Security

  • Detecting and Securing Your Data on AWS

    Detecting and Securing Your Data on AWS

    Read Flipbook
  • How ALTR Helped Q2’s Biller Direct Offering Become Level 1 PCI DSS Certified in 30 Days

    How ALTR Helped Q2’s Biller Direct Offering Become Level 1 PCI DSS Certified in 30 Days

    Learn how Q2, a financial experience company that provides digital banking and lending solutions, worked with AWS ISV Partner ALTR, a provider of data security as a service that runs exclusively...

    Read Article
  • Security, Compliance & the Cloud

    Security, Compliance & the Cloud

    Read Flipbook
  • How to Mitigate Security and Privacy Resistance in Secure Data Migrations

    How to Mitigate Security and Privacy Resistance in Secure Data Migrations

    One of the first steps for organizations adopting AWS is migrating data from an on-premises environment or existing cloud to AWS. Many legal and regulatory requirements make it imperative to know...

    Read Article
  • A Fresh Approach to Data-Driven Digital Transformation

    A Fresh Approach to Data-Driven Digital Transformation

    Read Flipbook
  • Improving Security in the Cloud with Micro-Segmentation 

    Improving Security in the Cloud with Micro-Segmentation 

    Micro-segmentation is a building-block of the shared responsibility security model and makes your security measures more effective. Understanding of the shared responsibility security model is...

    Read Article
  • How Practice Fusion Achieved Cloud Compliance with Prisma™ Cloud

    How Practice Fusion Achieved Cloud Compliance with Prisma™ Cloud

    Read our eBook to learn how Prisma Public Cloud continuously monitors cloud environments and simplifies the task of managing compliance –enabling Practice Fusion to build their products on AWS faster.

    Read Flipbook
  • Cloud Posture and Threat Analytics with Cisco Secure Cloud Analytics

    Cloud Posture and Threat Analytics with Cisco Secure Cloud Analytics

    As organizations continue to adopt AWS, their risk footprint increases from both an infrastructure and network perspective as it relates to compliance posturing, configuration risk, and network...

    Read Article
  • How OneLogin Saves Time, Money, and Resources with Threat Stack

    How OneLogin Saves Time, Money, and Resources with Threat Stack

    Threat Stack enables security and DevOps teams to get granular control into their cloud infrastructure, allowing faster vulnerability detection and remediation. Read our eBook to learn how OneLogin...

    Read Flipbook
  • Automated Security at the Speed of DevOps

    Automated Security at the Speed of DevOps

    This eBook covers how you can integrate security into your DevOps processes on AWS for simplified security management and improved visibility with DevOps Security solutions from AWS and AWS Partner...

    Read Flipbook
  • How BriteCore Improved Security and Scalability by Migrating Insurance Workloads with AWS Landing Zone

    How BriteCore Improved Security and Scalability by Migrating Insurance Workloads with AWS Landing Zone

    BriteCore was originally designed as an on-premises data center-based monolith; a state-of-the-art core insurance solution. However, the business agility, cost savings, and increased security of...

    Read Article
  • DigiCert Automates Protection of their AWS Environment with Imperva

    DigiCert Automates Protection of their AWS Environment with Imperva

    Read the DigiCert case study to learn how to rapidly identify suspicious behavior and send automated alerts when potential threats are discovered.

    Read Flipbook
  • Easily Delegate Responsibilities Using AWS Permissions Boundaries and cloudtamer.io

    Easily Delegate Responsibilities Using AWS Permissions Boundaries and cloudtamer.io

    Permissions boundaries allow admins to delegate permissions to users so they can create new AWS service roles without elevating their own permissions. This removes the need for admins to field...

    Read Article
  • Accelerating Apache and Hadoop Migrations with Cazena’s Data Lake as a Service on AWS

    Accelerating Apache and Hadoop Migrations with Cazena’s Data Lake as a Service on AWS

    Running Hadoop, Spark, and related technologies in the cloud provides the flexibility required by these distributed systems. Cazena provides a production-ready, continuously optimized and secured...

    Read Article
  • Why Parsons Considers Its Data Protection Strategy a Business Advantage

    Why Parsons Considers Its Data Protection Strategy a Business Advantage

    Read Flipbook
  • How APN Partners Can Help You Build a Digital Workplace on AWS

    How APN Partners Can Help You Build a Digital Workplace on AWS

    The Digital Workplace program at AWS identifies APN Partners and AWS solutions that can help you build a digital workplace. All the partners and AWS solutions that we showcase have passed a...

    Read Article
  • How to Send CloudHSM Audit Logs to Splunk and Monitor Critical Events on the HSM

    How to Send CloudHSM Audit Logs to Splunk and Monitor Critical Events on the HSM

    AWS CloudHSM is a cloud-based hardware security module (HSM) that enables you to easily generate, store, import, export, and manage your cryptographic keys. This post walks through using AWS...

    Read Article
  • Securing cloud workloads with CrowdStrike and AWS

    Securing cloud workloads with CrowdStrike and AWS

    Security teams face increasing challenges from lack of visibility, complex solutions and sophisticated attacks. CrowdStrike integrations with AWS solutions can help.

    Read Flipbook
  • Outcome-driven Security from Armor Protects AWS Workloads

    Outcome-driven Security from Armor Protects AWS Workloads

    This solution brief details some of the pitfalls that organizations must overcome when determining the security solution that best fits their needs. Discover how Armor’s outcome-driven offerings...

    Read Flipbook
  • How Version 1 Migrated Martin Currie’s Windows Workloads to AWS to Enable Agility and Innovation

    How Version 1 Migrated Martin Currie’s Windows Workloads to AWS to Enable Agility and Innovation

    Learn how Version 1 helped specialist investment management organization Martin Currie migrate its technical estate that was held in data centers to AWS over a period of 12 months. The data center...

    Read Article
  • loading
    Loading More...