AWS Marketplace

Category: Security, Identity, & Compliance

CyberArk Identity as SSO for AWS Control Tower

CyberArk Identity as SSO for AWS Control Tower

Migrating to the AWS cloud has enabled many organizations to reduce costs, innovate faster, and deliver business results more effectively. As you expand your AWS infrastructure, you require multi-account governance strategies as well as implementation of best practices to your expanded environment. AWS Control Tower implements AWS best practices to establish a well-architected, multi-account baseline […]

Read More
Enhance digital security by automating certificate management with CLMaaS in AWS Marketplace

Enhance digital security by automating certificate management with CLMaaS in AWS Marketplace

Cryptography and digital certificates are the security backbone of modern digital enterprises. An automated certificate lifecycle management (CLM) solution helps you efficiently manage your certificates, and, in turn, bolster your security posture. Digital transformation, cloud migration, remote work, and Internet of Things (IoT) create growth opportunities for organizations. However, they also bring security challenges of […]

Read More
Automate multi-account backup and disaster recovery with Druva and AWS Control Tower

Automate multi-account backup and disaster recovery with Druva and AWS Control Tower

With enterprises scaling up their AWS workloads across hundreds if not thousands of AWS accounts, customers have expressed the need to simplify data protection as they scale. Customers can use Druva to centrally manage, monitor, and secure backups across multi-account AWS environments and achieve an enhanced, organization-level view of data protection across their AWS services. […]

Read More
Sysdig AWS Control Tower featured image blog

Unified multi-account security and compliance with Sysdig Secure and AWS Control Tower

Managing security across multiple cloud accounts can be complicated and error-prone if you’re taking a manual, piecemeal approach. As you scale, misconfigurations and missed accounts and services can leave you exposed. Automation can help you maintain speed and agility for DevOps and security teams. To quickly onboard and manage security for multiple accounts in AWS, […]

Read More
AWS Control Tower Lacework blog post

Securing your AWS Control Tower multi-account environment with Lacework

For enterprise organizations, managing security and governance across hundreds or thousands of accounts can be challenging. AWS Control Tower and Lacework make this task much easier and enable seamless multi-account cloud security. By using Lacework in your AWS Control Tower environment, you can automatically and consistently apply security best practices and monitoring to new accounts […]

Read More
Integrating Dropbox with AWS SSO for governed file sharing in an AWS Control Tower environment

Integrating Dropbox with AWS SSO for governed file sharing in an AWS Control Tower environment

The customers who operate in multi-account AWS environments often ask me for ways to simplify accessing critical business files and share content with their employees. While my customers share the content between business groups or external business partners, it is important to gain visibility and controls with minimum operational overhead. Dropbox, available in AWS Marketplace, […]

Read More
Liquibase removes database bottlenecks for faster, safer database releases

Liquibase removes database bottlenecks for faster, safer database releases

Application code changes often depend on database schema changes. Developers rely on database administrators (DBAs) to perform database code deployments. When the number of databases and releases is small, this solution works well. As organizations move to the cloud, the number of different databases increases, both in type and usage. Along with the increase in […]

Read More
Solution Illustration: The Local Amazon VPC is assigned the virtual subnet of 100.64.2.0/24, and the remote site is assigned 100.64.1.0/24. The Aviatrix Gateway connects to the remote site with IPsec VPN and performs NAT. Thus, it maps the virtual subnets to the real subnets as packets move through the gateway

How to solve overlapping IP addresses using the Aviatrix Cloud Network Platform

You have an awesome application running on AWS, and now your customers and partners want a private network connection to it. Great! Except for one problem: their site is using the same private IP address range as the one in your Amazon Virtual Private Cloud (Amazon VPC). This will prevent any communication until you resolve […]

Read More
governance iam aws control tower concept

Automate multi account identity governance in AWS using Ermetic and AWS Control Tower

Having a multi-account strategy is a best practice for achieving higher isolation of resources in AWS. It helps you to meet regulatory and compliance needs, track operational costs, and add an extra layer of security. AWS Control Tower uses AWS best practices to establish a well-architected, multi-account baseline across your AWS accounts. For more information […]

Read More
secure access concept

Securing access and optimizing applications on AWS using Prosimo AXI

As you shift your workloads to AWS, you must ensure that access to them is seamless, secure, and optimized for your employees, remote workers, and contractors. When looking at workload access, you should consider the type of user, whether the access is from a managed or unmanaged device, and whether the location is well known […]

Read More