Marriott-GenAI-featured

Generative AI Augments Marriott’s Cybersecurity Posture with AWS Partners Deloitte and Palo Alto Networks

Marriott’s CISO Arno Van Der Walt manages cybersecurity through a “human-centered, data-driven, technology-enabled” approach aimed at making security frictionless. Critical partnerships with AWS, Deloitte, and Palo Alto Networks leverage AI/ML to share threat data and empower “impossible” autonomous security. Together, their tri-party services provide an end-to-end platform unifying business and security data to detect threats and enable quick response.

Improve Your Security Posture with Claroty xDome Integration with Amazon Security Lake

Learn how to stream security events from Claroty xDome to Amazon Security Lake to centralize your security data for more efficient storage, query, and analysis. This enables customers to quickly analyze multiple years of security data across OT, IIoT, and cloud environments, using their preferred tools for security analytics and building resilient operations by enhancing threat detection and response capabilities.