AWS Partner Network (APN) Blog
Category: Security
Gaining Critical Security Insights and Control of Your Traffic with Aviatrix ThreatIQ and ThreatGuard
It can be difficult to gain security insights into your cloud infrastructure, especially as architectures grow to encompass multiple availability zones, regions, and clouds. Aviatrix Systems is uniquely positioned to provide deep insights into network traffic that can augment AWS-native security capabilities. In this post, we detail new capabilities that were recently added to the Aviatrix Secure Network Platform—ThreatIQ and ThreatGuard.
Security and Compliance at Scale with CloudHealth Secure State
Security is the highest priority for AWS, which works closely with industry-leading partners such as CloudHealth by VMware to build security solutions for customers like CloudHealth Secure State (CHSS). Learn how you can set up CHSS projects, suppress rules and alerts, find misconfigurations through CHSS Explore, and set up remediation jobs all built on CloudHealth’s unified security monitoring approach for AWS.
Driving Business Innovation and Delivering Cloud Security with Digital Cloud Services from Atos
Digital Cloud Services (DCS) is a fully managed AWS landing zone-as-a-service from Atos, and the DCS solution offers a managed landing zone platform with enterprise-grade security. It provides customers with the ideal environment to start or continue their business transformation, at pace and scale in a self-service manner. With DCS, customers are safe in the knowledge the underlying platform is built to CIS benchmarks and AWS Well-Architected Framework standards.
CyberArk Launches Identity Security Platform Shared Services with Support from AWS SaaS Factory
Global leader in identity security CyberArk’s Identity Security Platform will be a native SaaS solution built on AWS that provides customers with a comprehensive set of capabilities to help secure all identities from one centralized location. Working closely with the AWS SaaS Factory team, CyberArk navigated technical and business decisions to build and launch the offering. We recently spoke with Assaf Miron, Sr. Product Manager at CyberArk, to learn more about the platform.
How Zscaler and AWS Wavelength Enable Secure Edge Computing with Zero Trust
Super low-latency connections for the mobile carrier network are becoming increasingly important as we move to an ever-connected mobile world. 5G connectivity is built from the ground up striving for the most effective and lowest latency communication. Learn how to protect your network using AWS Wavelength for effective carrier connectivity and Zscaler Private Access (ZPA) for Zero Trust security.
How AWS Partners Can Help You Sleep Well with a Strong Zero Trust Strategy for Remote Work
Security is something keeping many IT leaders up at night in this new normal. As companies build their long-term digital workplace strategies, looking at Zero Trust and what that means from a user perspective is key. In this post, we’ll define Zero Trust, highlight solutions that are key to delivering trust at the user level, and showcase AWS Competency Partners that offer these solutions to customers.
Managed Cloud Security Starts at Level 1 with AWS Level 1 MSSP Competency Partners
A Managed Security Service Provider (MSSP) can integrate, join forces with, and work alongside in-house security teams, or provide full outsourcing for AWS security operations. To help customers looking for support from MSSPs, we created a new baseline standard of quality called Level 1 Managed Security Services. The new AWS Level 1 MSSP Competency designation features AWS Partners that have had their technical and operational capabilities successfully validated against this baseline.
How to Decide Between Building or Buying a CIS Hardened Image
The Center for Internet Security (CIS) is responsible for the CIS Controls and CIS Benchmarks, which are globally recognized best practices for securing IT systems and data. The implementation of these can help harden systems through various means, whether it be disabling unnecessary ports or eliminating unneeded services. Purchasing a pre-hardened image is a great option, especially since you are ensured compliance with the CIS Benchmark, and deploying it would not require much maintenance on your end.
How TalaTek Uses Amazon CloudWatch for Security Information and Event Management
Learn how TalaTek uses Amazon CloudWatch as an alternative to traditional SIEM solutions with the same functionality. CloudWatch gives TalaTek system-wide visibility, allowing them to monitor their AWS-based SaaS solution, the TalaTek Intelligent Governance and Risk Integrated Solution (TiGRIS). CloudWatch helps TalaTek keep TiGRIS running efficiently while allowing us to meet FedRAMP logging requirements.
AWS Startup Showcase Highlights Innovators in AI, Security, and Life Sciences
From pre-seed to IPO, the world’s most innovative startups build on AWS. This month, we’re excited to show our support through the next AWS Startup Showcase, a virtual AWS Loft-style event we’re hosting in partnership with theCUBE. The event is geared towards an audience of business decision makers, developers, and IT professionals. It features some of the most innovative companies from the APN Global Startup Program showcasing their latest offerings and innovations in AI, security, and life sciences.