AWS Partner Network (APN) Blog

Tag: Security

Managing Red Hat Enterprise Linux Systems on AWS with Red Hat Insights

Red Hat Insights helps you manage Red Hat Enterprise Linux (RHEL) Systems on AWS by analyzing physical, virtual, container, and hybrid private and public cloud environments, comparing them to more than 1,000 rules. These rules identify potential threats that could lead to business disruptions. Insights scans your environments daily, summarizes any identified risks in its dashboard, and provides remediation steps for those risks.

Dyatrace_AWS-Competency

AWS Single Sign-On Integration Guide for Dynatrace

End users can now configure AWS Single Sign-On (AWS SSO) to access Dynatrace with a single sign-on experience using the same credentials they use with their Amazon Web Services (AWS) account. AWS Single Sign-On provides administrators a simple way to assign users and groups access to AWS accounts, roles, and SAML-based applications. This eliminates the need for users to log in to Dynatrace separately.

AWS-Competency-Validation-Checklist

New-Look AWS Competency Validation Checklists for APN Technology Partners

To receive the AWS Competency designation, which showcases top APN Partners to customers, organizations must undergo rigorous technical validation. To help APN Technology Partners understand this process and our validation requirements, we are releasing new versions of the AWS Competency Validation Checklists (VCL). These checklists outline the customer case study and technical criteria needed for APN Technology Partners to achieve the AWS Competency designation.

Xplenty_AWS-Competency

How to Use Xplenty with AWS KMS to Provide Field-Level Encryption in ETL Data Processing

Enterprises often choose to mask, remove, or encrypt sensitive data in the ETL step to minimize the risk of sensitive data becoming stored, logged, accessible, or breached from their data lake or data warehouse. Xplenty’s ETL and ELT platform allows customers to quickly and easily prepare their data for analytics using a simple-to-use data integration cloud service. Xplenty’s global service uses AWS KMS to create and control the keys used to encrypt or digitally sign your data.

Security-8

How to Send CloudHSM Audit Logs to Splunk and Monitor Critical Events on the HSM

AWS CloudHSM is a cloud-based hardware security module (HSM) that enables you to easily generate, store, import, export, and manage your cryptographic keys. This post walks through using AWS services to create a pipeline that sends HSM audit logs into Splunk. You’ll also learn how to interpret the audit events and gain specific data insights that enable you to flag critical events taking place on the CloudHSM appliance.

Databricks_AWS-Competency

Enabling AWS Single Sign-On (SSO) Service Integration with Databricks Control Plane

AWS Single Sign-On makes it easy to centrally manage SSO access to multiple AWS accounts and business applications. You can use AWS SSO to create and manage users centrally and grant access to AWS accounts and business applications, such as Databricks. Instead of having to sign in separately to Databricks Control Plane and other business applications, with this configuration enabled users can access Databricks with their corporate credentials using AWS SSO.

APN TV-1

Introducing APN TV: Learn How the AWS Partner Network Can Help You Grow and Scale on AWS

To help you sharpen cloud skills and strengthen your AWS-based business offerings, we are excited to introduce AWS Partner Network TV, or APN TV for short. Whether you’re looking for consulting services or strategic technology solutions, you’ll discover APN TV videos that showcase how AWS customers in similar situations have teamed up with APN Partners to drive better business and bigger results. Videos include demos, interviews, success stories, and webinars featuring top APN Partners.

Secure Certificate Management with HashiCorp Consul on AWS

The adoption of service mesh has been accelerated by the emergence of microservices. Companies leverage orchestration tools for deploying services, and then use a service mesh to manage the connections between them. These solutions provide important capabilities, such as traffic management and load balancing. Learn how HashiCorp Consul and AWS Certificate Manager Private CA automate certificate management, perform signing operations, and rotate private certificates.

Say Hello

Say Hello to 104 New AWS Competency, MSP, and Service Delivery Partners Added in December

We are excited to highlight 104 APN Partners that received new designations in December for our global AWS Competency, AWS Managed Service Provider (MSP), and AWS Service Delivery programs. These designations span workload, solution, and industry, and help AWS customers identify top APN Partners that can deliver on core business objectives. APN Partners are focused on your success, helping customers take full advantage of the business benefits AWS has to offer.

Deep-Instinct_AWS-Competency

How Deep Neural Networks Built on AWS Can Help Predict and Prevent Security Threats

Deep learning is inspired by the human brain and once a brain learns to identify an object, its identification becomes second nature. Similarly, as Deep Instinct’s artificial neural network learns to detect more and more types of cyber threats, its prediction capabilities become instinctive. As a result, malware both known and new can be predicted and prevented in zero-time. Deep Instinct’s predictive threat prevention platform can be applied against known or unknown threats, whether it be a file or fileless attack.