AWS Partner Network (APN) Blog

Tag: AWS Key Management Service

AWS-SaaS-Factory-1

Using Amazon SQS in a Multi-Tenant SaaS Solution

Modern applications often rely on queuing for service integrations, batch processing, or as part of workflow orchestration. Queues are key to adding scale and resiliency to your environment. This is especially true in software-as-a-service (SaaS) environments. Explore some of the common scenarios used when building SaaS solutions with Amazon Simple Queue Service (SQS), and learn how data isolation, scalability, and compliance requirements might influence the queuing model you select.

Read More
SnapLogic-AWS-Partners

How SnapLogic eXtreme Helps Visualize Spark ETL Pipelines on Amazon EMR

Fully managed cloud services enable global enterprises to focus on strategic differentiators versus maintaining infrastructure. They do this by creating data lakes and performing big data processing in the cloud. SnapLogic eXtreme allows citizen integrators, those who can’t code, and data integrators to efficiently support and augment data-integration use cases by performing complex transformations on large volumes of data. Learn how to set up SnapLogic eXtreme and use Amazon EMR to do Amazon Redshift ETL.

Read More

How BriteCore Improved Security and Scalability by Migrating Insurance Workloads with AWS Landing Zone

BriteCore was originally designed as an on-premises data center-based monolith; a state-of-the-art core insurance solution. However, the business agility, cost savings, and increased security of the cloud made it clear the insurance industry had to migrate. Learn how BriteCore used AWS Landing Zone to deliver a modern administrative system for Property & Casualty insurance that could be more agile, scale better, and be more secure than on-premises infrastructure.

Read More
AWS-Config-Rules-1

Integrating Third-Party Solutions to AWS Config Rule Evaluations

AWS Config continuously monitors and records your AWS resource configurations, and allows you to automate the evaluation of recorded configurations against desired configurations. This post aims to assist you on deploying a set of custom AWS Config Rules that leverages third-party REST APIs to evaluate AWS resources in an automated fashion. The AWS Config evaluations represented in this guide show the reporting status of Amazon EC2 instances against TrendMicro and Qualys.

Read More
OakNorth-AWS-Partners

Commercial Lenders Will Emerge from COVID-19 in a New Light by Embracing Digital Transformation

Small businesses need support from bankers that understand their business. Lenders, overwhelmed with demand, need help cutting through all of the noise to focus on the most at-risk parts of their portfolio and prioritize engaging those customers. Together, banks, credit unions, and fintechs such as OakNorth can deploy capital more effectively and save the jobs and small and medium-sized businesses that power our economies. OakNorth is s a next-generation credit analysis and monitoring platform powered by AWS.

Read More
Xplenty_AWS-Competency

How to Use Xplenty with AWS KMS to Provide Field-Level Encryption in ETL Data Processing

Enterprises often choose to mask, remove, or encrypt sensitive data in the ETL step to minimize the risk of sensitive data becoming stored, logged, accessible, or breached from their data lake or data warehouse. Xplenty’s ETL and ELT platform allows customers to quickly and easily prepare their data for analytics using a simple-to-use data integration cloud service. Xplenty’s global service uses AWS KMS to create and control the keys used to encrypt or digitally sign your data.

Read More
HashiCorp_AWS Solutions

How to Secure Enterprise Cloud Environments with AWS and HashiCorp

Security isn’t always top of mind for developers because it can slow down software releases. HashiCorp Vault helps eliminate much of the security burden developers experience while trying to comply with security team requirements. Vault was built to address the difficult task of passing sensitive data to users and applications without it being compromised. Within Vault, all transactions are token-based, which limits potential malicious activity, and provides greater visibility into whom and what is accessing that information.

Read More