AWS Partner Network (APN) Blog

Tag: AWS CloudTrail

DuploCloud-APN-Blog-110122

Provisioning Secure and Compliant Applications on AWS with DevSecOps and DuploCloud

It has become increasingly important for companies to meet security and compliance standards set forth across industries today, but this is particularly a hurdle for smaller ISVs and startups that do not have the resources and budget to navigate the ever-growing list. Learn about an approach and best practices for SOC 2 compliance, and how DuploCloud accelerates time to compliance by natively integrating security controls into mainstream DevOps workflows.

Understand and Optimize AWS Data Transfer Charges for Splunk Cloud on AWS Ingestion

Data transfer cost is a key component to consider when selecting your strategy to get data into Splunk Cloud on AWS. Customers using Splunk Cloud on AWS for their security, operational, and observability use cases may manage large volumes of data. Having a thorough understanding of AWS data transfer charges can help them optimize their architectures and costs. This post discusses the data transfer costs for five of the most common Splunk use cases.

How the TCS Serverless .NET Solution Simplifies .NET Application Deployment on AWS

Developing and deploying .NET applications on AWS helps organizations achieve the scale and agility offered by cloud computing. The TCS Serverless .NET deployment solution uses the AWS Serverless Application Model (AWS SAM) and simplifies deployment, scalability, and maintenance of .NET applications while providing increased efficiencies and easy adoption of the .NET solutions on AWS. Learn about the solution’s overview, architecture, key principles, and benefits using a case study from a large financial services company.

ChaosSearch-APN-Blog-090122

Accelerate FinTech Innovation and Streamline CloudOps with AWS and ChaosSearch

To stay ahead in a highly competitive market, FinTechs face multiple challenges, especially around maintaining development agility, operational excellence, and a strong security posture. This post explores how the ChaosSearch data platform combines the industry-leading scalability, data availability, security, and performance provided by Amazon S3 with revolutionary technology to help FinTechs address critical pain points and overcome core operational challenges.

Infosys-APN-Blog-080922

Proactive Patient Engagement with Infosys Digital Health Platform

Infosys Digital Health Platform is a connected health platform powered by AWS and is designed to help patients lead a healthy life. It achieves this through regular and in-depth insights on a patient’s daily habits and streaming of vital health parameters from different connected devices. It also tracks symptoms and quality-of-life indicators. With this information, the platform analyses data for multiple therapeutic areas and provides necessary insights.

How Multi-Tenancy with AWS Transfer Family is a Cost-Effective Solution

AWS Transfer Family provides SFTP, FTPS, and/or FTP access to Amazon S3 or Amazon Amazon EFS. It does that by providing a secure, highly available, and scalable server endpoint. You pay for the time this endpoint is enabled, and for data transfer (upload and download). Learn how this makes a multi-tenant setup where an endpoint is shared between different users (or applications), a more cost-efficient solution than having dedicated endpoints.

T-Systems-APN-Blog-071522

How T-Systems Enabled AWS Config at Scale for Deutsche Telekom IT’s Landing Zone

Learn how T-Systems has enabled AWS Config at scale on Deutsche Telekom IT’s AWS landing zone, which is a brownfield environment with more than 600 AWS accounts. AWS Config is a governance and compliance service that enables you to assess, audit, and evaluate the configurations of your resources. The main motivator for Deutsche Telekom IT using AWS Config is that developing compliance checks using custom tools was time consuming, unscalable, and came with a large operational overhead.

How to Use a CIS Hardened Image to Set Up an Amazon EC2 Mac Instance

Learn how to set up an Amazon EC2 Mac instance with a hardened image provided by the Center for Internet Security (CIS). This will help you to mitigate common threats like malware, denial of service, insufficient authorization, and overlapping trust boundary threats. CIS is an AWS Partner and community-driven nonprofit that aims to make the connected world a safer place for people, businesses, and governments.

Storm-Reply-APN-Blog-063022

Developing Data-Driven IoT Business Models for Sustainability with Storm Reply

Firms spend substantial efforts to identify and collect quality data streams from different sources. However, identifying and interpreting energy, water, or gas usage patterns and consumption types is sometimes insufficient. In this post, you’ll learn how Storm Reply, combining industry knowledge with its expertise in the development of data analytics platforms in AWS, can help customers in the design, development, and maintenance of secure serverless IoT big data platforms with a focus on sustainability.

T-Systems-APN-Blog-062722

Securing AWS Accounts with Azure Active Directory Federation

With AWS Identity and Access Management (IAM), AWS provides a central way to manage user identities and permissions. However, creating and managing the lifecycle of IAM users in AWS can be time-consuming. This post explores how to authenticate users against Azure AD for access to one or multiple AWS accounts using SAML federation. Additionally, it includes a walkthrough on how to setup the federation across Azure AD and multiple AWS accounts.