AWS Partner Network (APN) Blog

Category: Security, Identity, & Compliance

Kiteworks-APN-Blog-053123

Kiteworks Accelerates Private Content Network Provisioning with Automation on AWS

Securing digital communications across omnichannel depends on the tools used by the organization. Kiteworks delivers a dedicated Private Content Network (PCN) to unify, track, control, and secure the private information interchanged between organizations and their trusted partners like consultants, customers, and suppliers. Learn how Kiteworks uses AWS for infrastructure provisioning, data protection, and automation of its PCN.

Sysdig-APN-Blog-051823

Automate Security and Monitoring with Amazon EKS Blueprints, Terraform, and Sysdig

Many companies report the biggest challenge when adopting Kubernetes is a lack of in-house skills. Infrastructure as code (IaC) blueprints can mitigate these gaps by accelerating hands-on experience, providing a reproducible foundation to configure, provision, and destroy clusters easily. Learn how Sysdig launched an add-on for Amazon EKS as well as Sysdig EKS Blueprints to enable organizations to confidently deploy instrumented Kubernetes clusters using Terraform.

Cloud-Storage-Security-APN-Blog-051123

Integrating Malware Scanning into Your Data Ingestion Pipeline with Antivirus for Amazon S3

Antivirus for Amazon S3 by Cloud Storage Security (CSS) is a self-hosted malware solution, installed in the customer’s AWS account so data doesn’t leave the customer’s AWS account. Learn how to easily scan your workloads using Antivirus for Amazon S3, and how to integrate malware scanning into your data ingestion pipeline. Cloud Storage Security is an AWS Security Competency Partner that helps prevent the spread of malware and locates sensitive data for applications and data lakes that use AWS manages services.

Claroty-APN-Blog-050523

Improve Your Security Posture with Claroty xDome Integration with AWS Security Hub

Industrial digital transformation is driving changes to the operational technology (OT) landscape, making it more connected to the internet, IT systems, and solutions. With OT/IT convergence, there is greater access to critical OT systems and increasing susceptibility to malware and ransomware. Learn how Claroty xDome and AWS Security Hub can be used for security and vulnerability monitoring, and to provide visibility of security events to teams responsible for operational monitoring.

Okta-APN-Blog-Connect-042623

Just-in-Time Least Privileged Access to AWS Administrative Roles with Okta and AWS Identity Center  

AWS provides a rich set of tools and capabilities for managing access to cloud architectures including AWS IAM Identity Center, which makes it easy to manage access across your entire organization. Learn how AWS customers can leverage Okta Access Requests and AWS IAM Identity Center to provide just-in-time access to cloud resources. Granting just-in-time access to developers for a limited time based on approval is an effective way to limit the active time frame for assignments to your AWS resources.

Protect Your Web Applications with AWS WAF Ready Partners

As organizations continue to build and migrate more of their applications in the cloud, ensuring websites and applications are protected from external threats has become a top concern for businesses of all shapes and sizes. We’re excited to announce the AWS WAF Ready specialization to help customers deploy and maintain their application layer security solution with AWS WAF Ready Partner software products.

Streamline Multi-Account Governance, Management, and Security with AWS Control Tower and Mphasis Stelligent

Many organizations decide to implement AWS Control Tower because it provides an easy way to set up and govern a secure, multi-account AWS environment called a landing zone. Mphasis Stelligent offers an AWS Control Tower-based landing zone quick start with modules for automating account access, observability, security suite enablement, deploying industry-specific guardrails, and multi-account networking. Once implemented, companies can provision secure accounts fully baselined for utilization in less than an hour.

Pulumi-APN-Blog-40723

Continuous Compliance at Scale in AWS CI/CD Pipelines Using Pulumi CrossGuard

To ensure cloud infrastructure is compliant with organizational policies and regulatory requirements, many platform engineering teams are embedding the policy-as-code practice into their DevSecOps toolchain. Learn how to use Pulumi and its CrossGuard policy-as-code feature to ensure your infrastructure is compliant before it’s ever provisioned in AWS. We’ll also demonstrate how to define custom policies in Python, and how to create a reusable package of policies by storing them in AWS CodeArtifact.

Leveraging BMC AMI Cloud Vault and AWS to Protect Mainframes from Cyber Threats

AWS and BMC Software present a best practice-based approach to secure mainframe data from ransomware attacks or any other source of logical data corruption. Leveraging the scale, performance, and innovation of AWS allows mainframe customers to achieve cyber resiliency faster and more efficiently than with an on-premises solution. Learn how BMC AMI Cloud Vault takes advantage of Amazon S3 to create multiple copies of mainframe data and inherently ensure all copies are protected.

Arctic-Wolf-APN-Blog-032323

Event-Driven Security Monitoring with Arctic Wolf and AWS Security Hub

To help customers deal with cybersecurity challenges, AWS provides capability for aggregated and unified alerting—with a large array of technologies to monitor and control cloud-based application stacks and hosted data. Making intelligent use of this information—to end the opportunity of cyber threat—is the role of the Arctic Wolf Security Operations Cloud. Learn how it provides holistic visibility with data correlation and analytics, assuring detection and response of cyber threats.