AWS Partner Network (APN) Blog

Tag: Partners with AWS Qualified Offerings

Build and Deploy a Secure Container Image with AWS and Snyk

Learn how to build a Java application in a Docker container and push the container image to Amazon ECR orchestrated by AWS CodePipeline. We’ll use Snyk to scan your code, build a container image, and display the results in both Snyk and Amazon ECR. We’ll also show you how Amazon Inspector utilizes Snyk open source to provide insight into your software security vulnerabilities. All of this functionality is available from the AWS Management Console.

Read More

Power Your AWS Application with Customer Bank Data and Payments Using Yapily APIs

Open banking is revolutionizing financial services and companies like Yapily are at the forefront of this new wave of innovation. Learn how to build and deploy a basic application on AWS in a few simple steps using the Yapily Bank Connector. We’ll demonstrate how an end user would select their bank from a list, securely connect to that bank and give consent to either share data or make a payment. Connecting to thousands of banks, Yapily uses a secure open API to power industry leaders in financial services.

Read More
F5-Logo-10-Years-2022-1

10 Years of Success: AWS and F5

In celebration of the 10-year anniversary of the AWS Partner Network (APN), we are highlighting some of our AWS Partners who have grown with us over the past decade. F5 is an industry leader in cloud security and application services with 25+ years of experience helping businesses accelerate and simplify cloud migration. We spoke with Dave Morrissey, AWS Global Alliance Director at F5, to talk about how they worked closely with AWS teams to launch the company’s first SaaS offering, and F5’s plans for the future.

Read More
DataMasque-APN-Blog-071222

How to Mask Sensitive Data on AWS Using DataMasque

DataMasque is an AWS Partner that removes sensitive data from the databases and replaces it with realistic and functional masked values that enable effective development, testing, and analytics. This empowers AWS customers to do secure deployments in testing or non-production environments while mitigating the data breach security risks and allowing relevant teams to focus on development and testing of their applications without hinderance.

Read More

How to Use a CIS Hardened Image to Set Up an Amazon EC2 Mac Instance

Learn how to set up an Amazon EC2 Mac instance with a hardened image provided by the Center for Internet Security (CIS). This will help you to mitigate common threats like malware, denial of service, insufficient authorization, and overlapping trust boundary threats. CIS is an AWS Partner and community-driven nonprofit that aims to make the connected world a safer place for people, businesses, and governments.

Read More
Druva-APN-Blog-070822

Future Proof Cost Optimization with Attribute-Based Instance Type Selection and Amazon EC2 Spot

As part of its SaaS platform, Druva runs containerized applications with microservices architecture using Auto Scaling groups and Amazon Amazon ECS. Explore the cost optimization journey of Druva using Spot instances with Auto Scaling groups, challenges faced by them during this journey, and how attribute-based instance type selection (ABS) came to the rescue in addressing those challenges in optimizing costs.

Read More

Building an Asset Tracking Solution Using LoRaWAN with Semtech LoRa Cloud and AWS IoT Core for LoRaWAN

LoRaWAN is a leading protocol utilizing Semtech’s LoRa long-range communications technology for LPWAN in battery-operated, remote monitoring, and control applications. AWS IoT Core for LoRaWAN offers a fully-managed LoRaWAN network server and delivers highly scalable, reliable services for a wide variety of use cases. Learn the core elements in an asset tracking application and how AWS and Semtech help lower the barrier for developers looking to deploy solutions.

Read More

Adding F5 BIG-IP Virtual Edition Load Balancing for Container Network Functions in Amazon EKS

The F5 BIG-IP Virtual Edition (VE) load balancer deployment adds new Layer 4 application capabilities and added visibility to those applications inside an Amazon EKS cluster to ensure a successful deployment in a containerized environment. This post presents a step-by-step guide for using the F5 BIG-IP VE on AWS as a load balancer for EKS clusters by using additional components, including the F5 Container Ingress Service (CIS) and F5 IPAM Controller (FIC).

Read More
Snowflake-APN-Blog-062722

Enabling Data-Centric Artificial Intelligence Through Snowflake and Amazon SageMaker

Data-centric AI (DCAI) has been described as the discipline of systematically engineering the data used to build an AI system. It prescribes prioritizing improving data quality over tweaking algorithms to improve machine learning models. In this post, explore a DCAI solution built on Snowflake and Amazon SageMaker to serve as a factory for predictive analytics solutions. Learn about Snowflake’s integrations with SageMaker and get hands-on resources to help you put these capabilities into practice.

Read More

Automating Serverless Best Practices with Dashbird’s Serverless Well-Architected Insights

Customers building on AWS can benefit from specific alignment to either their architecture or an industry vertical via lenses which are included within the AWS Well-Architected Tool and include questions applicable to that particular workload. Learn how findings from the Serverless Application Lens can be automated using Dashbird Insights to show misconfigurations and best practice violations in relation to serverless workloads. This post walks through the deployment of an example serverless application that we’ll profile using Dashbird Insights.

Read More