AWS Partner Network (APN) Blog

Category: Storage

How to Accelerate Asset Visibility with Claroty Edge on AWS Snowcone

Industrial IoT adoption is increasing the connectivity of operational technology to IT systems, necessitating better visibility into assets. Claroty Edge on AWS Snowcone enables asset discovery to build an accurate inventory and identify vulnerabilities. Combined with Claroty xDome, this provides comprehensive IT/OT asset management and vulnerability insights. xDome integrates with AWS Security Hub to simplify deploying asset visibility and enable organizations to defend and secure their connected environments.

How MYCOM OSI Optimized SaaS Storage with Amazon FSx for NetApp ONTAP

Many Kubernetes applications require access to persistent storage and data services, including block storage, shared file systems, and object storage. Learn how MYCOM OSI has improved the cost-performance dimension by adopting Amazon FSx for NetApp ONTAP. This post explores how the storage option was evaluated to identify a solution that optimizes the handling of large and complex telco assurance datasets.

Automatically Resize Amazon EBS Capacity with Zesty Disk for Cost Efficiency and Consistent Performance

Dynamically adjusting infrastructure capacity based on usage fluctuations allows you to gain operational and cost benefits. Learn how Zesty Disk helps achieve greater cost efficiency and consistent performance when managing Amazon EBS volumes, and how to optimize storage at run time without adding complexity or being exposed to data on the disk. Zesty Disk’s auto-scaling technology eliminates the need for manual adjustments, streamlining operations and reducing the cognitive load for developers.

Filter and Stream Logs from Amazon S3 Logging Buckets into Splunk Using AWS Lambda

This post showcases a way to filter and stream logs from centralized Amazon S3 logging buckets to Splunk using a push mechanism leveraging AWS Lambda. The push mechanism offers benefits such as lower operational overhead, lower costs, and automated scaling. We’ll provide instructions and a sample Lambda code that filters virtual private cloud (VPC) flow logs with “action” flag set to “REJECT” and pushes it to Splunk via a Splunk HTTP Event Collector (HEC) endpoint.

Dremio-APN-Blog-101723

Building a Data Lakehouse with Amazon S3 and Dremio on Apache Iceberg Tables

Learn how to implement a data lakehouse using Amazon S3 and Dremio on Apache Iceberg, which enables data teams to quickly, easily, and safely keep up with data and analytics changes. This helps businesses realize fast turnaround times to process the changes end-to-end. Dremio is an AWS Partner whose data lake engine delivers fast query speed and a self-service semantic layer operating directly against S3 data.

Veritas-APN-Blog-101323

Application Resiliency and Simplified Migrations to AWS with Veritas Application Mobility Service

Being able to plan for and recover from downtime is a key factor for businesses to consider, as we all become more reliant on technology to live, work, and play. Learn how the Veritas Alta Enterprise Resiliency offering provides businesses with a robust enterprise-ready solution to achieve resiliency and continuity. We’ll also discuss the Application Mobility Service, a new component of Veritas Alta Application Resiliency that can help accelerate and simplify customer migrations to AWS.

Empowering Researchers to Run HPC Workloads on AWS with Research Gateway

Modern scientific research depends heavily on processing large-scale datasets which requires elastic, scalable, easy-to-use, and cost-effective computing resources. Research Gateway from Relevance Lab simplifies access to HPC clusters using a self-service portal, making provisioning and configuration of an elastic cluster easy for researchers. This helps them focus on the research itself, while leveraging AWS ParallelCluster for their scientific computing.

Securing 5G Core Applications on AWS Snowball Edge with Palo Alto Networks

The security pillar of the AWS Well-Architected Framework describes how to take advantage of cloud technologies to protect data, systems, and assets in a way that improves security posture. The security pillar doesn’t just apply to AWS regions and Availability Zones but also to hybrid cloud solutions on premises. In this post, we’ll focus on security using AWS Snowball Edge and how Palo Alto Network’s VM-Series firewall is deployed and configured to secure access to a 5G core application providing cellular 5G connectivity.

Automating Secure and Scalable Website Deployment on AWS with Amazon CloudFront and AWS CDK

There is no easier way to run HTTPS-enabled static websites on AWS than by using Amazon CloudFront and Amazon S3. In this post, we’ll look at automating website deployment on AWS using AWS Cloud Development Kit (AWS CDK) and TypeScript. We’ll use the architecture that combines CloudFront as the content delivery network, AWS Certificate Manager for secure certificate provisioning, Amazon S3 for reliable website hosting, and Amazon Route 53 as the domain name system.

Malware Scanning for Regulated Workloads on AWS with Cloud Storage Security

Many of the requirements for meeting and maintaining a secure environment can be met by using AWS FedRAMP-authorized regions and services, which can simplify and reduce costs of the process. Over 2,000 government agencies and other entities that provide services to government agencies are using AWS services today. Learn how Antivirus for Amazon S3 by Cloud Storage Security can be used to automate malware scanning for application workflows or data ingestion pipelines to achieve data security and compliance.