AWS Partner Network (APN) Blog

Tag: AWS Resource Access Manager

Informatica-AWS-Partners-1

Automate Data Sharing with Informatica Axon Data Marketplace and AWS Lake Formation

A key goal of modern data strategy, whether a data mesh, data fabric, data lake, or data warehouse, is to deliver access to data when and where it’s needed. Learn how AWS and Informatica can combine and automate data governance for access within a data marketplace. This solution combines Information’s data governance architecture and the Informatica Intelligent Data Management Cloud (IDMC) which orchestrates and automates data access management with AWS Lake Formation.

Read More
VMware Cloud on AWS-dark

Bring Your Own Public IP (BYOIP) Addresses to VMware Cloud on AWS

Learn how to support a multi-region, business-critical legacy monolithic application with customer-owned static public IPv4 addresses running on VMware Cloud on AWS. You can do this whilst using the AWS Cloud to deliver the Bring Your Own Public IPv4 Address (BYOIP) function with Amazon VPC, Network Load Balancer, Elastic IP address, Amazon Route 53, and VMware Transit Connect. VMware Cloud on AWS is an integrated hybrid cloud offering jointly developed by AWS and VMware.

Read More
Tech-Mahindra-AWS-Partners-2

Seamless Transition from an AWS Landing Zone to AWS Control Tower

A well-architected multi-account AWS environment helps businesses use AWS to migrate, modernize, and innovate faster. Many customers currently using the self-managed AWS Landing Zone solution are looking to transition to AWS Control Tower to gain additional benefits. This post describes a strategic collaboration between Tech Mahindra, AWS, and a customer in Africa to transition from AWS Landing Zone to the AWS Control Tower environment.

Read More
Atos-AWS-Partners

Driving Business Innovation and Delivering Cloud Security with Digital Cloud Services from Atos

Digital Cloud Services (DCS) is a fully managed AWS landing zone-as-a-service from Atos, and the DCS solution offers a managed landing zone platform with enterprise-grade security. It provides customers with the ideal environment to start or continue their business transformation, at pace and scale in a self-service manner. With DCS, customers are safe in the knowledge the underlying platform is built to CIS benchmarks and AWS Well-Architected Framework standards.

Read More
Rackspace-AWS-Partners

How Rackspace Uses CloudEndure to Accelerate Workloads Migration to AWS

The size and complexity of an initial migration can be complicated for many enterprises. Learn how to migrate (lift and shift) multiple workloads at speed using CloudEndure Migration, and how Rackspace can help guide this migration. Rackspace has created reusable design artifacts together with automation to describe and deploy a collection of AWS services capable of hosting CloudEndure Migration. This solution provides full IP connectivity between your data center and AWS.

Read More
Splunk-AWS-Partners

How to Leverage Amazon Route 53 VPC DNS Queries in Splunk on AWS

Customers are always looking for new ways to improve operational efficiency and the security posture of applications running in their virtual private clouds (VPCs). Amazon Route 53 recently launched a Resolver Query Logs capability which lets customers log the DNS queries originating in their Amazon VPC. Follow along with our step-by-step instructions for logging VPC DNS queries in Amazon Route 53, ingesting them into Splunk, and then analyzing them with Splunk.

Read More

Reducing the Cost of Managing Multiple AWS Accounts Using AWS Control Tower

As larger and more complex workloads are deployed on AWS, multi-account solutions are an increasingly common architectural blueprint. Often referred to as cloud “landing zones,” these blueprints enable simple administrative boundaries. However, using multiple accounts increases the complexity of security tooling, access control and authorization, and cross-account networking. AWS Control Tower simplifies the process of setting up multi-account environments with predefined security baseline templates.

Read More