{"id":20697,"date":"2022-11-30T10:30:08","date_gmt":"2022-11-30T18:30:08","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2022\/11\/30\/news-14430\/"},"modified":"2022-11-30T10:30:08","modified_gmt":"2022-11-30T18:30:08","slug":"news-14430","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2022\/11\/30\/news-14430\/","title":{"rendered":"AWS brings Verified Access security to the Apple enterprise"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/idge\/imported\/imageapi\/2022\/09\/22\/12\/gettyimages-aws-33780--100932637-small.jpg\"\/><\/p>\n<p>Amazon is introducing its next-gen <a href=\"https:\/\/aws.amazon.com\/about-aws\/whats-new\/2022\/11\/aws-verified-access-preview\/\" rel=\"noopener nofollow\" target=\"_blank\">AWS Verified Access security technology<\/a>. At its annual AWS <a href=\"https:\/\/aws.amazon.com\/new\/?sc_icampaign=aware_reinvent-product-announcements_reinvent22&amp;sc_ichannel=ha&amp;sc_icontent=awssm-12030_aware_reinvent22&amp;sc_iplace=2up&amp;trk=2ad08a94-d27d-4748-843f-6078d43c4c73~ha_awssm-12030_aware_reinvent22&amp;whats-new-content-all.sort-by=item.additionalFields.postDateTime&amp;whats-new-content-all.sort-order=desc&amp;awsf.whats-new-analytics=*all&amp;awsf.whats-new-app-integration=*all&amp;awsf.whats-new-arvr=*all&amp;awsf.whats-new-blockchain=*all&amp;awsf.whats-new-business-applications=*all&amp;awsf.whats-new-cloud-financial-management=*all&amp;awsf.whats-new-compute=*all&amp;awsf.whats-new-containers=*all&amp;awsf.whats-new-customer-enablement=*all&amp;awsf.whats-new-customer%20engagement=*all&amp;awsf.whats-new-database=*all&amp;awsf.whats-new-developer-tools=*all&amp;awsf.whats-new-end-user-computing=*all&amp;awsf.whats-new-mobile=*all&amp;awsf.whats-new-gametech=*all&amp;awsf.whats-new-iot=*all&amp;awsf.whats-new-machine-learning=*all&amp;awsf.whats-new-management-governance=*all&amp;awsf.whats-new-media-services=*all&amp;awsf.whats-new-migration-transfer=*all&amp;awsf.whats-new-networking-content-delivery=*all&amp;awsf.whats-new-quantum-tech=*all&amp;awsf.whats-new-robotics=*all&amp;awsf.whats-new-satellite=*all&amp;awsf.whats-new-security-id-compliance=*all&amp;awsf.whats-new-serverless=*all&amp;awsf.whats-new-storage=*all\" rel=\"noopener nofollow\" target=\"_blank\">re: Invent show<\/a>, the company confirmed the tech will be made available to enterprises running Apple products thanks to partnerships with <a href=\"https:\/\/www.jamf.com\/resources\/press-releases\/jamf-announces-new-integration-with-aws\/\" rel=\"noopener nofollow\" target=\"_blank\">Jamf<\/a>, <a href=\"https:\/\/jumpcloud.com\/blog\/jumpcloud-aws-verified-access-expand-secure-access-to-private-applications\" rel=\"noopener nofollow\" target=\"_blank\">JumpCloud<\/a>, and other device management vendors in the space.<\/p>\n<p>What\u2019s valuable about AWS Verified Access is that it enables IT to provide secure access to applications without using a VPN. Built on Zero Trust principles, Verified Access enables teams to create, configure, and manage a fine-grained set of policies for private application access.<\/p>\n<p>Think of it as an additional layer of protection within the rapidly evolving security landscape, one that also ensures valuable corporate data isn\u2019t being carried via less-trusted VPN servers. It also means users won\u2019t be calling in with help requests because they&#8217;re having problems with the VPN.<\/p>\n<p>The idea is that IT can <a href=\"https:\/\/aws.amazon.com\/blogs\/aws\/aws-verified-access-preview-vpn-less-secure-network-access-to-corporate-applications\/\" rel=\"noopener nofollow\" target=\"_blank\">define security policies and criteria<\/a> and that those requirements must then be met before users or their devices gain access to internal services hosted on AWS. Verified Access evaluates each access request in real time and only connects users to the application if these conditions are met.<\/p>\n<p>\u201cIt means you can define a unique access policy for each application, with conditions based on identity data and device posture,\u201d Amazon explains.\u00a0\u201cFor example, you can create policies allowing only members of the finance team to access their financial reporting application and using only compliant devices.\u201d<\/p>\n<p>Jamf explains that the tech means customers can set things up so that only devices that are managed and originate from a specific Internet Protocol (IP) address range, have a certain device risk score, or have minimum operating system (OS) version can access a system.<\/p>\n<p>The biggest change should be an improved security posture.\u00a0Unlike traditional protections in which access is evaluated once, this system evaluates each application access request as it comes in. This makes it far more difficult for bad actors to move from one app to another.\u00a0<\/p>\n<p>AWS also integrates with numerous ID and device management services (such as Jamf and JumpCloud) and logs all access attempts, which helps when troubleshooting.<\/p>\n<p>But for the growing number of hybrid and remote businesses, AWS Verified Access is an opportunity to lock down your cloud-based enterprise services and onboarding processes even more tightly with the ability to secure users more effectively at the edge.<\/p>\n<p>Earlier this fall, Jamf\u00a0<a href=\"https:\/\/www.computerworld.com\/article\/3674869\/jamf-pro-now-lets-it-admins-manage-aws-mac-instances.html\" rel=\"noopener\" target=\"_blank\">announced it was working with AWS\u00a0<\/a>to create a workflow to manage and provide an added layer of security to Amazon Elastic Compute Cloud (Amazon EC2) Mac instances at scale.<\/p>\n<p>\u201cAWS is proud to continue to work with Jamf so organizations can provide Trusted Access to their users,\u201d said Dave Brown, vice president of Amazon EC2 at AWS.\u00a0\u201cToday\u2019s announcement of AWS Verified Access Integration is the next step in a powerful partnership aimed at helping the enterprise succeed with Apple.\u201d<\/p>\n<p>Of course, the introduction provides <a href=\"https:\/\/www.computerworld.com\/article\/3679050\/jumpcloud-brings-remote-access-to-cross-platform-teams.html\">yet another\u00a0proof point<\/a>\u00a0of the extent to which Apple continues to grow in the enterprise. After all, it\u2019s unlikely this kind of support would be made available at all if Macs, iPhones, and iPads hadn\u2019t been <a href=\"https:\/\/www.computerworld.com\/article\/3679730\/jamf-q3-data-confirms-rapid-mac-adoption-across-the-enterprise.html\">deployed so rapidly in the last few years<\/a>. It\u2019s also a testament to the <a href=\"https:\/\/www.computerworld.com\/article\/3680728\/the-future-of-security-smarter-devices-that-protect-themselves.html\">security enhancements<\/a> for Apple products in the enterprise that continue to <a href=\"https:\/\/www.applemust.com\/jamf-to-fund-new-apple-security-and-enterprise-startups\/\" rel=\"noopener nofollow\" target=\"_blank\">emerge from players in the space<\/a>, even as Apple\u2019s share grows.<\/p>\n<p><em>Please follow me on\u00a0<a href=\"https:\/\/social.vivaldi.net\/@jonnyevans\" rel=\"nofollow noopener\" target=\"_blank\">Mastodon<\/a>, or join me in the\u00a0<a href=\"https:\/\/mewe.com\/join\/appleholics_bar_and_grill\" rel=\"nofollow noopener\" target=\"_blank\">AppleHolic\u2019s bar &amp; grill<\/a>\u00a0and\u00a0<a href=\"https:\/\/mewe.com\/join\/apple_discussions\" rel=\"nofollow noopener\" target=\"_blank\">Apple Discussions<\/a>\u00a0groups on MeWe.<\/em><\/p>\n<p><a href=\"https:\/\/www.computerworld.com\/article\/3681451\/aws-brings-verified-access-security-to-the-apple-enterprise.html#tk.rss_security\" target=\"bwo\" >http:\/\/www.computerworld.com\/category\/security\/index.rss<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/idge\/imported\/imageapi\/2022\/09\/22\/12\/gettyimages-aws-33780--100932637-small.jpg\"\/><\/p>\n<article>\n<section class=\"page\">\n<p>Amazon is introducing its next-gen <a href=\"https:\/\/aws.amazon.com\/about-aws\/whats-new\/2022\/11\/aws-verified-access-preview\/\" rel=\"noopener nofollow\" target=\"_blank\">AWS Verified Access security technology<\/a>. At its annual AWS <a href=\"https:\/\/aws.amazon.com\/new\/?sc_icampaign=aware_reinvent-product-announcements_reinvent22&amp;sc_ichannel=ha&amp;sc_icontent=awssm-12030_aware_reinvent22&amp;sc_iplace=2up&amp;trk=2ad08a94-d27d-4748-843f-6078d43c4c73~ha_awssm-12030_aware_reinvent22&amp;whats-new-content-all.sort-by=item.additionalFields.postDateTime&amp;whats-new-content-all.sort-order=desc&amp;awsf.whats-new-analytics=*all&amp;awsf.whats-new-app-integration=*all&amp;awsf.whats-new-arvr=*all&amp;awsf.whats-new-blockchain=*all&amp;awsf.whats-new-business-applications=*all&amp;awsf.whats-new-cloud-financial-management=*all&amp;awsf.whats-new-compute=*all&amp;awsf.whats-new-containers=*all&amp;awsf.whats-new-customer-enablement=*all&amp;awsf.whats-new-customer%20engagement=*all&amp;awsf.whats-new-database=*all&amp;awsf.whats-new-developer-tools=*all&amp;awsf.whats-new-end-user-computing=*all&amp;awsf.whats-new-mobile=*all&amp;awsf.whats-new-gametech=*all&amp;awsf.whats-new-iot=*all&amp;awsf.whats-new-machine-learning=*all&amp;awsf.whats-new-management-governance=*all&amp;awsf.whats-new-media-services=*all&amp;awsf.whats-new-migration-transfer=*all&amp;awsf.whats-new-networking-content-delivery=*all&amp;awsf.whats-new-quantum-tech=*all&amp;awsf.whats-new-robotics=*all&amp;awsf.whats-new-satellite=*all&amp;awsf.whats-new-security-id-compliance=*all&amp;awsf.whats-new-serverless=*all&amp;awsf.whats-new-storage=*all\" rel=\"noopener nofollow\" target=\"_blank\">re: Invent show<\/a>, the company confirmed the tech will be made available to enterprises running Apple products thanks to partnerships with <a href=\"https:\/\/www.jamf.com\/resources\/press-releases\/jamf-announces-new-integration-with-aws\/\" rel=\"noopener nofollow\" target=\"_blank\">Jamf<\/a>, <a href=\"https:\/\/jumpcloud.com\/blog\/jumpcloud-aws-verified-access-expand-secure-access-to-private-applications\" rel=\"noopener nofollow\" target=\"_blank\">JumpCloud<\/a>, and other device management vendors in the space.<\/p>\n<p class=\"jumpTag\"><a href=\"\/article\/3681451\/aws-brings-verified-access-security-to-the-apple-enterprise.html#jump\">To read this article in full, please click here<\/a><\/p>\n<\/section>\n<\/article>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[11062,10643],"tags":[20288,2211,10554,12555,714,24580],"class_list":["post-20697","post","type-post","status-publish","format-standard","hentry","category-computerworld","category-independent","tag-amazon-com","tag-apple","tag-mobile","tag-mobile-device-management","tag-security","tag-small-and-medium-business"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/20697","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=20697"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/20697\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=20697"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=20697"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=20697"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}