AWS Partner Network (APN) Blog
Tag: Zero Trust
Bringing Scale to Zero Trust Network Access with CylanceGATEWAY Using AWS Global Accelerator
Zero trust security is about achieving continuous security without slowing or complicating workflows, and BlackBerry’s collaboration with AWS unlocks the benefits of this approach for organizations of any size. Scale, simplicity, and security are important factors to an effective Zero Trust Network Access (ZTNA) platform. Learn how CylanceGATEWAY, an innovative ZTNA solution powered by AWS Global Accelerator that replaces traditional VPN technologies, brings this ideal state to reality.
Access Visibility and Governance for AWS with SailPoint Cloud Access Management
Many organizations lack visibility into cloud identities, leading to excessive, unused, or noncompliant access patterns. SailPoint Cloud Access Management is an identity-focused enterprise solution to certify, provision, and manage the cloud access lifecycle. SailPoint identifies inappropriate, unauthorized, and unused access in AWS to help organizations effectively secure their cloud infrastructure and related workloads.
Automate Istio-Enabled Amazon EKS Cluster Deployment with Tetrate’s EKS Blueprints Add-On
Istio and Envoy have become key technologies in the modern application stack, especially for enterprises adopting Zero Trust security standards for microservices applications. Using standardized tooling from AWS and Tetrate, it’s easier than ever to fully integrate Amazon EKS and Istio into modern, declarative IaC deployment processes. Learn how to use EKS Blueprints with Tetrate’s Istio add-on to stand up fully bootstrapped clusters.
Securing the 5G Network on AWS with Palo Alto Networks
Security is job zero at AWS and is one of the most important design principles of a Well-Architected Framework. Learn how to implement a 5G end-to-end security model based on Zero Trust principles using Palo Alto Networks’ 5G-native security solution for highly distributed and cloud-native 5G networks—with containerized 5G security and real-time threat correlation among 5G users, device identifiers, and a 5G network slice.
Implementing Zero-Trust Workload Security on Amazon EKS with Calico
Amazon EKS and Calico Cloud’s combined solution provides proof of security compliance to meet organizational regulatory requirements, but building and running cloud-native applications in EKS requires communication with other AWS and external third-party services. Learn how you can apply zero-trust workload access controls along with microsegmentation for workloads on EKS, and explore what implementing zero-trust workload access controls and identity-aware microsegmentation means for you.
How to Enhance Protection of AWS Workloads with the Juniper cSRX Container Firewall in Amazon EKS
Enterprises are embracing the Kubernetes orchestration platform for their DevOps and CI/CD processes. Amazon EKS makes this transition easy by managing the still relatively new Kubernetes ecosystem and ensuring IT admins can focus on the next area of innovation for their organizations. With the ability to deploy the Juniper cSRX Container Firewall in an Amazon EKS environment, customers can leverage the benefits of the container for protecting their workloads.
How Zscaler and AWS Wavelength Enable Secure Edge Computing with Zero Trust
Super low-latency connections for the mobile carrier network are becoming increasingly important as we move to an ever-connected mobile world. 5G connectivity is built from the ground up striving for the most effective and lowest latency communication. Learn how to protect your network using AWS Wavelength for effective carrier connectivity and Zscaler Private Access (ZPA) for Zero Trust security.
How AWS Partners Can Help You Sleep Well with a Strong Zero Trust Strategy for Remote Work
Security is something keeping many IT leaders up at night in this new normal. As companies build their long-term digital workplace strategies, looking at Zero Trust and what that means from a user perspective is key. In this post, we’ll define Zero Trust, highlight solutions that are key to delivering trust at the user level, and showcase AWS Competency Partners that offer these solutions to customers.
How to Securely Access Amazon Virtual Private Clouds Using Zscaler Private Access
When you are migrating private applications to AWS, how your users and administrators will access them needs to be considered. VPNs do not provide the granular control desired by a Zero Trust approach, as users have access to any resource on the network and not just specific resources they are granted access to. Learn how you can implement a Zero Trust approach to access applications hosted on AWS using Zscaler Private Access (ZPA).