AWS Partner Network (APN) Blog

Category: Security & Governance

StrongDM’s Just-in-Time Access Is Key for Zero Trust Security in AWS

Learn how to implement a Zero Trust strategy that takes security a step beyond traditional, perpetual access permissions by continually verifying credentials and access permissions based on the latest threat intelligence, and revoking access when a threat is detected. This post covers how StrongDM’s Just-in-Time access secures AWS data plane resources such as HAQM Redshift, HAQM EC2 instances and HAQM Elastic Kubernetes Service while supporting Zero Trust principles.

Veeam-APN-Blog-131124

Data Protection and Security Best Practices with Veeam on AWS

Through the integration of Veeam and AWS security best practices, organizations are equipped to address their regulatory compliance adherence while enhancing overall security resilience when deploying their data protection solution on AWS.

THALES-APN-Blog-03-04-2025

How Thales Enables PCI-DSS Compliance with a Tokenization Solution on AWS

Data privacy regulations are tightening globally, requiring organizations to enhance security for sensitive data in the cloud. Among various security controls, tokenization replaces sensitive information with cryptographically generated, non-sensitive identifiers. This post explores how Thales’ CipherTrust Tokenization Solution on AWS helps organizations meet PCI-DSS compliance requirements while protecting sensitive payment data.

Enhancing HAQM EKS Security with SentinelOne's Real-Time eBPF Protection on AWS

Enhancing HAQM EKS Security with SentinelOne’s Real-Time eBPF Protection on AWS

Discover how SentinelOne’s Singularity Cloud Workload Security leverages eBPF framework and Behavioral AI to provide real-time threat protection for Kubernetes workloads on AWS. Learn how this AWS Partner’s solution offers comprehensive security coverage through agent-based protection, automated incident visualization, and seamless integration with HAQM EKS to help organizations secure their containerized applications effectively.

Securing HAQM Bedrock and HAQM SageMaker with Orca Security

The integration of artificial intelligence (AI) technologies is rapidly gaining momentum across various industries, offering a variety of business advantages. However, without implementing robust AI security measures, organizations may face substantial risks, including model poisoning and sensitive data breaches. Learn how Orca Security provides effective strategies to mitigate and prevent these potential threats.

Energize and Amplify – Data and AI Governance and Security on AWS through Partners

In an era where data drives innovation and AI reshapes industries, effective governance and security have become paramount. Recognizing this critical need, AWS has launched a groundbreaking Data & AI Governance and Security partner initiative. This program brings together elite Service and Software partners to tackle the complex challenges organizations face in managing their data and AI assets. Partners joining this initiative gain access to exclusive AWS tools, expertise, and go-to-market support. They also benefit from potential funding opportunities and increased visibility within the AWS ecosystem. For customers, this initiative offers a curated selection of vetted partners equipped with the expertise and tools to navigate the complexities of data and AI governance. By leveraging these partnerships, organizations can build strong foundations for responsible, secure, and innovative data practices while maintaining compliance and ethical standards.

How to implement Zero Standing Privileges with CyberArk for securing access to the AWS console

Discover how to secure your AWS cloud environment without slowing down developers. This post explores a solution that provides zero standing privileges, least privilege access, and automated approvals to protect the AWS console and services while enabling seamless, native access for development teams.