AWS Partner Network (APN) Blog

Category: AWS Security Hub

Red-Hat-APN-Blog-012324

Enhanced Threat Detection with AWS Security Hub and Red Hat Advanced Cluster Security for Kubernetes

AWS customers can run Kubernetes on managed services like Amazon EKS or self-managed options. To secure these environments, Red Hat Advanced Cluster Security for Kubernetes (RHACS) detects vulnerabilities and policy violations. Its findings can be sent to AWS Security Hub which aggregates security issues across AWS services. This post walks through installing RHACS on Red Hat OpenShift Service on AWS, creating policies in RHACS, and integrating with Security Hub to view findings.

Access Affordable Policies with New Security Posture Assessment from AWS Cyber Insurance Competency Partners

We’re excited to announce the AWS Cyber Insurance Competency, which makes it easy for customers—particularly Small and Medium Businesses—to find affordable policies from insurers that integrate their security posture assessment through a new, simplified customer experience with AWS Security Hub. AWS Cyber Insurance Competency Partners worked with AWS to digitally transform their assessment and onboarding process, which rewards customers that present a security posture following AWS best practices.

Ensono-APN-Blog-102523

Using AWS Trusted Advisor to Drive Operational Excellence with Ensono Envision Advisor

AWS Trusted Advisor inspects your AWS environment and provides recommendations to optimize infrastructure, improve security and performance, reduce cost, and monitor service quotas. Ensono Envision Advisor turns AWS Trusted Adviser recommendations into validated, prioritized, actionable insights. It ingests data before enriching it with Ensono IP to contextualize recommendations specific to end customers, making it easier to achieve operational excellence on AWS.

Claroty-APN-Blog-050523

Improve Your Security Posture with Claroty xDome Integration with AWS Security Hub

Industrial digital transformation is driving changes to the operational technology (OT) landscape, making it more connected to the internet, IT systems, and solutions. With OT/IT convergence, there is greater access to critical OT systems and increasing susceptibility to malware and ransomware. Learn how Claroty xDome and AWS Security Hub can be used for security and vulnerability monitoring, and to provide visibility of security events to teams responsible for operational monitoring.

Arctic-Wolf-APN-Blog-032323

Event-Driven Security Monitoring with Arctic Wolf and AWS Security Hub

To help customers deal with cybersecurity challenges, AWS provides capability for aggregated and unified alerting—with a large array of technologies to monitor and control cloud-based application stacks and hosted data. Making intelligent use of this information—to end the opportunity of cyber threat—is the role of the Arctic Wolf Security Operations Cloud. Learn how it provides holistic visibility with data correlation and analytics, assuring detection and response of cyber threats.

Trend-Micro-AWS-Partners

Amazon S3 Malware Scanning Using Trend Micro Cloud One and AWS Security Hub

Cloud security is the highest priority at AWS, and we work closely with industry-leading partners such as Trend Micro to build security solutions for customers. In this post, we share a malware scanning solution jointly built by Trend Micro and AWS that detects and automates response to malware payload uploaded to Amazon Simple Storage Service (Amazon S3). The solution uses Trend Micro threat intelligence capabilities and AWS Security Hub.

Automated Cloud Network Threat Detection and Response with Blue Hexagon and AWS

VPC traffic mirroring and VPC ingress routing are powerful AWS networking primitives to monitor network traffic in your VPC at the packet-level. With Blue Hexagon’s next-gen Network Detection and Response (NG-NDR) security tool for AWS, which is powered by real-time deep learning, you can detect threats in network headers and payloads in less than a second. The additional AWS Security Hub integration enables you to trigger a rich action space of remediation and response.

TCS-AWS-Partners-1

How TCS Cloud Exponence Monitors Security and Compliance Across AWS Accounts

The move to primarily cloud-based operations has pushed enterprises to prioritize digital security mechanisms and regulatory compliance controls to safeguard weaknesses and reduce effects of an attack. TCS Cloud Exponence is a multi-cloud operations solution with a focus on a range of critical security operations such as cloud perimeter monitoring, patch management, vulnerability assessment, compliance monitoring, alerting, and reporting.