AWS Cloud
AWS Cloud
Register for Upcoming Webinars

Organizations are seeking tools and services to secure their cloud environments amid an ever-changing business landscape. To do so, they require solutions that provide active protection, continuous insight into their security posture, and streamline the creation and enforcement of business and regulatory requirements.

The following featured security partners deliver automated security solutions designed to seamlessly scale alongside your cloud workloads.

When moving workloads to the cloud, it is important to understand the fundamental differences between securing workloads on the cloud versus your private datacenter environments. As you rapidly and elastically scale resources on the AWS Cloud, you need to be able to assess and enhance security measures consistently across your environment. Greater visibility into your workloads can help you assess your security posture and ensure your business remains secure and compliant on AWS, at any scale.

Join the upcoming webinar to learn how to leverage the native security controls in AWS and the powerful capabilities of Dome9 Arc to ensure your business remains secure and compliant on the AWS Cloud, at any scale.

Webinar Topic: How Western Union Implemented Security Measures at Scale on AWS with Dome9
Customer Presenter: Roman Gruber, Director Application Security
AWS Presenter: Scott Ward, Solutions Architect
Dome9 Presenter: Suda Srinivasan, Vice President of Growth
Time: October 17th, 2017 | 8:00AM PT

Register for the Webinar

The AWS Management Console is central to your cloud operations, the configuration of various AWS services, and your view of Resource Groups. With numerous AWS accounts, cross-account roles, and employees constantly joining and leaving your organization, providing simple and secure access to your applications is often a challenge. Okta lays the foundation for secure connections between people and technology with Identity and Access Management solutions such as single sign-on and multi-factor authentication that securely, remotely connect your personnel to the apps they need.

Join our upcoming webinar to hear from Okta and AWS on the importance of a seamless security experience for both employees and customers. You will get details on the solution Oktadeveloped for Ellucian that helped them improve their information security on AWS with better user identity consistency.

Webinar Topic: Secure and Streamline Access to Your AWS Management Console with Okta
Customer Presenter: Lee Congdon, Chief Information Officer, Ellucian
AWS Presenter: Patrick McDowell, Solutions Architect, AWS
OKTA Presenter: Kyle Diedrich, Sr. Technical Marketing Manager, Okta
Time: October 17th, 2017 | 10:00AM PT

Register for the Webinar

Organizations looking to provide their developers with "free-range" developer environments are often challenged to maintain the security of these environments. In order to overcome these challenges, while still keeping up with the pace of the cloud, organizations need to integrate security into their DevOps methodologies. Palo Alto Networks and REAN Cloud have partnered together on AWS to offer a solution that helps automate the security of new developer environments without impacting developer productivity.

Register for our webinar to learn how organizations are leveraging Palo Alto Networks VM-Series Firewall and REAN Cloud to build a simple and fast solution that enables organizations to automate the security of new developer environments.

Webinar Topic: Automate the Provisioning of Secure Developer Environments on AWS
AWS Presenter: Nick Matthews, Partner Solutions Architect
Palo Alto Networks Presenter: Matt Keil, Director Product Marketing
Consulting Partner Presenter: John Plishker, Solutions Architect, REAN Cloud
Time: October 18th, 2017 | 10:00AM PT

Register for the Webinar

Organizations often face challenges when trying to determine and implement the most effective security strategies and policies on the cloud. Cloud Workload Protection (CWP) from Symantec automates security for workloads on AWS, and can help organizations to enable business agility, reduce risk, and cut costs. By automating security policy enforcement, CWP protects AWS instances with application protection, intrusion detection and prevention, and real-time file integrity monitoring (RT-FIM). The cloud-native integration of CWP allows protection to be built directly into deployment workflows, helping to accelerate the adoption of automated security solutions and ensure your assets are safe on AWS.

Join us for our webinar to find out how LifeLock used Cloud Workload Protection from Symantec to automate their cloud security management to take advantage of the scalability of AWS, achieve greater flexibility, and improve their ability to protect their customers from identity theft and fraud.

Webinar Topic: How LifeLock Automated Their Security on AWS with Symantec Cloud Workload Protection
Customer Presenter: Tom Castellano, Cybersecurity Engineering Lead
AWS Presenter: Patrick McDowell, Partner Solutions Architect
Symantec Presenter: Kevin Stultz, Principal Product Manager
Time: October 19th, 2017 | 10:00AM PT

Register for the Webinar
  • AWS infrastructure components are protected by an extensive network of security monitoring systems that are continuously scanned and tested
  • The AWS production network is segregated from the Amazon corporate network, and access to this network is monitored and reviewed on a daily basis by AWS security managers
  • The AWS Cloud has been designed to provide the highest availability while putting strong safeguards in place regarding customer privacy and segregation
  • AWS meets the strict requirements of an extensive list of global security standards, including: ISO 27001, SOC, the PCI Data Security Standard, and FedRAMP
  • Benefit from purpose-built security tools tailored for AWS’s unique environment and scale requirements
  • Spend less time on routine tasks and focus on proactive measures that can increase the security of your AWS Cloud environment

Instant visibility into your inventory. The first step in securing your assets is knowing what they are. With AWS, you never have to guess what your IT inventory is again. With tools like AWS Config and resource tagging, you can always see exactly what cloud assets you’re using at any given moment. You can easily label each asset for tracking purposes.

DDoS protection. AWS' size and scale gives you DDoS resiliency options. The AWS Cloud is equipped to handle extremely large amounts of traffic, and when you use AWS services like Elastic Load Balancing, Auto Scaling, Amazon CloudWatch, and CloudFront, you can architect a highly available system that can help you withstand DDoS attacks.

Built-in redundancy. When you use AWS features like Auto Scaling Elastic Load Balancing, you can ensure that your production systems remain online and traffic is always routed to healthy instances. You can continuously replicate your data and have it ready to bring online if your primary nodes fail, only paying for the nodes when you actually use them.

Independent regions providing data privacy protection. You can choose the area that meets your data privacy requirements - The AWS Cloud operates 33 Availability Zones within 12 geographic Regions around the world, with 10 more Availability Zones and 5 more Regions coming online throughout the next year. AWS never moves your data out of the region you put it in without your express instruction.