AWS Marketplace

Category: Security

Cisco Edge security with AWS Control Tower Account Factory customizations

Cisco Edge security solution with AWS Control Tower Account Factory customizations

In this post, Shiva, Muffadal, and I show you how to use the Cisco Edge Security Blueprint for AWS Control Tower Account Factory Customization. Using this solution, you can provision customized AWS accounts in AWS Control Tower that are enabled for network security inspection use cases with Cisco Secure Firewall Threat Defense Virtual (FTDv).

Solution Illustration: The Local Amazon VPC is assigned the virtual subnet of 100.64.2.0/24, and the remote site is assigned 100.64.1.0/24. The Aviatrix Gateway connects to the remote site with IPsec VPN and performs NAT. Thus, it maps the virtual subnets to the real subnets as packets move through the gateway

How to solve overlapping IP addresses using the Aviatrix Cloud Network Platform

You have an awesome application running on AWS, and now your customers and partners want a private network connection to it. Great! Except for one problem: their site is using the same private IP address range as the one in your Amazon Virtual Private Cloud (Amazon VPC). This will prevent any communication until you resolve […]

secure access concept

Securing access and optimizing applications on AWS using Prosimo AXI

As you shift your workloads to AWS, you must ensure that access to them is seamless, secure, and optimized for your employees, remote workers, and contractors. When looking at workload access, you should consider the type of user, whether the access is from a managed or unmanaged device, and whether the location is well known […]

automate multi account permissions CloudKnox

Automate multi account permissions management in AWS using CloudKnox and AWS Control Tower

This blog post was written by Kanishk Mahajan, ISV Solutions Architecture Lead at AWS and guest author Maya Neelakandhan, Head of Customer Success at CloudKnox. Introduction Permissions management in AWS empowers security and cloud infrastructure teams to protect your cloud resources from misuse of identity permissions. Cloud security requires continuous enforcement of least-privilege policies across […]

cloudtamer AWS Control Tower blog

Seamlessly uphold security and budgeting posture with Kion (cloudtamer.io) and AWS Control Tower

In this blog post, I show you how to configure cloudtamer.io for your AWS Control Tower managed environment. Using this solution you can seamlessly register accounts from both cloudtamer.io and AWS.

fortigate intrusion prevention system

Automating FortiGate Next Generation Firewall Intrusion Prevention using AWS CloudFormation

Automating FortiGate Next Generation Firewall Intrusion Prevention using AWS CloudFormation AWS CloudFormation provides a way for you to create templates that can help you automatically launch resources. This helps you eliminate manual tasks such as configuring route tables or assigning elastic IP addresses (EIP) to instances. In this blog post, I show how to help […]

witfoo precinct aws marketplace

Improving cloud security by deploying WitFoo Precinct 6.0 on AWS

The human resource needs of cybersecurity can cause organizational strain. Organizations have access to plenty of security tools but might not have enough skilled personnel to maximize their use. They might also have difficulty contending with the growing number of security events that need to be investigated every day. There are also financial and technical […]

Solutions integrated with AWS Control Tower are now available in AWS Marketplace

AWS Marketplace now offers a new category of solutions to help you integrate third-party software with AWS Control Tower. AWS Control Tower provides a way to set up and govern a new, secure, multi-account AWS environment. It is based on best practices established through the experience working with thousands of enterprises as they move to […]

crowdstrike confirm policies

Creating endpoint security policies with CrowdStrike’s Falcon Endpoint Protection

The term “endpoints” usually refers to user devices, such as laptops and servers. Cloud-based endpoints, however, include more than just the device: databases, instances, services, and applications. As endpoints have changed, endpoint security has expanded from a simple antivirus solution to an integrated set of advanced visibility and security features. Endpoint security solutions now offer […]

Fortinet create rules page

Creating web access control lists using Fortinet Managed Rules set from AWS Marketplace

Firewalls provide a security layer by giving you control over which traffic you allow to access your web applications. Web Appliction Firewalls such as AWS Web Application Firewall (AWS WAF) do this by allowing you to customize web security rules to define which traffic can access your applications and which traffic should be blocked. While […]