AWS Partner Network (APN) Blog

KernelCare-Logo-1

Live Patching Linux Kernel Vulnerabilities with AWS and KernelCare

Automatic software patching is not yet seen as a security benefit, even though out-of-date software is the cause of many recent cybersecurity failures. As companies and their staff become more security-aware and, in some cases, legally accountable for security breaches, system administrators are starting to see automated Linux kernel live patching as the missing link in their system security profiles. Despite the disadvantages, a system with live patching is safer than one without.

DevOps-2

Calculating SaaS Cost Per Tenant: A PoC Implementation in an AWS Kubernetes Environment

In a SaaS environment, the compute, storage, and bandwidth resources are often shared among tenants, but this makes it challenging to deduce per tenant cost. A SaaS application running on a Kubernetes cluster on AWS adds a layer of further complexity as far as calculating the per tenant cost. Kubernetes is great at abstracting away the underlying pool of hardware. It almost gives us an illusion of having access to a single large compute resource.

Heimdall Data_AWS Solutions

Improving Application Performance with No Code Changes Using Heimdall’s Database Proxy for Amazon Redshift

Rewriting an application code for performance optimization generally requires a significant amount of effort. Also, IT and development groups using third-party applications like Tableau may not have access to the application code. Heimdall’s database proxy solution offers a flexible and cost-effective alternative to rewriting your application for performance and scale. Heimdall transparently provides SQL control and visibility to the application owner without (re)writing a single line of code.

Automating Security, Governance, and Monitoring in AWS Landing Zone to Save Time, Effort, and Cost

Enterprises migrating to AWS with multiple applications and distributed teams often lack centralized governance, management, or security systems. With AWS Landing Zone, you can configure and provision a secure, scalable, automated, multi-account AWS environment aligned with AWS best practices without existing resources. It gives you granular, centralized control over your cloud workloads, with a consistent level of security and compliance across all accounts.

AWS Security

Closed Loop Security and Compliance Helps You Safely Migrate to and Expand AWS Usage

DevOps staff in many organizations are one misconfiguration away from compromising their AWS resources to attackers as they migrate to and grow their adoption of existing and new AWS services. In this post, AWS Security Partner Cavirin proposes “Closed Loop Security” based on unifying proactive and reactive risk signals as a key strategy for DevOps staff to protect their AWS infrastructure from misconfigurations and vulnerabilities.

Security-8

How to Benchmark and Prioritize Security Threats in Amazon GuardDuty Using Sumo Logic

Users looking for enhanced security operations within their AWS environment can utilize Sumo Logic Global Intelligent Service (GIS) for Amazon GuardDuty. This solution allows organizations to separate the signal from the noise within your security alerts, helping to more accurately pinpoint investigations and resources. This comparison data allows companies to bolster their security efforts by proactively identifying and remediating threats.

APN Navigate Security Track-2

Why Your Company Should Become Security Experts on AWS

APN Partners with security expertise help customers identify asset vulnerabilities and develop an organizational understanding to manage security risks in AWS customer systems, assets, and data. If your company wants to help AWS customers with security, the new APN Navigate Security track provides APN Partners with a prescriptive journey to help you build expertise in cloud security solutions.

AWS SaaS Factory-2019

WireWheel Leverages AWS SaaS Factory to Help Companies Solve Data Privacy Management

For SaaS companies responsible for data collection and processing on behalf of multiple organizations, privacy is a core requirement and a competitive differentiator. Knowing the answers to these questions is critical to meeting data management, security, and privacy requirements. WireWheel is a group of privacy experts, data scientists, and business leaders that have set out to help companies meet this challenge.

Driving Continuous Security and Configuration Checks for Amazon EKS with Alcide Advisor

The inherent complexities for running cloud-native applications such as Kubernetes, especially in a multi-cluster environment, are growing. Alcide Advisor creates a snapshot of your cluster’s security and compliance posture with actionable recommendations to ensure no security drifts are detected only in runtime. Alcide Advisor allows DevOps and security teams to discover misplaced secrets or secret access, identify Kubernetes vulnerabilities and perform Amazon EKS cluster checks.

Say Hello

Say Hello to 79 New AWS Competency, MSP, and Service Delivery Partners Added in May

We are excited to highlight 79 APN Partners that received new designations in May for our global AWS Competency, AWS Managed Service Provider (MSP), and AWS Service Delivery programs. These designations span workload, solution, and industry, and help AWS customers identify top APN Partners that can deliver on core business objectives. APN Partners are focused on your success, helping customers take full advantage of the business benefits AWS has to offer.