AWS Partner Network (APN) Blog

Tag: Security

How to achieve both data privacy and utility on AWS with DataMasque

Organizations shouldn’t have to choose between protecting sensitive data and driving innovation. That’s why DataMasque, an Advanced AWS Technology Partner, is raising the bar on data privacy with automated masking solutions that transform how businesses handle sensitive information. By replacing real customer data with high-fidelity synthetic data, teams can develop, test, and analyze with confidence – all while maintaining regulatory compliance. Available on AWS Marketplace, DataMasque’s seamless integration with AWS services empowers customers to innovate faster while keeping sensitive data secure.

Blog - GYTPOL

Achieving CIS Compliance for Amazon EC2 Instances with GYTPOL

GYTPOL helps maintain continuous CIS compliance for Amazon EC2 instances through lightweight agents and AWS Security Hub integration. The solution provides real-time monitoring and flexible remediation options to address security misconfigurations across production servers, critical applications, and test environments. This comprehensive approach ensures security best practices are followed while allowing organizations to meet their benchmark goals without disrupting business operations.

Knowit-APN-Blog-15032025

Knowit’s ADAM Guide to GDPR Compliance on AWS

Based on Knowit’s ADAM guide, this blog post provides practical insights and strategies for achieving GDPR compliance in AWS environments, including essential frameworks for managing compliance obligations and leveraging AWS features and services. The post outlines a structured seven-step approach to systematically assess and document GDPR compliance while emphasizing the importance of understanding data controller and processor roles, encryption requirements, and cross-border data transfer considerations.

THALES-APN-Blog-03-04-2025

How Thales Enables PCI-DSS Compliance with a Tokenization Solution on AWS

Data privacy regulations are tightening globally, requiring organizations to enhance security for sensitive data in the cloud. Among various security controls, tokenization replaces sensitive information with cryptographically generated, non-sensitive identifiers. This post explores how Thales’ CipherTrust Tokenization Solution on AWS helps organizations meet PCI-DSS compliance requirements while protecting sensitive payment data.

Wiz Deloitte Landing Zone Featured Image

Improving Overall Security Posture with Wiz Secured AWS landing zone

Organizations migrating to the cloud face significant security challenges, including regulatory compliance, limited visibility, and skill shortages, which traditional security methods struggle to address. This situation is often exacerbated by delayed security implementations, but tools like Wiz integrated with AWS landing zone can help organizations manage cloud security from the start, enabling successful digital transformation while maintaining robust security measures.

Securing Amazon Bedrock and Amazon SageMaker with Orca Security

The integration of artificial intelligence (AI) technologies is rapidly gaining momentum across various industries, offering a variety of business advantages. However, without implementing robust AI security measures, organizations may face substantial risks, including model poisoning and sensitive data breaches. Learn how Orca Security provides effective strategies to mitigate and prevent these potential threats.

Palo Alto Networks - APN blog

Palo Alto Networks secures the Internet of Things with Amazon Redshift

Palo Alto Networks faced challenges processing IoT security data at scale. They partnered with AWS to implement a new architecture using Amazon Redshift. This solution improved data processing speeds and created a dedicated pipeline for device data. Key outcomes included 50% faster API responses, real-time data aggregations, 40% infrastructure cost reduction, and improved system resilience. The new architecture enhanced Palo Alto Networks’ ability to serve customers and explore emerging technologies, reinforcing their leadership in IoT security.

secure with wiz apn blog

Securing your AWS environment with Wiz for Gov, a FedRAMP Moderate authorized security solution

By Shaked Rotlevi, Technical Product Marketing Manager – Wiz By Faizan Mahmood, Global Partner Account Manager – AWS Wiz On May 12, 2021 President Biden released the Executive Order on Improving the Nation’s Cybersecurity. The Executive Order aims to strengthen the Federal government’s cybersecurity posture and protect the nation’s critical infrastructure from cyber threats. Among […]

Arctic-Wolf-APN-Blog-032323

Event-Driven Security Monitoring with Arctic Wolf and AWS Security Hub

To help customers deal with cybersecurity challenges, AWS provides capability for aggregated and unified alerting—with a large array of technologies to monitor and control cloud-based application stacks and hosted data. Making intelligent use of this information—to end the opportunity of cyber threat—is the role of the Arctic Wolf Security Operations Cloud. Learn how it provides holistic visibility with data correlation and analytics, assuring detection and response of cyber threats.

Fastly-APN-Blog-031023

Enhancing Security for AWS Lambda Functions with Fastly’s Next-Gen WAF

An integral component to most serverless architectures is AWS Lambda, the compute service that lets you run code for virtually any type of application without provisioning or managing servers. Fastly has extended its Next-Gen WAF to Lambda functions, supporting customers looking to embed additional layers of security into their serverless workloads. Fastly’s Next-Gen WAF supports numerous other deployment scenarios including virtual machines, containers, and web servers.