Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


Amazon Web Services

Amazon Web Service (AWS) is a subsidiary of Amazon that provides on-demand cloud computing platforms to individuals, companies and governments, on a metered pay-as-you-go basis. In aggregate, these cloud computing web services provide a set of simple, abstract technical infrastructure and distributed computing building blocks and tools.

AWS comprises more than 90 services spanning a wide range including computing, storage, networking, database, analytics, application services, deployment, management, mobile, developer tools, and tools for the Internet of Things. The most popular include Amazon Elastic Computer Cloud (EC2) and Amazon Simple Storage Service (Amazon S3). Most services are not exposed directly to end users, but instead offer functionality through APIs for developers to use in their applications. Amazon Web Services' offerings are accessed over HTTP, using the REST architectural style and SOAP protocol.

Our Website:

Latest Content From Amazon Web Services

Webcast: Machine Learning and Natural Language Processing Coming to Life in the Contact Center

by Amazon Web ServicesJan 29, 2020

Machine Learning (ML) and Natural Language Processing (NLP) aren’t just futuristic technologies; their potential is beginning to be realized today in contact centers. ML and NLP are being used for telephony monitoring, transcription, and real-time analysis that contact center managers can use to drive better customer service.

In this webinar, Sheila McGee-Smith, president and principal analyst at McGee-Smith Analytics, will discuss how ML, AI, and NLP are giving businesses the ability to create better customers experiences, improve how they leverage customer data, and quantify the benefits of these systems. She’ll be joined by Yasser El-Haggan, worldwide technical leader for Amazon Connect, who will describe how your enterprise can start taking advantage of these capabilities today.


Webcast: How to Secure Application Pipelines in AWS

by Amazon Web ServicesDec 11, 2019

Learn how to improve and automate security across the continuous integration/continuous deployment (CI/CD) pipeline. Know how and where security ties into all stages of cloud-oriented development pipeline when leveraging DevOps practices and deploying containers and microservers.

Whitepaper: How to Secure App Pipelines in AWS

by Amazon Web ServicesDec 13, 2019

We are seeing nothing less than an evolutionary shift as security infrastructure moves to software-defined models that improve speed and scale, and afford enterprise IT more agility and capabilities than ever before. Application development and deployment are driving this shift, and as the pace of development increases, organizations have a real need to ensure application security is embedded in all phases of the development and deployment life cycle, as well as in the cloud during operations.

Webcast: How to Perform Security Investigations in AWS

by Amazon Web ServicesDec 10, 2019

Learn how to plan for a cloud-based security investigation, perform prerequisites, and select services and controls. Know what data sources to leverage when investigating and containing an incident in the cloud, how to determine source and timeline, targeted systems, origination point and more.

Webcast: How to Build an Endpoint Security Strategy in AWS

by Amazon Web ServicesDec 11, 2019

Learn the key elements of a defense-in-depth architecture to create a readily deployable, fully integrated endpoint security strategy in AWS. Know how to implement effective strategies and gain comprehensive visibility with integrated EDR, UBA, DLP, threat intelligence and machine learning.

Webcast: How to Build a Threat Hunting Program in AWS

by Amazon Web ServicesDec 11, 2019

Learn how to build a threat hunting program for your AWS environment, including tools and techniques for discovery and analysis. Know where to search for valuable data in logs and elsewhere, how to efficiently analyze that data using native AWS capabilities and how to enrich your findings through SIEM and SOAR technologies.

Webcast: How to Build a Threat Detection Strategy in AWS

by Amazon Web ServicesDec 11, 2019

Learn how to build a threat detection strategy and how to enhance visibility for continuous monitoring, detection and event management in the AWS. Know how to streamline Detection and Response with key design considerations, needs and capabilities, as well as technical, business and operational requirements.

Whitepaper: How to Build a Threat Detection Strategy in Amazon Web Services (AWS)

by Amazon Web ServicesDec 13, 2019

One major concern security teams have is losing visibility and detection capabilities when their organization moves to a cloud. While this might have been true in the early days of cloud services, these days providers are announcing new threat detection features and offerings almost every month. These new services open up the possibility of adjusting traditional network- and host-based monitoring to support intrusion detection in the cloud. In this paper, we focus on the key steps to detect threats in Amazon Web Services (AWS) and gradually build a security monitoring strategy.

Whitepaper: Enabling a Threat Hunting Capability in AWS

by Amazon Web ServicesDec 13, 2019

Learn how to conduct effective threat hunting in your Amazon Web Services (AWS) environment.

Whitepaper: Enabling a Security Investigation in AWS

by Amazon Web ServicesDec 13, 2019

Learn how to conduct an effective investigation in your Amazon Web Services (AWS) environment