Tag: AWS Secrets Manager
Learn how to use ShardingSphere-Proxy to build database clusters, covering aspects such as sharding, read/write splitting, and dynamic configuration. Apache ShardingSphere is an ecosystem of open-source distributed database solutions, including JDBC and Proxy products, which can be deployed either independently or in combination. The commercial edition provides additional data security and data sharding features from AWS Partner SphereEx.
VMware vRealize Orchestrator is a part of VMware’s vRealize Suite and tied in closely with VMware vRealize Automation. This post highlights how you can use vRealize Orchestrator to deploy and manage VMware Cloud on AWS environments. It shows a method of automating VMware Cloud on AWS and helps admins get started using vRO to manage VMware Cloud on AWS environments. The sample code can be found in this GitHub page and follows the VMware Cloud on AWS API guide from VMware.
It has become increasingly important for companies to meet security and compliance standards set forth across industries today, but this is particularly a hurdle for smaller ISVs and startups that do not have the resources and budget to navigate the ever-growing list. Learn about an approach and best practices for SOC 2 compliance, and how DuploCloud accelerates time to compliance by natively integrating security controls into mainstream DevOps workflows.
The modern API lifecycle does not end once your CI/CD pipeline pushes a deployment to production and the API becomes available to clients. They still have to access documentation, try out different parts of the API, or get notifications about changes. API developer portals have become standard for businesses offering APIs to their partners and end users. Learn how to integrate ReadMe.com with Amazon API Gateway to make sure your documentation is up to date and gets changed every time you change the API.
Developing and deploying .NET applications on AWS helps organizations achieve the scale and agility offered by cloud computing. The TCS Serverless .NET deployment solution uses the AWS Serverless Application Model (AWS SAM) and simplifies deployment, scalability, and maintenance of .NET applications while providing increased efficiencies and easy adoption of the .NET solutions on AWS. Learn about the solution’s overview, architecture, key principles, and benefits using a case study from a large financial services company.
Data security is a particularly important topic for multi-tenant SaaS applications that handle customers’ sensitive data. How to securely segregate tenant data and how to provide data access to customers will vary depending on the SaaS solution’s architecture and its requirements. This post explores how SaaS vendors can build secure, scalable, and cost-effective data exchange mechanisms using SFTP (SSH File Transfer Protocol) with AWS managed services like AWS Transfer Family.
Armory recently launched its Continuous Deployment-as-a-Service solution which delivers the ability to declaratively automate your entire deployment process across multiple environments so that development teams can focus on writing great code rather than deploying it. Learn how the AWS SaaS Factory team supported Armory during the design of the solution through deep-dive workshops and sessions that helped accelerate the delivery of the SaaS product.
Open banking is revolutionizing financial services and companies like Yapily are at the forefront of this new wave of innovation. Learn how to build and deploy a basic application on AWS in a few simple steps using the Yapily Bank Connector. We’ll demonstrate how an end user would select their bank from a list, securely connect to that bank and give consent to either share data or make a payment. Connecting to thousands of banks, Yapily uses a secure open API to power industry leaders in financial services.
Cisco Meraki customers commonly question how they can extend their SD-WAN environment into an existing Amazon Web Services (AWS) footprint. They desire high availability and a way to automate reachability from their cloud resources down to their local branches. This post explores how Cisco Meraki customers can use an AWS Quick Start to help automate the highly available deployment of Meraki vMXs in multiple AWS Regions along with route propagation.
Learn how to set up an Amazon EC2 Mac instance with a hardened image provided by the Center for Internet Security (CIS). This will help you to mitigate common threats like malware, denial of service, insufficient authorization, and overlapping trust boundary threats. CIS is an AWS Partner and community-driven nonprofit that aims to make the connected world a safer place for people, businesses, and governments.