AWS Partner Network (APN) Blog

Tag: Security

Say Hello

Say Hello to 120 New AWS Competency, Service Delivery, Service Ready, and MSP Partners Added in November

We are excited to highlight 120 AWS Partners that received new designations in November for our global AWS Competency, AWS Managed Service Provider (MSP), AWS Service Delivery, and AWS Service Ready programs. These designations span workload, solution, and industry, and help AWS customers identify top AWS Partners that can deliver on core business objectives. AWS Partners are focused on your success, helping customers take full advantage of the business benefits AWS has to offer.

Protegrity-APN-Blog-121922

How Protegrity Helps Protect PII and PHI Data at Scale on Amazon S3 with AWS Lambda

With the ever-growing need for enterprise data to migrate to the cloud, and the necessity of keeping that data secure, organizations are searching for tools that enable migration while meeting regulatory requirements for data security and privacy. To meet these needs for customers, Protegrity has introduced new solutions leveraging Amazon S3, and these Cloud Protect for S3 products enable you to secure your sensitive data in S3 with Protegrity technology such as tokenization.

Cohesity-APN-Blog-121222.1

Defending Against Ransomware with AWS and Cohesity FortKnox

With an increase in frequency and severity of ransomware incidents worldwide, enterprises are under pressure to better safeguard their mission-critical data. To address this, Cohesity launched FortKnox, a modern data isolation and recovery-as-a-service solution that runs on AWS. Learn how it helps customers maintain an immutable virtual air-gapped copy of backup data that acts as an additional layer of protection against ransomware and other cybersecurity threats.

MOTON-Consulting-APN-Blog-120822

How IAM Health Cloud Helps You Manage AWS IAM Even When You Have Multiple Accounts

IAM Health Cloud is a SaaS solution available in AWS Marketplace that enables continuous and central collection and analysis of all AWS Identity and Access Management (IAM) data for determining a company’s IAM posture across any number of AWS accounts. Learn how to use IAM Health Cloud to gain near real-time centralized insight of all IAM assets across multiple AWS accounts, even if they are independent or part of fragmented AWS Organizations.

ASCENDING-APN-Blog-113022

Data Governance Across AWS Organizations for Security and Compliance

Data governance serves an important role in ensuring the quality, consistency, and security of data utilized across an organization. Using a multi-account structure with cross-account access is an AWS best practice that offers several other benefits. Learn how to set up a data governance system in AWS Organization accounts with clients’ use cases and solutions, and how ASCENDING overcame the technical challenges listed above.

Tetrate-APN-Blog-113022

Automate Istio-Enabled Amazon EKS Cluster Deployment with Tetrate’s EKS Blueprints Add-On

Istio and Envoy have become key technologies in the modern application stack, especially for enterprises adopting Zero Trust security standards for microservices applications. Using standardized tooling from AWS and Tetrate, it’s easier than ever to fully integrate Amazon EKS and Istio into modern, declarative IaC deployment processes. Learn how to use EKS Blueprints with Tetrate’s Istio add-on to stand up fully bootstrapped clusters.

Understand and Prioritize Risk Amplifiers Within Your Cloud with AWS Services and Sonrai Dig

Sonrai Dig is a platform built from the ground up to solve threats to your cloud through early recognition of significant risks, which can prevent the exploitation and monetizing of your data. With one platform, you get contextual integration of investments in AWS, as well as normalization of those same capabilities across multi-cloud deployments. Together, Sonrai Dig, Amazon Inspector, and Amazon GuardDuty complement each other’s ability to find and categorize risk urgency.

Palo-Alto-Networks-APN-Blog-112622-1

Securing the 5G Network on AWS with Palo Alto Networks

Security is job zero at AWS and is one of the most important design principles of a Well-Architected Framework. Learn how to implement a 5G end-to-end security model based on Zero Trust principles using Palo Alto Networks’ 5G-native security solution for highly distributed and cloud-native 5G networks—with containerized 5G security and real-time threat correlation among 5G users, device identifiers, and a 5G network slice.

Say Hello

Say Hello to 135 New AWS Competency, Service Delivery, Service Ready, and MSP Partners Added in October

We are excited to highlight 135 AWS Partners that received new designations in October for our global AWS Competency, AWS Managed Service Provider (MSP), AWS Service Delivery, and AWS Service Ready programs. These designations span workload, solution, and industry, and help AWS customers identify top AWS Partners that can deliver on core business objectives. AWS Partners are focused on your success, helping customers take full advantage of the business benefits AWS has to offer.

Orca-Security-APN-Blog-111522

Wix Combines Amazon GuardDuty and Orca Security to Provide Enterprise-Grade Security for Over 230 Million Users

The security team at Wix, a global leader in providing a comprehensive, cloud-based platform for web development, needed to reduce and prioritize the number of alerts and get a deeper dive into their cloud infrastructure stack. They sought to understand issues and vulnerabilities that could possibly be exploited and gain more context pertaining to incidents. Learn how Orca Security and Amazon GuardDuty helped prioritize detected alerts based on the severity of a security issue, its accessibility, and business impact.