Professional Security Services for AWS
Securely positioned in the public cloud with the AWS experts from Arvato Systems
Our additional security services
AWS Edge Security Services
Security threats such as DDoS attacks pose a serious risk. Especially for companies whose value creation depends on a web presence and/or an e-commerce store. Companies often lack resources and/or time to implement and manage a necessary edge security solution. We implement Amazon Web Services (AWS) perimeter protection services for you to protect your applications and infrastructure from cybersecurity attacks such as Distributed Denial of Services (DDoS), SQL Injection or Cross-Site Scripting. To do this, we develop a fully managed 24x7 Security Operations Center (SOC) for AWS Shield Advanced for you, AWS WAF and AWS Firewall Manager and deploy it.
Disaster Recovery for O365
Like Amazon Web Services, other cloud hyperscalers handle IT security responsibilities in the shared responsibility model. Especially in the work context with O365, a lot of data accumulates for which a single recovery is only possible to a limited extent.
We offer AWS backup and DR via either Veeam or netapp specifically for easy backup and management of your data from O365. Backup and management is simple and accessible on Amazon Elastic Compute Cloud (Amazon EC2) and Amazon Simple Storage Service (S3). This prevents the loss of your AWS data and also allows you to benefit from the cost advantages of the AWS cloud.
Identity Access Management with Okta
We help you simplify AWS access management across multiple accounts while maintaining the familiar Okta experience for administrators and identity managers, as well as end users. To do this, we integrate Okta Identity Cloud with AWS IAM so that access to AWS can be managed centrally in Okta, or their Okta-attached identity manager (e.g. AD), and end users can log in and access their assigned AWS accounts using Okta.
AWS IAM and Okta Identity Cloud use standards-based automation to provision users and groups in AWS, saving management time and increasing security. This also satisfies compliance, for example, with starter-changer-leaver processes.