AWS Marketplace
Category: Security
Database auditing with DataSunrise Security in AWS Marketplace
In this post, Juston and I will show you how to make an automated data access report using the DataSunrise application for Aurora PostgreSQL-Compatible Edition.
Cisco Edge security solution with AWS Control Tower Account Factory customizations
In this post, Shiva, Muffadal, and I show you how to use the Cisco Edge Security Blueprint for AWS Control Tower Account Factory Customization. Using this solution, you can provision customized AWS accounts in AWS Control Tower that are enabled for network security inspection use cases with Cisco Secure Firewall Threat Defense Virtual (FTDv).
How to solve overlapping IP addresses using the Aviatrix Cloud Network Platform
You have an awesome application running on AWS, and now your customers and partners want a private network connection to it. Great! Except for one problem: their site is using the same private IP address range as the one in your Amazon Virtual Private Cloud (Amazon VPC). This will prevent any communication until you resolve […]
Securing access and optimizing applications on AWS using Prosimo AXI
As you shift your workloads to AWS, you must ensure that access to them is seamless, secure, and optimized for your employees, remote workers, and contractors. When looking at workload access, you should consider the type of user, whether the access is from a managed or unmanaged device, and whether the location is well known […]
Automate multi account permissions management in AWS using CloudKnox and AWS Control Tower
This blog post was written by Kanishk Mahajan, ISV Solutions Architecture Lead at AWS and guest author Maya Neelakandhan, Head of Customer Success at CloudKnox. Introduction Permissions management in AWS empowers security and cloud infrastructure teams to protect your cloud resources from misuse of identity permissions. Cloud security requires continuous enforcement of least-privilege policies across […]
Seamlessly uphold security and budgeting posture with Kion (cloudtamer.io) and AWS Control Tower
In this blog post, I show you how to configure cloudtamer.io for your AWS Control Tower managed environment. Using this solution you can seamlessly register accounts from both cloudtamer.io and AWS.
Automating FortiGate Next Generation Firewall Intrusion Prevention using AWS CloudFormation
Automating FortiGate Next Generation Firewall Intrusion Prevention using AWS CloudFormation AWS CloudFormation provides a way for you to create templates that can help you automatically launch resources. This helps you eliminate manual tasks such as configuring route tables or assigning elastic IP addresses (EIP) to instances. In this blog post, I show how to help […]
Improving cloud security by deploying WitFoo Precinct 6.0 on AWS
The human resource needs of cybersecurity can cause organizational strain. Organizations have access to plenty of security tools but might not have enough skilled personnel to maximize their use. They might also have difficulty contending with the growing number of security events that need to be investigated every day. There are also financial and technical […]
Solutions integrated with AWS Control Tower are now available in AWS Marketplace
AWS Marketplace now offers a new category of solutions to help you integrate third-party software with AWS Control Tower. AWS Control Tower provides a way to set up and govern a new, secure, multi-account AWS environment. It is based on best practices established through the experience working with thousands of enterprises as they move to […]
Creating endpoint security policies with CrowdStrike’s Falcon Endpoint Protection
The term “endpoints” usually refers to user devices, such as laptops and servers. Cloud-based endpoints, however, include more than just the device: databases, instances, services, and applications. As endpoints have changed, endpoint security has expanded from a simple antivirus solution to an integrated set of advanced visibility and security features. Endpoint security solutions now offer […]