AWS Partner Network (APN) Blog

Category: Security

Sysdig-APN-Blog-051823

Automate Security and Monitoring with Amazon EKS Blueprints, Terraform, and Sysdig

Many companies report the biggest challenge when adopting Kubernetes is a lack of in-house skills. Infrastructure as code (IaC) blueprints can mitigate these gaps by accelerating hands-on experience, providing a reproducible foundation to configure, provision, and destroy clusters easily. Learn how Sysdig launched an add-on for Amazon EKS as well as Sysdig EKS Blueprints to enable organizations to confidently deploy instrumented Kubernetes clusters using Terraform.

Leveraging BMC AMI Cloud Vault and AWS to Protect Mainframes from Cyber Threats

AWS and BMC Software present a best practice-based approach to secure mainframe data from ransomware attacks or any other source of logical data corruption. Leveraging the scale, performance, and innovation of AWS allows mainframe customers to achieve cyber resiliency faster and more efficiently than with an on-premises solution. Learn how BMC AMI Cloud Vault takes advantage of Amazon S3 to create multiple copies of mainframe data and inherently ensure all copies are protected.

Fastly-APN-Blog-031023

Enhancing Security for AWS Lambda Functions with Fastly’s Next-Gen WAF

An integral component to most serverless architectures is AWS Lambda, the compute service that lets you run code for virtually any type of application without provisioning or managing servers. Fastly has extended its Next-Gen WAF to Lambda functions, supporting customers looking to embed additional layers of security into their serverless workloads. Fastly’s Next-Gen WAF supports numerous other deployment scenarios including virtual machines, containers, and web servers.

Implementing Zero-Trust Workload Security on Amazon EKS with Calico

Amazon EKS and Calico Cloud’s combined solution provides proof of security compliance to meet organizational regulatory requirements, but building and running cloud-native applications in EKS requires communication with other AWS and external third-party services. Learn how you can apply zero-trust workload access controls along with microsegmentation for workloads on EKS, and explore what implementing zero-trust workload access controls and identity-aware microsegmentation means for you.

Level-1-MSSP-Competency-Categories-1

Introducing AWS Level 1 MSSP Competency Specialization Categories

The AWS Level 1 MSSP Competency makes it easy for customers to quickly find validated solution providers qualified to deliver solutions that have been uniquely designed for cloud environments. We are excited to announce specialization categories for the AWS Level 1 MSSP Competency. These categories help customers find the ideal solution provider based on the specific managed security need they are facing. We invite you to explore the following Level 1 MSSP Partner offerings recommended by AWS.

Anomali-APN-Blog-061622

Anomali Launches Differentiated Cloud-Native XDR SaaS Solution with Support from AWS SaaS Factory

To help organizations defend themselves against cyber threats, Anomali, a leader in intelligence-driven cybersecurity solutions, recently launched its cloud-native extended detection and response (XDR) solution, The Anomali Platform. The AWS SaaS Factory team spoke with Mark Alba, Chief Product Officer at Anomali, to learn more about Anomali Cloud-Native XDR SaaS, the value its new solution brings to customers, and the key lessons learned from the journey to SaaS on AWS.

DevSec-Ops-Competency-Launch-1

AWS DevOps Competency Expands to Include DevSecOps Category

With proper DevSecOps implementation, security becomes an integral part of the application delivery pipeline, allowing developers to receive rapid and contextual feedback as they build new features. The new DevSecOps category for the AWS DevOps Competency makes it easy for customers to find validated AWS Partners with DevSecOps products. These partners can help customers build secure applications by integrating security controls and policies into their application delivery pipelines.

GA-Telesis-APN-Blog-032322

GA Telesis Launches a Fraud Detection SaaS Solution with Support from AWS SaaS Factory

With the support of AWS SaaS Factory, GA Telesis launched the FraudBlock SaaS solution, a fraud protect API service for companies to protect their organizations from BEC/EAC scams and help securely perform B2B transactions. The SaaS Factory team spoke with Darryl Maraj, Head of Technology at DIG and CTO at Blockrails, to learn more about Blockrails, the value its new FraudBlock solution brings to customers, and the key lessons learned building a SaaS solution on AWS.

IronNet-APN-Blog-030422

Protecting Your Deployments from Advanced Threats with AWS and IronNet

Working with AWS, IronNet delivers threat detection and mitigation at scale across networks that are on premises, in the cloud, or both. IronNet collects logs and traffic data to identify indicators of attack or abnormal behavior in order to stop advanced cyberattacks. At its foundation, the IronNet solution consists of one or more sensors to feed network data and logs to IronDefense—the backend collection and analysis point for detection.

Defense-in-Depth Principles for Protecting Workloads with CrowdStrike and AWS

Migrating to the cloud has allowed many organizations to reduce costs, innovate faster, and deliver business results more effectively. Managing, securing, and having visibility across endpoints, networks, and workloads is not an easy feat and requires a unified defense-in-depth approach. Learn how CrowdStrike’s leading endpoint protection, workload protection, and threat intelligence directly integrate with AWS services to build an effective defense-in-depth solution to stay ahead of threats.