Tag: AWS IAM
In the financial services industry, detecting fraud is a complex process. For any given transaction or activity, the system needs to decide whether it’s fraudulent or not and take action within seconds. With Redis Enterprise Cloud‘s sub-millisecond latency speeds, up to five 9’s of availability, linear scalability, and multiple data model support coupled with the global cloud infrastructure support of AWS, organizations can benefit from building a real-time fraud detection system to manage and control fraud.
SMBs with limited resources are often challenged with time and resource constraints to perform AWS Well-Architected Reviews on a regular basis. CloudCheckr CMx gives you the visibility and intelligence you need to lower costs, maintain security and compliance, and optimize resources in single or multi-cloud infrastructure. CloudCheckr’s Well-Architected Readiness Advisor report leverages the AWS Well-Architected Tool to map CloudCheckr’s best practice checks to the 6 pillars of AWS Well-Architected.
When a DXC Technology customer wanted a complete view of requests traveling through an application so they could compare trace sets with different conditions, DXC deployed distributed tracing using AWS X-Ray. This helped monitor and debug distributed applications within the workflow to aid in swift identification of performance issues or errors. Explore the solution’s reference architecture and follow a step-by-step how to enable AWS X-Ray for different AWS products.
Organizations have matured and have overcome the initial hurdles of proving the capabilities of AI. The challenge now is operationalizing AI and building engineering excellence to successfully adopt and manage machine learning at scale. Learn how Quantiphi assisted Venterra Realty in bringing in the best ML solution development and deployment practices through NeuralOps—a framework built on Amazon SageMaker.
An integral component to most serverless architectures is AWS Lambda, the compute service that lets you run code for virtually any type of application without provisioning or managing servers. Fastly has extended its Next-Gen WAF to Lambda functions, supporting customers looking to embed additional layers of security into their serverless workloads. Fastly’s Next-Gen WAF supports numerous other deployment scenarios including virtual machines, containers, and web servers.
The HashiCorp Terraform AWS provider has surpassed more than one billion downloads, and every single Terraform apply starts with a provider credentials setup. The new dynamic provider credentials feature offers the ability to generate dynamic, short-lived credentials for Terraform Cloud runs using OIDC. This feature is now available for all Terraform Cloud tiers. Terraform Cloud is HashiCorp’s managed service offering and eliminates the heavy lifting for practitioners, teams, and organizations to use Terraform in production.
Organizations have a requirement to implement data governance due to the presence of personally identifiable information. The process of sharing and operationalizing data movement becomes an involved task, as it must encompass data governance, data security, and include audit capabilities. Learn about a modern process LTIMindtree has introduced for data transfer using AWS Step Functions and for sharing transformed data to another account regardless of regional location.
In computer vision applications, the transmission of video data to the cloud for analysis can result in added delays due to various contributing factors such as queuing, propagation, and network latency. Learn how the Nordcloud team, in collaboration with AWS, has designed a “Computer Vision at the Edge” solution based on AWS Panorama. It caters to organizations seeking low-latency decision making without the burden of managing complex technology.
Tenant data isolation is a core SaaS concept, verifying that tenant resources remain in isolated environments. There are a number of ways to achieve this isolation, and one common approach is to use a token vending machine that issues tenant-scoped credentials at runtime. Explore an alternate approach to vending tokens that uses Amazon EKS and open-source HashiCorp Vault, simplifying access to the credentials and streamlining the overall management of tenant-scoped policies.
Amazon S3 is ideal when you want to store documents, images, and videos and render with faster performance. Learn about the object storage accelerator built by DXC Technology, a serverless solution that automatically creates code repository, CI/CD pipeline, and S3 storage APIs with security best practices in a two-step deployment process. The solution is technology-agonistic which means any customer project can consume these services after deployment.