Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

TECH DIGITAL RESOURCE LIBRARY

Amazon Web Services

Amazon Web Service (AWS) is a subsidiary of Amazon that provides on-demand cloud computing platforms to individuals, companies and governments, on a metered pay-as-you-go basis. In aggregate, these cloud computing web services provide a set of simple, abstract technical infrastructure and distributed computing building blocks and tools.

AWS comprises more than 90 services spanning a wide range including computing, storage, networking, database, analytics, application services, deployment, management, mobile, developer tools, and tools for the Internet of Things. The most popular include Amazon Elastic Computer Cloud (EC2) and Amazon Simple Storage Service (Amazon S3). Most services are not exposed directly to end users, but instead offer functionality through APIs for developers to use in their applications. Amazon Web Services' offerings are accessed over HTTP, using the REST architectural style and SOAP protocol.

Our Website: http://aws.amazon.com/


Latest Content From Amazon Web Services

Webcast: Virtualize Your Contact Center Overnight and Get Ahead of New Mobile Workforce Challenges

by Amazon Web ServicesApr 22, 2020

Sometimes unpredictable and large scale events make it impossible for businesses to run their contact centers as usual. For example, not having access to physical buildings can challenge businesses to make their contact centers accessible by agents in a work-from-home model as quickly as they can. But just how fast can businesses respond to this challenge? That may depend on the underlying systems and technologies they’re using.

In this webinar, analysts Robin Gareiss and Irwin Lazar of Nemertes Research will present survey findings and analysis showing how contact center agent workforces are moving to a virtualized model, and how enterprises can accelerate this effort. They’ll be joined by subject matter experts from AWS, who will describe ways that the Amazon Connect service streamlines the process of virtualizing your contact center, and how you can use this model to respond quickly to the current crisis, while also preparing your contact center for continuous improvements in service quality and cost effectiveness over the long term.


Webcast: Machine Learning and Natural Language Processing Coming to Life in the Contact Center

by Amazon Web ServicesJan 29, 2020

Machine Learning (ML) and Natural Language Processing (NLP) aren’t just futuristic technologies; their potential is beginning to be realized today in contact centers. ML and NLP are being used for telephony monitoring, transcription, and real-time analysis that contact center managers can use to drive better customer service.

In this webinar, Sheila McGee-Smith, president and principal analyst at McGee-Smith Analytics, will discuss how ML, AI, and NLP are giving businesses the ability to create better customers experiences, improve how they leverage customer data, and quantify the benefits of these systems. She’ll be joined by Yasser El-Haggan, worldwide technical leader for Amazon Connect, who will describe how your enterprise can start taking advantage of these capabilities today.

 


Whitepaper: Building an Endpoint Security Strategy in AWS

by Amazon Web ServicesDec 13, 2019

Gain visibility into your endpoints, current threat intelligence, compliance status, and more by leveraging AWS services and solutions in AWS Marketplace.


Whitepaper: How to Build a Threat Detection Strategy in Amazon Web Services (AWS)

by Amazon Web ServicesDec 13, 2019

One major concern security teams have is losing visibility and detection capabilities when their organization moves to a cloud. While this might have been true in the early days of cloud services, these days providers are announcing new threat detection features and offerings almost every month. These new services open up the possibility of adjusting traditional network- and host-based monitoring to support intrusion detection in the cloud. In this paper, we focus on the key steps to detect threats in Amazon Web Services (AWS) and gradually build a security monitoring strategy.


Whitepaper: Enabling a Threat Hunting Capability in AWS

by Amazon Web ServicesDec 13, 2019

Learn how to conduct effective threat hunting in your Amazon Web Services (AWS) environment.


Whitepaper: Enabling a Security Investigation in AWS

by Amazon Web ServicesDec 13, 2019

Learn how to conduct an effective investigation in your Amazon Web Services (AWS) environment


Whitepaper: How to Secure App Pipelines in AWS

by Amazon Web ServicesDec 13, 2019

We are seeing nothing less than an evolutionary shift as security infrastructure moves to software-defined models that improve speed and scale, and afford enterprise IT more agility and capabilities than ever before. Application development and deployment are driving this shift, and as the pace of development increases, organizations have a real need to ensure application security is embedded in all phases of the development and deployment life cycle, as well as in the cloud during operations.


Webcast: How to Build a Threat Hunting Program in AWS

by Amazon Web ServicesDec 11, 2019

Learn how to build a threat hunting program for your AWS environment, including tools and techniques for discovery and analysis. Know where to search for valuable data in logs and elsewhere, how to efficiently analyze that data using native AWS capabilities and how to enrich your findings through SIEM and SOAR technologies.


Webcast: How to Build a Threat Detection Strategy in AWS

by Amazon Web ServicesDec 11, 2019

Learn how to build a threat detection strategy and how to enhance visibility for continuous monitoring, detection and event management in the AWS. Know how to streamline Detection and Response with key design considerations, needs and capabilities, as well as technical, business and operational requirements.


Webcast: How to Secure Application Pipelines in AWS

by Amazon Web ServicesDec 11, 2019

Learn how to improve and automate security across the continuous integration/continuous deployment (CI/CD) pipeline. Know how and where security ties into all stages of cloud-oriented development pipeline when leveraging DevOps practices and deploying containers and microservers.