Wipro Limited announced that it has become an official launch partner for Amazon Security Lake from Amazon Web Service (AWS), which provides intelligent security data to modern enterprises to solve more security use cases, reduce threats, and increase security visibility.
Amazon Security Lake, which was introduced at AWS re:Invent, enables customers to create a security data lake from the integrated cloud and on-premises data sources, as well as private applications.
Amazon Security Lake’s support for the Open Cybersecurity Schema Framework (OCSF) standard reduces the cost and complexity for customers in making their security solution data accessible to address a variety of security use cases such as investigation, threat detection, and incident response.
Wipro is collaborating with AWS to collect data from various security sources. The sources include Wipro Cloud Application Risk Governance (CARG)–a “Single Pane of Glass” for Security Threat, Risk, and Compliance visibility in the cloud(s)–and to develop security use cases for Amazon Security Lake.
This will assist organisations in collating, managing, and deriving intelligence and value from log and event data in the cloud and on-premises to provide security teams with greater visibility across their organisations, said Wipro on Wednesday.
Customers using Amazon Security Lake can use their preferred security and analytics solutions to simply query that data in place or ingest the OCSF-compliant data to address additional use cases.
For feedback and suggestions, write to us at editorial@iifl.com
Related Tags
Invest wise with Expert advice
IIFL Customer Care Number
(Gold/NCD/NBFC/Insurance/NPS)
1860-267-3000 / 7039-050-000
IIFL Capital Services Support WhatsApp Number
+91 9892691696
IIFL Capital Services Limited - Stock Broker SEBI Regn. No: INZ000164132, PMS SEBI Regn. No: INP000002213,IA SEBI Regn. No: INA000000623, SEBI RA Regn. No: INH000000248
ARN NO : 47791 (AMFI Registered Mutual Fund Distributor)
This Certificate Demonstrates That IIFL As An Organization Has Defined And Put In Place Best-Practice Information Security Processes.