AWS Partner Network (APN) Blog

Managing Red Hat Enterprise Linux Systems on AWS with Red Hat Insights

Red Hat Insights helps you manage Red Hat Enterprise Linux (RHEL) Systems on AWS by analyzing physical, virtual, container, and hybrid private and public cloud environments, comparing them to more than 1,000 rules. These rules identify potential threats that could lead to business disruptions. Insights scans your environments daily, summarizes any identified risks in its dashboard, and provides remediation steps for those risks.

Read More

How Sisense Simplifies Complex Data Analytics for Analysts and Developers

Organizations these days are inundated with data. Learn how engineers and analysts can handle the critical challenges of gaining insights from large and complex data sources while also democratizing data for improved adoption across the organization. The Sisense platform simplifies end-to-end data and analytics, reducing time-to-insights by empowering data and IT teams to build advanced data models and perform advanced analysis for their needs.

Read More
Dyatrace_AWS-Competency

AWS Single Sign-On Integration Guide for Dynatrace

End users can now configure AWS Single Sign-On (AWS SSO) to access Dynatrace with a single sign-on experience using the same credentials they use with their Amazon Web Services (AWS) account. AWS Single Sign-On provides administrators a simple way to assign users and groups access to AWS accounts, roles, and SAML-based applications. This eliminates the need for users to log in to Dynatrace separately.

Read More
AWS-Competency-Validation-Checklist

New-Look AWS Competency Validation Checklists for APN Technology Partners

To receive the AWS Competency designation, which showcases top APN Partners to customers, organizations must undergo rigorous technical validation. To help APN Technology Partners understand this process and our validation requirements, we are releasing new versions of the AWS Competency Validation Checklists (VCL). These checklists outline the customer case study and technical criteria needed for APN Technology Partners to achieve the AWS Competency designation.

Read More
Xplenty_AWS-Competency

How to Use Xplenty with AWS KMS to Provide Field-Level Encryption in ETL Data Processing

Enterprises often choose to mask, remove, or encrypt sensitive data in the ETL step to minimize the risk of sensitive data becoming stored, logged, accessible, or breached from their data lake or data warehouse. Xplenty’s ETL and ELT platform allows customers to quickly and easily prepare their data for analytics using a simple-to-use data integration cloud service. Xplenty’s global service uses AWS KMS to create and control the keys used to encrypt or digitally sign your data.

Read More

Leveling Up Your Alerting Workflow with Thundra’s Deep Instrumentation Capabilities

Serverless architectures allow application teams to build applications quickly without worrying about any of the underlying servers. Thundra’s cloud-native observability and security tool helps you test, debug, monitor, troubleshoot, and secure AWS Lambda functions, containers deployed by services like AWS Fargate, and their environments composed of managed or unmanaged services. Walk through a sample alerting scenario and learn how Thundra helps pinpoint and resolve the problem.

Read More
Say Hello

Say Hello to 34 New AWS Competency, MSP, and Service Delivery Partners Added in January

We are excited to highlight 34 APN Partners that received new designations in January for our global AWS Competency, AWS Managed Service Provider (MSP), and AWS Service Delivery programs. These designations span workload, solution, and industry, and help AWS customers identify top APN Partners that can deliver on core business objectives. APN Partners are focused on your success, helping customers take full advantage of the business benefits AWS has to offer.

Read More
Security-8

How to Send CloudHSM Audit Logs to Splunk and Monitor Critical Events on the HSM

AWS CloudHSM is a cloud-based hardware security module (HSM) that enables you to easily generate, store, import, export, and manage your cryptographic keys. This post walks through using AWS services to create a pipeline that sends HSM audit logs into Splunk. You’ll also learn how to interpret the audit events and gain specific data insights that enable you to flag critical events taking place on the CloudHSM appliance.

Read More
Percepio_AWS-Solutions

Detecting Bugs in Deployed IoT Devices Using Percepio DevAlert

The average cost of fixing bugs in an embedded device’s first year of service alone can run in the hundreds of thousands of dollars. Percepio DevAlert works with AWS IoT Core to alert developers when an error is first detected, and provides visual trace diagnostics to identify the root cause. Percepio is an APN Advanced Technology Partner specializing in visual trace diagnostics for embedded and IoT device software developers. 

Read More

Automated Refactoring from Mainframe to Serverless Functions and Containers with Blu Age

Mainframe workloads are often tightly-coupled legacy monoliths with millions of lines of code, and customers want to modernize them for business agility. Manually rewriting a legacy application for a cloud-native architecture requires lots of re-engineering. See how Blu Age transformed a typical mainframe CICS application to AWS containers and AWS Lambda functions. You’ll also learn how to increase mainframe workload agility with refactoring to serverless and containers.

Read More