AWS Partner Network (APN) Blog

Category: Security

Build Secure Generative AI Solutions with AWS and Zscaler

Generative AI is rapidly transforming how enterprises operate, but security remains a critical concern. According to the Zscaler ThreatLabz 2025 AI Security Report, while AI/ML tool usage has surged 36x year-over-year, 60% of this traffic was blocked due to security concerns. This post demonstrates how AWS and Zscaler’s integrated security controls help protect AI workloads while maintaining compliance and data protection.

Corbado-APN-Blog

Maximizing Passkey Adoption with Amazon Cognito and Corbado

Corbado’s Passkey Adoption Platform works with Amazon Cognito to create a high-adoption passkey experience, offering a phishing-resistant alternative to traditional passwords. Corbado provides optimized UI components, detailed analytics, and fine-grained management controls for passkey rollout. The solution helps organizations maximize passkey adoption across diverse user segments, minimize authentication recovery costs, and enable risk-controlled implementation.

Second Front - Featured - 090425

How Second Front Game Warden enables classified workloads on AWS

Second Front’s Game Warden platform streamlines the deployment and management of mission-critical software in classified defense environments. Built on AWS and designed by former military cyber operators, the platform helps software vendors navigate complex security requirements while maintaining compliance across Department of Defense (DoD) and Intelligence Community (IC) classification levels.

How Netop can help customers meet NIS2 Directive requirements in the EU

The NIS2 Directive enhances EU cybersecurity across critical sectors. Learn how Netop provides an integrated solution, run on AWS, that helps customers align with NIS2 Directive goals. Discover how Netop helps address the challenges of NIS2, supporting cybersecurity resilience across critical sectors within the EU.

Dispersive-APN-Blog-082925

Unlocking Secure Data Access with Dispersive Stealth Networking and AWS

Dispersive Stealth Networking, an AWS Partner, offers innovative networking solutions that transform how organizations connect their distributed environments. Their patented Stealth Networking technology implements Zero Trust principles, a security model that treats all users and devices as untrusted until verified, alongside Preemptive Cyber Defense (PCD) capabilities, all while leveraging AWS infrastructure for optimal performance and reliability. This post explores how Dispersive Stealth Networking technology on AWS helps organizations build secure, high-performance connectivity that supports their business objectives.

Trellix uses AWS GenAI for Cybersecurity Integration

This blog highlights the approach Trellix took to accelerate the development and testing of product integrations and automated rules development. Using agentic AI methodology, Trellix is able to save over 40 hours of development time per integration resulting in a 90% reduction time to market. Trellix used Amazon Bedrock, LangChain, and Anthropic Claude in this effort.

Securing AI: AWS Marketplace and Partner Solutions from Adoption to Protection

Forty-five percent of IT decision-makers rank generative AI tools as their top budget priority for 2025. Explore how AWS Partners help organizations secure their AI initiatives through comprehensive security solutions that address data privacy, model integrity, and emerging AI-specific vulnerabilities.

Updates to the AWS MSSP Competency: Deliver Turnkey Security Solutions for Customers

We’re introducing new categories for the AWS MSSP Competency (previously AWS Level 1 MSSP Competency) to help customers easily identify Partners with security expertise based on their unique needs. The new competency categories validate Partners’ abilities to deliver comprehensive security solutions through native AWS services and third-party integrations.

Secure Digital Assets with Blockdaemon Builder Vault using AWS Nitro Enclaves

Blockdaemon’s Builder Vault addresses the challenge of securing high-value cryptographic operations for digital assets using Multi-Party Computation (MPC) and AWS Nitro Enclaves. By splitting cryptographic operations across multiple independent parties, Builder Vault enables organizations to implement granular access controls and enforce multi-party governance without exposing private keys at any point in their lifecycle. The solution provides institutional-grade digital asset management through a distributed architecture that makes unauthorized access significantly more challenging while maintaining operational flexibility.

HashiCorp-APN-Blog-042425

Prevent Secret Sprawl with HCP Vault Radar

Discover how HashiCorp’s HCP Vault Radar helps organizations combat secret sprawl by providing automated detection and analysis of secrets across enterprise environments. Learn how this AWS Marketplace solution integrates with AWS services like Systems Manager Parameter Store and S3 to enhance security posture and maintain compliance through continuous scanning and remediation capabilities.