AWS Partner Network (APN) Blog
Category: Security
Enhancing Security Incident Response with AWS Partners: Program updates and capabilities
AWS Security Incident Response partners are strengthening customer security posture through new integrations that accelerate incident detection, response, and recovery across AWS environments. With enhanced AI-powered capabilities, expanded partner integrations from industry leaders like CrowdStrike, Palo Alto Networks, and SentinelOne, and new consumption-based pricing with a free tier, organizations can now build more robust, scalable incident response programs that reduce mean time to resolution while maintaining comprehensive security controls. Learn how AWS and our Security Incident Response partners are helping customers resolve security incidents faster through coordinated expertise, proven methodologies, and seamless service integrations.
Continuous Compliance in the Cloud: Automating File Security for Regulated Industries
OPSWAT’s MetaDefender Storage Security delivers automated file security for regulated financial institutions on AWS, combining Deep Content Disarm and Reconstruction with multi-scanning and data loss prevention capabilities. A major U.S. bank achieved 75% faster security update deployments while maintaining compliance with GDPR, HIPAA, and GLBA through containerized deployment on Amazon ECS and EKS with seamless S3 integration. Available through AWS Marketplace, the solution provides continuous monitoring, automated compliance reporting, and reduced operational costs for organizations managing sensitive data across multiple cloud regions.
Unlocking API Security with Natural Language: How Salt Security’s MCP Server Transforms Insights into Action
Salt Security introduces its Model Context Protocol (MCP) server, enabling security teams to query API security data using natural language instead of navigating complex dashboards—transforming hours of analysis into seconds of actionable insights. This democratizes API security expertise across organizations while accelerating threat response for AWS customers running cloud-first environments.
Protect your Amazon S3 files with Menlo File Security
Menlo Security’s File Security technology integrates with Amazon S3 to provide automated Content Disarm and Reconstruction (CDR) that eliminates both known and unknown file-based threats without generating false positives. This solution processes files at the component level through AWS Lambda and Amazon API Gateway, automatically sanitizing uploads while preserving file functionality, all without disrupting user workflows or processing speeds.
Securing Generative AI: How Enterprises Can Govern Workforce Use of Generative AI with SurePath AI
The rapid adoption of generative AI tools by employees is revolutionizing workflow efficiency and productivity across industries. The workforce usage of public AI models requires unique security considerations that traditional approaches struggle to address. This post delves into how SurePath AI empowers organizations to navigate these challenges, implementing robust security frameworks for Gen AI adoption. We will see how SurePath AI enables safe innovation while helping protect sensitive data, and maintaining regulatory compliance.
Reduce Vulnerabilities on AWS with Orca Security’s Reachability Analysis
Orca Security’s innovative Reachability Analysis solution addresses the growing challenge of vulnerability management in AWS environments, offering a critical response to the 34% year-over-year increase in vulnerability exploitation reported in 2025. The solution combines Agentless Reachability Analysis, utilizing patented SideScanning™ technology for deep static inspection, with Dynamic Reachability Analysis through their eBPF-based Orca Sensor, providing comprehensive visibility across AWS services including Amazon ECR, EC2, Lambda, ECS, and EKS. Through this dual approach, organizations can achieve a 90% reduction in exploitable vulnerabilities while significantly reducing alert fatigue, as the system intelligently distinguishes between truly exploitable vulnerabilities and those that pose minimal risk in production environments.
Build Secure Generative AI Solutions with AWS and Zscaler
Generative AI is rapidly transforming how enterprises operate, but security remains a critical concern. According to the Zscaler ThreatLabz 2025 AI Security Report, while AI/ML tool usage has surged 36x year-over-year, 60% of this traffic was blocked due to security concerns. This post demonstrates how AWS and Zscaler’s integrated security controls help protect AI workloads while maintaining compliance and data protection.
Maximizing Passkey Adoption with Amazon Cognito and Corbado
Corbado’s Passkey Adoption Platform works with Amazon Cognito to create a high-adoption passkey experience, offering a phishing-resistant alternative to traditional passwords. Corbado provides optimized UI components, detailed analytics, and fine-grained management controls for passkey rollout. The solution helps organizations maximize passkey adoption across diverse user segments, minimize authentication recovery costs, and enable risk-controlled implementation.
How Second Front Game Warden enables classified workloads on AWS
Second Front’s Game Warden platform streamlines the deployment and management of mission-critical software in classified defense environments. Built on AWS and designed by former military cyber operators, the platform helps software vendors navigate complex security requirements while maintaining compliance across Department of Defense (DoD) and Intelligence Community (IC) classification levels.
How Netop can help customers meet NIS2 Directive requirements in the EU
The NIS2 Directive enhances EU cybersecurity across critical sectors. Learn how Netop provides an integrated solution, run on AWS, that helps customers align with NIS2 Directive goals. Discover how Netop helps address the challenges of NIS2, supporting cybersecurity resilience across critical sectors within the EU.








