AWS Partner Network (APN) Blog
Tag: Security
Improving Overall Security Posture with Wiz Secured AWS landing zone
Organizations migrating to the cloud face significant security challenges, including regulatory compliance, limited visibility, and skill shortages, which traditional security methods struggle to address. This situation is often exacerbated by delayed security implementations, but tools like Wiz integrated with AWS landing zone can help organizations manage cloud security from the start, enabling successful digital transformation while maintaining robust security measures.
Securing Amazon Bedrock and Amazon SageMaker with Orca Security
The integration of artificial intelligence (AI) technologies is rapidly gaining momentum across various industries, offering a variety of business advantages. However, without implementing robust AI security measures, organizations may face substantial risks, including model poisoning and sensitive data breaches. Learn how Orca Security provides effective strategies to mitigate and prevent these potential threats.
Palo Alto Networks secures the Internet of Things with Amazon Redshift
Palo Alto Networks faced challenges processing IoT security data at scale. They partnered with AWS to implement a new architecture using Amazon Redshift. This solution improved data processing speeds and created a dedicated pipeline for device data. Key outcomes included 50% faster API responses, real-time data aggregations, 40% infrastructure cost reduction, and improved system resilience. The new architecture enhanced Palo Alto Networks’ ability to serve customers and explore emerging technologies, reinforcing their leadership in IoT security.
Securing your AWS environment with Wiz for Gov, a FedRAMP Moderate authorized security solution
By Shaked Rotlevi, Technical Product Marketing Manager – Wiz By Faizan Mahmood, Global Partner Account Manager – AWS Wiz On May 12, 2021 President Biden released the Executive Order on Improving the Nation’s Cybersecurity. The Executive Order aims to strengthen the Federal government’s cybersecurity posture and protect the nation’s critical infrastructure from cyber threats. Among […]
Event-Driven Security Monitoring with Arctic Wolf and AWS Security Hub
To help customers deal with cybersecurity challenges, AWS provides capability for aggregated and unified alerting—with a large array of technologies to monitor and control cloud-based application stacks and hosted data. Making intelligent use of this information—to end the opportunity of cyber threat—is the role of the Arctic Wolf Security Operations Cloud. Learn how it provides holistic visibility with data correlation and analytics, assuring detection and response of cyber threats.
Enhancing Security for AWS Lambda Functions with Fastly’s Next-Gen WAF
An integral component to most serverless architectures is AWS Lambda, the compute service that lets you run code for virtually any type of application without provisioning or managing servers. Fastly has extended its Next-Gen WAF to Lambda functions, supporting customers looking to embed additional layers of security into their serverless workloads. Fastly’s Next-Gen WAF supports numerous other deployment scenarios including virtual machines, containers, and web servers.
Simplify and Secure Terraform Workflows on AWS with Dynamic Provider Credentials
The HashiCorp Terraform AWS provider has surpassed more than one billion downloads, and every single Terraform apply starts with a provider credentials setup. The new dynamic provider credentials feature offers the ability to generate dynamic, short-lived credentials for Terraform Cloud runs using OIDC. This feature is now available for all Terraform Cloud tiers. Terraform Cloud is HashiCorp’s managed service offering and eliminates the heavy lifting for practitioners, teams, and organizations to use Terraform in production.
How LTIMindtree Solves for Cross-Account Sensitive Data Sharing Using AWS Services
Organizations have a requirement to implement data governance due to the presence of personally identifiable information. The process of sharing and operationalizing data movement becomes an involved task, as it must encompass data governance, data security, and include audit capabilities. Learn about a modern process LTIMindtree has introduced for data transfer using AWS Step Functions and for sharing transformed data to another account regardless of regional location.
Bringing Scale to Zero Trust Network Access with CylanceGATEWAY Using AWS Global Accelerator
Zero trust security is about achieving continuous security without slowing or complicating workflows, and BlackBerry’s collaboration with AWS unlocks the benefits of this approach for organizations of any size. Scale, simplicity, and security are important factors to an effective Zero Trust Network Access (ZTNA) platform. Learn how CylanceGATEWAY, an innovative ZTNA solution powered by AWS Global Accelerator that replaces traditional VPN technologies, brings this ideal state to reality.
Securing Your Infrastructure as Code Deployments with AWS and Snyk
When you combine AWS CodeBuild with Snyk to deploy your infrastructure as code project, you gain a repeatable process that’s easy to track and manage that happens to include security results. AWS provides the automation while Snyk provides enhanced security. Learn how to manage an IaC project written with Terraform by HashiCorp and deployed with AWS CodeBuild, and review results before a scan and after when hidden issues are often revealed.