AWS Partner Network (APN) Blog

Tag: Security

TCS-AWS-Partners-1

How TCS Cloud Exponence Monitors Security and Compliance Across AWS Accounts

The move to primarily cloud-based operations has pushed enterprises to prioritize digital security mechanisms and regulatory compliance controls to safeguard weaknesses and reduce effects of an attack. TCS Cloud Exponence is a multi-cloud operations solution with a focus on a range of critical security operations such as cloud perimeter monitoring, patch management, vulnerability assessment, compliance monitoring, alerting, and reporting.

Capgemini-AWS-Partners

Developing Payment Card Industry Compliant Solutions on AWS to Protect Customer Data

Financial institutions possess and process data that are very sensitive and have immense business value. In recent years, regulations like open banking and data residency law have forced organizations to be even more adaptive to frequent challenges to systems storing and processing the data. Explore how Capgemini developed an application to address this customer challenge and learn how the approach helped worldwide credit card provider comply with PCI DSS security standards.

Cazena-AWS-Partners

Accelerating Apache and Hadoop Migrations with Cazena’s Data Lake as a Service on AWS

Running Hadoop, Spark, and related technologies in the cloud provides the flexibility required by these distributed systems. Cazena provides a production-ready, continuously optimized and secured Data Lake as a Service with multiple features that enables migration of Hadoop and Spark analytics workloads to AWS without the need for specialized skills. Learn how Cazena makes it easy to migrate to AWS while ensuring your data is as secure on the cloud as it is on-premises.

Say Hello

Say Hello to 42 New AWS Competency, Service Delivery, and MSP Partners Added in February

We are excited to highlight 42 APN Partners that received new designations in January for our global AWS Competency, AWS Managed Service Provider (MSP), and AWS Service Delivery programs. These designations span workload, solution, and industry, and help AWS customers identify top APN Partners that can deliver on core business objectives. APN Partners are focused on your success, helping customers take full advantage of the business benefits AWS has to offer.

Managing Red Hat Enterprise Linux Systems on AWS with Red Hat Insights

Red Hat Insights helps you manage Red Hat Enterprise Linux (RHEL) Systems on AWS by analyzing physical, virtual, container, and hybrid private and public cloud environments, comparing them to more than 1,000 rules. These rules identify potential threats that could lead to business disruptions. Insights scans your environments daily, summarizes any identified risks in its dashboard, and provides remediation steps for those risks.

Dyatrace_AWS-Competency

AWS Single Sign-On Integration Guide for Dynatrace

End users can now configure AWS Single Sign-On (AWS SSO) to access Dynatrace with a single sign-on experience using the same credentials they use with their Amazon Web Services (AWS) account. AWS Single Sign-On provides administrators a simple way to assign users and groups access to AWS accounts, roles, and SAML-based applications. This eliminates the need for users to log in to Dynatrace separately.

AWS-Competency-Validation-Checklist

New-Look AWS Competency Validation Checklists for APN Technology Partners

To receive the AWS Competency designation, which showcases top APN Partners to customers, organizations must undergo rigorous technical validation. To help APN Technology Partners understand this process and our validation requirements, we are releasing new versions of the AWS Competency Validation Checklists (VCL). These checklists outline the customer case study and technical criteria needed for APN Technology Partners to achieve the AWS Competency designation.

Xplenty_AWS-Competency

How to Use Xplenty with AWS KMS to Provide Field-Level Encryption in ETL Data Processing

Enterprises often choose to mask, remove, or encrypt sensitive data in the ETL step to minimize the risk of sensitive data becoming stored, logged, accessible, or breached from their data lake or data warehouse. Xplenty’s ETL and ELT platform allows customers to quickly and easily prepare their data for analytics using a simple-to-use data integration cloud service. Xplenty’s global service uses AWS KMS to create and control the keys used to encrypt or digitally sign your data.

Security-8

How to Send CloudHSM Audit Logs to Splunk and Monitor Critical Events on the HSM

AWS CloudHSM is a cloud-based hardware security module (HSM) that enables you to easily generate, store, import, export, and manage your cryptographic keys. This post walks through using AWS services to create a pipeline that sends HSM audit logs into Splunk. You’ll also learn how to interpret the audit events and gain specific data insights that enable you to flag critical events taking place on the CloudHSM appliance.

Databricks_AWS-Competency

Enabling AWS Single Sign-On (SSO) Service Integration with Databricks Control Plane

AWS Single Sign-On makes it easy to centrally manage SSO access to multiple AWS accounts and business applications. You can use AWS SSO to create and manage users centrally and grant access to AWS accounts and business applications, such as Databricks. Instead of having to sign in separately to Databricks Control Plane and other business applications, with this configuration enabled users can access Databricks with their corporate credentials using AWS SSO.