AWS Partner Network (APN) Blog
Tag: Security
SecurityScorecard and AWS Fast Track Supply Chain Risk Management
Modern enterprises thrive on interconnected digital partnerships, leveraging vendors to drive innovation and growth. SecurityScorecard’s MAX provides comprehensive supply chain visibility that helps organizations proactively manage their vendor ecosystem. By leveraging MAX through AWS Marketplace, teams can streamline vendor collaboration processes and reduce issue resolution time by up to 90%, transforming supply chain security into a strategic business advantage.
How to achieve both data privacy and utility on AWS with DataMasque
Organizations shouldn’t have to choose between protecting sensitive data and driving innovation. That’s why DataMasque, an Advanced AWS Technology Partner, is raising the bar on data privacy with automated masking solutions that transform how businesses handle sensitive information. By replacing real customer data with high-fidelity synthetic data, teams can develop, test, and analyze with confidence – all while maintaining regulatory compliance. Available on AWS Marketplace, DataMasque’s seamless integration with AWS services empowers customers to innovate faster while keeping sensitive data secure.
Achieving CIS Compliance for HAQM EC2 Instances with GYTPOL
GYTPOL helps maintain continuous CIS compliance for HAQM EC2 instances through lightweight agents and AWS Security Hub integration. The solution provides real-time monitoring and flexible remediation options to address security misconfigurations across production servers, critical applications, and test environments. This comprehensive approach ensures security best practices are followed while allowing organizations to meet their benchmark goals without disrupting business operations.
Knowit’s ADAM Guide to GDPR Compliance on AWS
Based on Knowit’s ADAM guide, this blog post provides practical insights and strategies for achieving GDPR compliance in AWS environments, including essential frameworks for managing compliance obligations and leveraging AWS features and services. The post outlines a structured seven-step approach to systematically assess and document GDPR compliance while emphasizing the importance of understanding data controller and processor roles, encryption requirements, and cross-border data transfer considerations.
How Thales Enables PCI-DSS Compliance with a Tokenization Solution on AWS
Data privacy regulations are tightening globally, requiring organizations to enhance security for sensitive data in the cloud. Among various security controls, tokenization replaces sensitive information with cryptographically generated, non-sensitive identifiers. This post explores how Thales’ CipherTrust Tokenization Solution on AWS helps organizations meet PCI-DSS compliance requirements while protecting sensitive payment data.
Improving Overall Security Posture with Wiz Secured AWS landing zone
Organizations migrating to the cloud face significant security challenges, including regulatory compliance, limited visibility, and skill shortages, which traditional security methods struggle to address. This situation is often exacerbated by delayed security implementations, but tools like Wiz integrated with AWS landing zone can help organizations manage cloud security from the start, enabling successful digital transformation while maintaining robust security measures.
Securing HAQM Bedrock and HAQM SageMaker with Orca Security
The integration of artificial intelligence (AI) technologies is rapidly gaining momentum across various industries, offering a variety of business advantages. However, without implementing robust AI security measures, organizations may face substantial risks, including model poisoning and sensitive data breaches. Learn how Orca Security provides effective strategies to mitigate and prevent these potential threats.
Palo Alto Networks secures the Internet of Things with HAQM Redshift
Palo Alto Networks faced challenges processing IoT security data at scale. They partnered with AWS to implement a new architecture using HAQM Redshift. This solution improved data processing speeds and created a dedicated pipeline for device data. Key outcomes included 50% faster API responses, real-time data aggregations, 40% infrastructure cost reduction, and improved system resilience. The new architecture enhanced Palo Alto Networks’ ability to serve customers and explore emerging technologies, reinforcing their leadership in IoT security.
Securing your AWS environment with Wiz for Gov, a FedRAMP Moderate authorized security solution
By Shaked Rotlevi, Technical Product Marketing Manager – Wiz By Faizan Mahmood, Global Partner Account Manager – AWS Wiz On May 12, 2021 President Biden released the Executive Order on Improving the Nation’s Cybersecurity. The Executive Order aims to strengthen the Federal government’s cybersecurity posture and protect the nation’s critical infrastructure from cyber threats. Among […]
Event-Driven Security Monitoring with Arctic Wolf and AWS Security Hub
To help customers deal with cybersecurity challenges, AWS provides capability for aggregated and unified alerting—with a large array of technologies to monitor and control cloud-based application stacks and hosted data. Making intelligent use of this information—to end the opportunity of cyber threat—is the role of the Arctic Wolf Security Operations Cloud. Learn how it provides holistic visibility with data correlation and analytics, assuring detection and response of cyber threats.