AWS Partner Network (APN) Blog

Tag: Zero Trust

StrongDM’s Just-in-Time Access Is Key for Zero Trust Security in AWS

Learn how to implement a Zero Trust strategy that takes security a step beyond traditional, perpetual access permissions by continually verifying credentials and access permissions based on the latest threat intelligence, and revoking access when a threat is detected. This post covers how StrongDM’s Just-in-Time access secures AWS data plane resources such as HAQM Redshift, HAQM EC2 instances and HAQM Elastic Kubernetes Service while supporting Zero Trust principles.

How to Enhance Your Zero-Trust Security Journey on AWS with Cisco Duo

Cisco Duo integrates with AWS to establish and maintain zero-trust security. It helps to eliminate surface area through strict access policies, evaluate risk signals to require step-up authentication, and establish device trust through posture checks and compliance enforcement. Learn now to configure Duo’s policies that enable risk-based authentication, deploy Duo Desktop for device trust, and integrate Duo with AWS via SAML and OpenID Connect to protect AWS services and applications.

Bringing Scale to Zero Trust Network Access with CylanceGATEWAY Using AWS Global Accelerator

Zero trust security is about achieving continuous security without slowing or complicating workflows, and BlackBerry’s collaboration with AWS unlocks the benefits of this approach for organizations of any size. Scale, simplicity, and security are important factors to an effective Zero Trust Network Access (ZTNA) platform. Learn how CylanceGATEWAY, an innovative ZTNA solution powered by AWS Global Accelerator that replaces traditional VPN technologies, brings this ideal state to reality.

SailPoint-APN-Blog-123022

Access Visibility and Governance for AWS with SailPoint Cloud Access Management

Many organizations lack visibility into cloud identities, leading to excessive, unused, or noncompliant access patterns. SailPoint Cloud Access Management is an identity-focused enterprise solution to certify, provision, and manage the cloud access lifecycle. SailPoint identifies inappropriate, unauthorized, and unused access in AWS to help organizations effectively secure their cloud infrastructure and related workloads.

Tetrate-APN-Blog-113022

Automate Istio-Enabled HAQM EKS Cluster Deployment with Tetrate’s EKS Blueprints Add-On

Istio and Envoy have become key technologies in the modern application stack, especially for enterprises adopting Zero Trust security standards for microservices applications. Using standardized tooling from AWS and Tetrate, it’s easier than ever to fully integrate HAQM EKS and Istio into modern, declarative IaC deployment processes. Learn how to use EKS Blueprints with Tetrate’s Istio add-on to stand up fully bootstrapped clusters.

Palo-Alto-Networks-APN-Blog-112622-1

Securing the 5G Network on AWS with Palo Alto Networks

Security is job zero at AWS and is one of the most important design principles of a Well-Architected Framework. Learn how to implement a 5G end-to-end security model based on Zero Trust principles using Palo Alto Networks’ 5G-native security solution for highly distributed and cloud-native 5G networks—with containerized 5G security and real-time threat correlation among 5G users, device identifiers, and a 5G network slice.

Implementing Zero-Trust Workload Security on HAQM EKS with Calico

HAQM EKS and Calico Cloud’s combined solution provides proof of security compliance to meet organizational regulatory requirements, but building and running cloud-native applications in EKS requires communication with other AWS and external third-party services. Learn how you can apply zero-trust workload access controls along with microsegmentation for workloads on EKS, and explore what implementing zero-trust workload access controls and identity-aware microsegmentation means for you.

Juniper-APN-Blog-032322-1

How to Enhance Protection of AWS Workloads with the Juniper cSRX Container Firewall in HAQM EKS

Enterprises are embracing the Kubernetes orchestration platform for their DevOps and CI/CD processes. HAQM EKS makes this transition easy by managing the still relatively new Kubernetes ecosystem and ensuring IT admins can focus on the next area of innovation for their organizations. With the ability to deploy the Juniper cSRX Container Firewall in an HAQM EKS environment, customers can leverage the benefits of the container for protecting their workloads.

Zscaler-AWS-Partners

How Zscaler and AWS Wavelength Enable Secure Edge Computing with Zero Trust

Super low-latency connections for the mobile carrier network are becoming increasingly important as we move to an ever-connected mobile world. 5G connectivity is built from the ground up striving for the most effective and lowest latency communication. Learn how to protect your network using AWS Wavelength for effective carrier connectivity and Zscaler Private Access (ZPA) for Zero Trust security.

Security-12

How AWS Partners Can Help You Sleep Well with a Strong Zero Trust Strategy for Remote Work

Security is something keeping many IT leaders up at night in this new normal. As companies build their long-term digital workplace strategies, looking at Zero Trust and what that means from a user perspective is key. In this post, we’ll define Zero Trust, highlight solutions that are key to delivering trust at the user level, and showcase AWS Competency Partners that offer these solutions to customers.