AWS Partner Network (APN) Blog

Tag: Security

Say Hello

Say Hello to 48 New AWS Competency Partners Added in July

The AWS Competency Program welcomed 48 new APN Partners in July—spanning workload, solution, and industry designations. The AWS Competency Program helps customers identify and choose the world’s top APN Partners that have demonstrated technical proficiency and proven customer success in specialized solution areas. Please join us in welcoming our newest AWS Competency Partners!

Read More
AWS Competency_featured

New Validation Checklists Clarify Requirements for the AWS Competency Program

To receive the AWS Competency designation, APN Partners must undergo rigorous technical validation and assessment of the security, performance, and reliability of their AWS solutions. To help APN Consulting Partners better understand this process and our validation requirements, we are releasing new versions of the AWS Competency Validation Checklists. The checklists highlighted in this post are for APN Consulting Partners, who in many cases undergo technical validation through ISSI, a third-party auditor.

Read More
Alert Logic_AWS Solutions

Preventing Security Fires with Amazon GuardDuty and Alert Logic Cloud Insight Essentials

Cloud Insight Essentials is an Alert Logic solution available in AWS Marketplace. It is a vulnerability assessment solution allowing customers to find risky configurations that go against AWS Security Best Practices. The solution does this by analyzing AWS APIs and scanning AWS CloudTrail events looking for unsafe configurations. Cloud Insight Essentials also provides security context for the complete list of Amazon GuardDuty findings so customers can take short- and long-term actions to reduce potential security threats.

Read More
GuardiCore_AWS Solutions

Evaluate Network Security with GuardiCore’s Infection Monkey—a Breach and Attack Simulation Tool

Ensuring that proper security measures are in place calls for robust security testing mechanisms. GuardiCore’s Infection Monkey is an open source Breach and Attack Simulation (BAS) tool that tests and evaluates the effectiveness of your network security configurations during post-breach attacks. You can simulate a breach by “infecting” a server with a “Monkey” that runs around your network using various methods to enter propagation paths and attacks each point of vulnerability it discovers.

Read More
GDPR

How AWS Supports Customers and APN Partners on the Journey to GDPR Compliance

Since AWS has announced that all our services comply with the General Data Protection Regulation (GDPR), we wanted to explore some of the ways AWS can help you on your road to compliance. In this post, we walk through the support AWS offers across the APN as well as the AWS Premium Support and AWS Professional Services organizations. We explain how these teams are working with customers and APN Partners in Europe and around the world to support them with questions related to GDPR and AWS.

Read More
Security-2

Securing and Managing Secrets with HashiCorp Vault Enterprise

Data security is a concern for all enterprises and HashiCorp’s Vault Enterprise helps you achieve strong data security and scalability. Vault is a trusted secrets management tool designed to enable collaboration and governance across organizations. It enables developers, operators, and security professionals to deploy applications in zero-trust environments across public and private datacenters. Through a unified API and AWS integration, Vault can be integrated into your development at any stage.

Read More
AWS Solution Space

New AWS Solution Space Launches with 10 Customer-Ready Solutions

AWS Solution Space allows AWS Competency Partners to showcase customer-ready solutions based on architectures validated by AWS. These are quick, cost effective, repeatable solutions meant to create new business leading to production workloads. Customers can also request AWS support for launching each solution. At launch, we are featuring 10 customer-ready solutions: 5 for Big Data, 3 for Machine Learning, one for Security, and one for End User Computing.

Read More
AWS Migration

Enterprises Are Migrating to AWS with Confidence with Cloud-Native Visibility

As the move towards cloud accelerates, unsubstantiated fears about security are inhibiting the use of cloud services by some enterprises. A vital element of a successful cloud migration is understanding shared responsibilities between the organization and cloud service provider. Ixia’s CloudLens has a serverless architecture that scales with distributed software systems built for cloud scale, which delivers intelligent, resilient, and proactive cloud visibility.

Read More
VMware Cloud on AWS

Securing Workloads on VMware Cloud on AWS Using Native AWS Services

With the recent launch of VMware Cloud on AWS, you can now run workloads on VMware-managed SDDC clusters installed on special bare metal hardware provided by Amazon Amazon EC2 services. This post describes a solution for securing workloads on VMware Cloud on AWS that we demonstrated at VMworld 2017. VMware workloads that run in the SDDC cluster can leverage different levels of AWS network and application protection capabilities with minimum to no changes to their application settings.

Read More
SaaS Factory_feature

Managing SaaS Identity Through Custom Attributes and Amazon Cognito

Identity is a fundamental design decision that software as a service (SaaS) architects must consider when developing a multi-tenant system. Developers who are building SaaS applications must be able to identify a user, the tenant associated with the user, the user’s permissions, and the relationship a tenant has with the provider, such as usage plan or tier. In this post for SaaS Technology Partners, I will explore how to architect a multi-tenant system and identify tenant context and role using Amazon Cognito.

Read More