AWS Partner Network (APN) Blog

Tag: Security

Wiz Deloitte Landing Zone Featured Image

Improving Overall Security Posture with Wiz Secured AWS landing zone

Organizations migrating to the cloud face significant security challenges, including regulatory compliance, limited visibility, and skill shortages, which traditional security methods struggle to address. This situation is often exacerbated by delayed security implementations, but tools like Wiz integrated with AWS landing zone can help organizations manage cloud security from the start, enabling successful digital transformation while maintaining robust security measures.

Securing Amazon Bedrock and Amazon SageMaker with Orca Security

The integration of artificial intelligence (AI) technologies is rapidly gaining momentum across various industries, offering a variety of business advantages. However, without implementing robust AI security measures, organizations may face substantial risks, including model poisoning and sensitive data breaches. Learn how Orca Security provides effective strategies to mitigate and prevent these potential threats.

Palo Alto Networks - APN blog

Palo Alto Networks secures the Internet of Things with Amazon Redshift

Palo Alto Networks faced challenges processing IoT security data at scale. They partnered with AWS to implement a new architecture using Amazon Redshift. This solution improved data processing speeds and created a dedicated pipeline for device data. Key outcomes included 50% faster API responses, real-time data aggregations, 40% infrastructure cost reduction, and improved system resilience. The new architecture enhanced Palo Alto Networks’ ability to serve customers and explore emerging technologies, reinforcing their leadership in IoT security.

secure with wiz apn blog

Securing your AWS environment with Wiz for Gov, a FedRAMP Moderate authorized security solution

By Shaked Rotlevi, Technical Product Marketing Manager – Wiz By Faizan Mahmood, Global Partner Account Manager – AWS Wiz On May 12, 2021 President Biden released the Executive Order on Improving the Nation’s Cybersecurity. The Executive Order aims to strengthen the Federal government’s cybersecurity posture and protect the nation’s critical infrastructure from cyber threats. Among […]

Arctic-Wolf-APN-Blog-032323

Event-Driven Security Monitoring with Arctic Wolf and AWS Security Hub

To help customers deal with cybersecurity challenges, AWS provides capability for aggregated and unified alerting—with a large array of technologies to monitor and control cloud-based application stacks and hosted data. Making intelligent use of this information—to end the opportunity of cyber threat—is the role of the Arctic Wolf Security Operations Cloud. Learn how it provides holistic visibility with data correlation and analytics, assuring detection and response of cyber threats.

Fastly-APN-Blog-031023

Enhancing Security for AWS Lambda Functions with Fastly’s Next-Gen WAF

An integral component to most serverless architectures is AWS Lambda, the compute service that lets you run code for virtually any type of application without provisioning or managing servers. Fastly has extended its Next-Gen WAF to Lambda functions, supporting customers looking to embed additional layers of security into their serverless workloads. Fastly’s Next-Gen WAF supports numerous other deployment scenarios including virtual machines, containers, and web servers.

HashiCorp-APN-Blog-030923

Simplify and Secure Terraform Workflows on AWS with Dynamic Provider Credentials

The HashiCorp Terraform AWS provider has surpassed more than one billion downloads, and every single Terraform apply starts with a provider credentials setup. The new dynamic provider credentials feature offers the ability to generate dynamic, short-lived credentials for Terraform Cloud runs using OIDC. This feature is now available for all Terraform Cloud tiers. Terraform Cloud is HashiCorp’s managed service offering and eliminates the heavy lifting for practitioners, teams, and organizations to use Terraform in production.

LTIMindtree-APN-Blog-030823

How LTIMindtree Solves for Cross-Account Sensitive Data Sharing Using AWS Services

Organizations have a requirement to implement data governance due to the presence of personally identifiable information. The process of sharing and operationalizing data movement becomes an involved task, as it must encompass data governance, data security, and include audit capabilities. Learn about a modern process LTIMindtree has introduced for data transfer using AWS Step Functions and for sharing transformed data to another account regardless of regional location.

Bringing Scale to Zero Trust Network Access with CylanceGATEWAY Using AWS Global Accelerator

Zero trust security is about achieving continuous security without slowing or complicating workflows, and BlackBerry’s collaboration with AWS unlocks the benefits of this approach for organizations of any size. Scale, simplicity, and security are important factors to an effective Zero Trust Network Access (ZTNA) platform. Learn how CylanceGATEWAY, an innovative ZTNA solution powered by AWS Global Accelerator that replaces traditional VPN technologies, brings this ideal state to reality.

Snyk-APN-Blog-020923

Securing Your Infrastructure as Code Deployments with AWS and Snyk

When you combine AWS CodeBuild with Snyk to deploy your infrastructure as code project, you gain a repeatable process that’s easy to track and manage that happens to include security results. AWS provides the automation while Snyk provides enhanced security. Learn how to manage an IaC project written with Terraform by HashiCorp and deployed with AWS CodeBuild, and review results before a scan and after when hidden issues are often revealed.