AWS Partner Network (APN) Blog

Category: Software

Streamlining Secrets Management for Enhanced Security Using CyberArk Secrets Hub and AWS

As organizations evolve with hybrid architectures and build on AWS, their developers want to rely on the native AWS Secrets Manager to simplify development and operations. Learn about a jointly developed solution between CyberArk and AWS that was designed to centralize control of secrets, automate rotation, and eliminate vault sprawl for security teams while making no changes to developer workflows. The CyberArk identity solution is CyberArk’s SaaS-delivered identity and access management.

OPSWAT-APN-Blog-080723

Best Practices from OPSWAT to Secure AWS Applications from File-Borne Threats

The AWS Shared Responsibility Model requires security architects to take proactive measures to detect and prevent zero-day risks and other malware at the perimeter of their network. Learn about the potential risks associated with cloud applications that handle file uploads and transfers, and explore best practices to help mitigate. This post provides guidance on modern threat prevention technologies such as OPSWAT MetaDefender that help augment and automate cybersecurity defense.

Privacera-APN-Blog-080423

Governing Databricks Data Access with AWS Lake Formation and Privacera

Many organizations have standardized or plan to standardize their unified data security governance on AWS Lake Formation. Some of these organizations are also leveraging Databricks and would like to create and manage data access policies for Databricks using AWS Lake Formation as well. Learn how Privacera’s integrated solution extends AWS Lake Formation source support to Databricks and provides data access policy authorship and maintenance from one safe and convenient location.

Fivetran-APN-Blog-080423

Building a Modern Data Lake with Fivetran and Amazon S3 to Accelerate Data-Driven Success

Many organizations are adopting data lakes to handle large volumes of data, and flexible pipelines to fit the needs of consuming services and teams (machine learning, business intelligence, and analytics). In this post, we’ll explore the modern data lake and how Fivetran can help accelerate time-to-value with Amazon S3 and Apache Iceberg. Fivetran offers pre-built connectors for 300+ data sources and employs ETL to land data in the warehouse or data lake.

Managing AWS Account Root MFA Using CyberArk Privileged Access Manager

Protecting AWS account root users with multi-factor authentication (MFA) is a crucial security control, and now you can use CyberArk’s Privileged Access Manager (PAM) to securely manage the AWS account root and authenticate its use with MFA. We’ll review the current MFA features for AWS account root user, provide a step-by-step walkthrough of how to install and configure CyberArk PAM to manage root accounts with MFA, and show how to sign into the AWS root account with CyberArk PAM.

How to Access the Jurassic-2 Large Language Model via an AWS Lambda Endpoint

Generative AI and large language models (LLMs) such as AI21 Labs’ Jurassic models are reshaping how we engage with information. This post walks through using the Jurassic-2 (J2) large language model and how to consume the model via an AWS Lambda API endpoint. We’ll also discuss how to make calls to the J2 model via the publicly available Jurassic-2 Python SDK. AI21 Labs is an AWS Partner and leader in generative AI and LLMs, revolutionizing the way people read and write.

Sustainability-Adobe-2023-1

­Reducing the Carbon Footprint of Mobile Network Operations Using Totogi’s Charging-as-a-Service Platform

Totogi is an AWS Partner that provides a Charging-as-a-Service platform that benefits from deployment on AWS and helps customers reduce the electricity used for their online charging system. In this post, we’ll compare the Totogi charging platform’s energy and carbon-emissions efficiency to traditional charging platforms, and investigate architectural patterns that telcos and other businesses can replicate to reduce their carbon footprint.

Solvo-APN-Blog-072823

Prioritize Risks and Add Context to Amazon Inspector Findings with Solvo Data Posture Manager

One of the biggest cloud security concerns is the lack of visibility and control over sensitive data. Learn about the need for multi-dimensional visibility into infrastructure resources, applications and user behavior, and the data associated with them, and how Solvo’s Data Posture Manager uses this approach to provide contextual, adaptive cloud security. Solvo is an AWS Partner whose platform provides contextual, application, and data-aware cloud infrastructure security.

Streamlining Software Development with Data-Driven Insights and Automation Using Apexon COMPASS

Managing software development activities can be complex for enterprises, especially with the need for a single dashboard that provides insights into business, process, and people-centric metrics. Apexon’s COMPASS solution leverages machine learning to capture and integrate continuous data and intelligence across the software development lifecycle, providing a comprehensive view of resource performance and its impact on KPIs.

Beyond the Nastygram: Cloud FinOps for the Enterprise with Ness Digital Engineering

Ness Digital Engineering works with organizations to ensure AWS infrastructure supports strategic initiatives. In this post, we outline an approach for enterprises seeking a mechanism to align cloud costs with their business value. We’ll discuss various change management challenges that such efforts may encounter and share ways to address them, and explore how a robust FinOps function can solve chronic issues that plague cloud cost management at large enterprises.