AWS Partner Network (APN) Blog

Tag: Partners with AWS Qualified Offerings

Armory Launches Continuous Deployment-as-a-Service Solution with Support from AWS SaaS Factory

Armory recently launched its Continuous Deployment-as-a-Service solution which delivers the ability to declaratively automate your entire deployment process across multiple environments so that development teams can focus on writing great code rather than deploying it. Learn how the AWS SaaS Factory team supported Armory during the design of the solution through deep-dive workshops and sessions that helped accelerate the delivery of the SaaS product.

Read More

Implementing Zero-Trust Workload Security on Amazon EKS with Calico

Amazon EKS and Calico Cloud’s combined solution provides proof of security compliance to meet organizational regulatory requirements, but building and running cloud-native applications in EKS requires communication with other AWS and external third-party services. Learn how you can apply zero-trust workload access controls along with microsegmentation for workloads on EKS, and explore what implementing zero-trust workload access controls and identity-aware microsegmentation means for you.

Read More
Nobl9-APN-Blog-080122

Make Business Decisions with Service-Level Objectives Using Amazon Redshift and Nobl9

Setting and monitoring clear, appropriate, and actionable reliability goals can be a challenging task, especially in large-scale businesses. Nobl9 helps organizations use service-level objectives (SLOs) to find a balance between operational efficiency, reliable delivery of services, cost control, and customer satisfaction. Explore how you can use Nobl9’s integration with Amazon Redshift to easily set up SLOs on top of your product data and derive actionable insights.

Read More

Build and Deploy a Secure Container Image with AWS and Snyk

Learn how to build a Java application in a Docker container and push the container image to Amazon ECR orchestrated by AWS CodePipeline. We’ll use Snyk to scan your code, build a container image, and display the results in both Snyk and Amazon ECR. We’ll also show you how Amazon Inspector utilizes Snyk open source to provide insight into your software security vulnerabilities. All of this functionality is available from the AWS Management Console.

Read More

Power Your AWS Application with Customer Bank Data and Payments Using Yapily APIs

Open banking is revolutionizing financial services and companies like Yapily are at the forefront of this new wave of innovation. Learn how to build and deploy a basic application on AWS in a few simple steps using the Yapily Bank Connector. We’ll demonstrate how an end user would select their bank from a list, securely connect to that bank and give consent to either share data or make a payment. Connecting to thousands of banks, Yapily uses a secure open API to power industry leaders in financial services.

Read More
F5-Logo-10-Years-2022-1

10 Years of Success: AWS and F5

In celebration of the 10-year anniversary of the AWS Partner Network (APN), we are highlighting some of our AWS Partners who have grown with us over the past decade. F5 is an industry leader in cloud security and application services with 25+ years of experience helping businesses accelerate and simplify cloud migration. We spoke with Dave Morrissey, AWS Global Alliance Director at F5, to talk about how they worked closely with AWS teams to launch the company’s first SaaS offering, and F5’s plans for the future.

Read More
DataMasque-APN-Blog-071222

How to Mask Sensitive Data on AWS Using DataMasque

DataMasque is an AWS Partner that removes sensitive data from the databases and replaces it with realistic and functional masked values that enable effective development, testing, and analytics. This empowers AWS customers to do secure deployments in testing or non-production environments while mitigating the data breach security risks and allowing relevant teams to focus on development and testing of their applications without hinderance.

Read More

How to Use a CIS Hardened Image to Set Up an Amazon EC2 Mac Instance

Learn how to set up an Amazon EC2 Mac instance with a hardened image provided by the Center for Internet Security (CIS). This will help you to mitigate common threats like malware, denial of service, insufficient authorization, and overlapping trust boundary threats. CIS is an AWS Partner and community-driven nonprofit that aims to make the connected world a safer place for people, businesses, and governments.

Read More
Druva-APN-Blog-070822

Future Proof Cost Optimization with Attribute-Based Instance Type Selection and Amazon EC2 Spot

As part of its SaaS platform, Druva runs containerized applications with microservices architecture using Auto Scaling groups and Amazon Amazon ECS. Explore the cost optimization journey of Druva using Spot instances with Auto Scaling groups, challenges faced by them during this journey, and how attribute-based instance type selection (ABS) came to the rescue in addressing those challenges in optimizing costs.

Read More

Building an Asset Tracking Solution Using LoRaWAN with Semtech LoRa Cloud and AWS IoT Core for LoRaWAN

LoRaWAN is a leading protocol utilizing Semtech’s LoRa long-range communications technology for LPWAN in battery-operated, remote monitoring, and control applications. AWS IoT Core for LoRaWAN offers a fully-managed LoRaWAN network server and delivers highly scalable, reliable services for a wide variety of use cases. Learn the core elements in an asset tracking application and how AWS and Semtech help lower the barrier for developers looking to deploy solutions.

Read More