AWS Partner Network (APN) Blog

Category: Security, Identity, & Compliance

Bosch-APN-Blog-081123

Build and Deploy Secure AI Applications with AIShield and Amazon SageMaker

Adversarial machine learning (AML) attacks, also known as “artificial intelligence attacks” (AI attacks), involve deliberate attempts to manipulate or compromise machine learning models or even make it reveal sensitive information. Explore how AIShield‘s seamless integration within the Amazon SageMaker environment alleviates AI security concerns by mitigating risks before and after deployment, enabling customers to develop and deploy AI applications with confidence.

Streamlining Secrets Management for Enhanced Security Using CyberArk Secrets Hub and AWS

As organizations evolve with hybrid architectures and build on AWS, their developers want to rely on the native AWS Secrets Manager to simplify development and operations. Learn about a jointly developed solution between CyberArk and AWS that was designed to centralize control of secrets, automate rotation, and eliminate vault sprawl for security teams while making no changes to developer workflows. The CyberArk identity solution is CyberArk’s SaaS-delivered identity and access management.

Kyndryl-APN-Blog-080923

Simplify, Optimize, and Automate Cloud Operations with Kyndryl Cloud Native Services for AWS

Kyndryl Cloud Native Services for AWS (KCNS) is designed to accelerate and automate managed services for workloads leveraging AWS-native services. KCNS provides a web interface, called Control Plane, for users to perform various operations, including CloudOps, SecOps, and FinOps. This post explains how to simply, optimize, and automate cloud operations with KCNS for AWS and is targeted at pre-sales and delivery architects set out to design cloud-native solutions for customers.

Tech Mahindra’s BMC Helix ITSM Deployment on AWS for End-to-End Data Protection

This post describes how Tech Mahindra transitioned a segment of telecom customers in the EMEA region from a legacy monolithic application, BMC Remedy on-premises, to a self-managed microservices application, BMC Helix IT Service Management, utilizing Kubernetes operations with end-to-end data protection on AWS. Tech Mahindra is an AWS Premier Tier Services Partner with the Migration Consulting Competency that specializes in digital transformation, consulting, and re-engineering solutions.

OPSWAT-APN-Blog-080723

Best Practices from OPSWAT to Secure AWS Applications from File-Borne Threats

The AWS Shared Responsibility Model requires security architects to take proactive measures to detect and prevent zero-day risks and other malware at the perimeter of their network. Learn about the potential risks associated with cloud applications that handle file uploads and transfers, and explore best practices to help mitigate. This post provides guidance on modern threat prevention technologies such as OPSWAT MetaDefender that help augment and automate cybersecurity defense.

Managing AWS Account Root MFA Using CyberArk Privileged Access Manager

Protecting AWS account root users with multi-factor authentication (MFA) is a crucial security control, and now you can use CyberArk’s Privileged Access Manager (PAM) to securely manage the AWS account root and authenticate its use with MFA. We’ll review the current MFA features for AWS account root user, provide a step-by-step walkthrough of how to install and configure CyberArk PAM to manage root accounts with MFA, and show how to sign into the AWS root account with CyberArk PAM.

Solvo-APN-Blog-072823

Prioritize Risks and Add Context to Amazon Inspector Findings with Solvo Data Posture Manager

One of the biggest cloud security concerns is the lack of visibility and control over sensitive data. Learn about the need for multi-dimensional visibility into infrastructure resources, applications and user behavior, and the data associated with them, and how Solvo’s Data Posture Manager uses this approach to provide contextual, adaptive cloud security. Solvo is an AWS Partner whose platform provides contextual, application, and data-aware cloud infrastructure security.

Salt-Security-APN-Blog-072523

Preventing API Breaches Using Salt Security with AWS WAF and Amazon API Gateway

Traditional security approaches are often unable to detect and stop complex API attacks. It was for exactly this purpose that Salt Security was established in 2018. Salt’s founders have a unique patent to use big data and AI/ML that allows Salt to spearhead the growing industry of dedicated API security solutions. Learn how the Salt Security platform allows for the analysis of API traffic that exposes complex attacks, including those identified in the OWASP API Security Top 10 list.

Improve Your Security Posture with Claroty xDome Integration with Amazon Security Lake

Learn how to stream security events from Claroty xDome to Amazon Security Lake to centralize your security data for more efficient storage, query, and analysis. This enables customers to quickly analyze multiple years of security data across OT, IIoT, and cloud environments, using their preferred tools for security analytics and building resilient operations by enhancing threat detection and response capabilities.

Veritas-APN-Blog-071723

Enhanced Ransomware Protection with Air-Gapped Veritas Alta Recovery Vault on AWS

Business and technology leaders are being challenged to improve security and resilience in the face of rising information security threats. Alta Recovery Vault is a Veritas managed storage-as-a-service offering for backups that helps reduce the risk of ransomware events. Running on AWS, Alta Recovery Vault enables customers to realize cloud storage benefits such as data immutability, encryption in transit and at rest, rapid recovery, data durability, and reduced total cost of ownership.