{"id":56762,"date":"2020-11-11T19:48:34","date_gmt":"2020-11-11T11:48:34","guid":{"rendered":"https:\/\/www.nextlink.cloud\/aws-service\/aws_security\/"},"modified":"2022-11-18T12:17:16","modified_gmt":"2022-11-18T04:17:16","slug":"aws_security","status":"publish","type":"aws_service","link":"https:\/\/www.nextlink.cloud\/en\/aws-service\/aws_security\/","title":{"rendered":"Cloud Data Security"},"content":{"rendered":"\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-constrained wp-block-group-is-layout-constrained\"><\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"editor-content block custom-block block-introduction margin-small-top over-hidden\" id=\"introduction\">\n    <div class=\"container rel\">\n        <div class=\"row\">\n            <div class=\"col-2 col-sm-1 offset-sm-1 offset-lg-2 d-flex\">\n                <div class=\"block-sub-title__wrapper\" data-fos=\"fade-up\">\n                                            <p class=\"block-sub-title m-0\">Introduction<\/p>\n                                    <\/div>\n            <\/div>\n            <div class=\"col-10 col-sm-9 col-md-8 col-lg-7 col-xl-6\">\n                                    <h2 class=\"block-title\">Nextlink Technology Protects the Security of your AWS Cloud Environment, Leave Enterprise Data Security to Us.<\/h2>\n                                                    <div class=\"block-description\" data-fos=\"fade-up\">\n                        <p>According to a report by Gartner, &#8220;95% of cloud security issues stem from configuration errors due to human error&#8221;. Data security and regulatory compliance must be jointly maintained by the user and a cloud agent certified in data security. Nextlink is deeply knowledgeable about cloud infrastructure security and secure AWS architecture, and can call upon an elite MSP hosting team to safeguard your cloud environment so you can focus on your enterprise operations without worry.<\/p>\n                    <\/div>\n                            <\/div>\n            <div class=\"col-lg-11 offset-lg-1\">\n                <div class=\"block-introduction__border padding rel\" data-fos><\/div>\n            <\/div>\n        <\/div>\n    <\/div>\n<\/div>\n<div class=\"editor-content container\">\n    <div class=\"row justify-content-center\">\n        <div class=\"col col-sm-10 col-lg-9 col-xl-8\">\n            <div class=\"article-content\"><\/div><\/div>\n\n\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"editor-content block custom-block block-solutions margin-small\" id=\"solution\">\n    <div class=\"container\">\n                <div class=\"row justify-content-center justify-content-lg-start\">\n            <div class=\"col-sm-10 col-lg-4 offset-lg-1\">\n                                    <h2 class=\"block-title\" data-fos=\"fade-up\">Nextlink Data Security Solutions: Your Cloud Guardian<\/h2>\n                            <\/div>\n            <div class=\"col-sm-10 col-lg-5 offset-lg-1\">\n                            <\/div>\n        <\/div>\n    <\/div>    <div class=\"container\">\n        <div class=\"row margin-small-top align-items-start justify-content-center justify-content-md-start\">\n            <div class=\"col-sm-10 col-md-8 offset-md-1\">\n                <div class=\"solutions__list rel\">\n                                            <div class=\"row solution-categry rel\">\n                            <div class=\"col-xl-4\">\n                                <h3 class=\"solution-categry__title\" data-fos=\"fade-up\">AWS Account Security Examination and IAM Training Service<\/h3>\n                            <\/div>\n                            <div class=\"col-xl-8 solution__items__wrapper\">\n                                <ul class=\"solution__items\">\n                                                                            <li class=\"solution-item rel\" data-fos=\"fade-up\" data-fos-delay=\"150\">\n                                                                                        <div class=\"text-conent\">\n                                                <p>Nextlink Technology is the first in the industry to offer a 4-hour basic data security examination service* that provides step-by-step instructions on testing your account&#8217;s security posture while helping set up IAM permissions so you can focus on enterprise performance. Leave your data security to Nextlink!* Payment for the data security examination service will be based on the actual content and number of hours<\/p>\n                                            <\/div>\n                                                                                    <\/li>\n                                                                    <\/ul>\n                            <\/div>\n                        <\/div>\n                                            <div class=\"row solution-categry rel\">\n                            <div class=\"col-xl-4\">\n                                <h3 class=\"solution-categry__title\" data-fos=\"fade-up\">Nextlink hosting services<\/h3>\n                            <\/div>\n                            <div class=\"col-xl-8 solution__items__wrapper\">\n                                <ul class=\"solution__items\">\n                                                                            <li class=\"solution-item rel\" data-fos=\"fade-up\" data-fos-delay=\"150\">\n                                                                                        <div class=\"text-conent\">\n                                                <p>Nextlink Technology was the first company in Taiwan to obtain AWS MSP certification. We provide customers with the highest 24&#215;7 AWS hosting services, assist with monitoring cloud environments, and offer recommendations for architecture optimizations. Our certifications in data security mean we&#8217;re constantly verifying that all environments meet data security requirements, and we provide immediate assistance to solve customer issues.<\/p>\n                                            <\/div>\n                                                                                    <\/li>\n                                                                    <\/ul>\n                            <\/div>\n                        <\/div>\n                                            <div class=\"row solution-categry rel\">\n                            <div class=\"col-xl-4\">\n                                <h3 class=\"solution-categry__title\" data-fos=\"fade-up\">AWS best security practices<\/h3>\n                            <\/div>\n                            <div class=\"col-xl-8 solution__items__wrapper\">\n                                <ul class=\"solution__items\">\n                                                                            <li class=\"solution-item rel\" data-fos=\"fade-up\" data-fos-delay=\"150\">\n                                                                                        <div class=\"text-conent\">\n                                                <p>Nextlink Technology can comply with the five aspects of an AWS Well-Architected Framework by conducting inspections and adjustments to the designs of a customer&#8217;s AWS cloud architecture, thereby allowing the customer to achieve data security, high performance, high availability, cost optimizations, and other considerations.<\/p>\n                                            <\/div>\n                                                                                    <\/li>\n                                                                    <\/ul>\n                            <\/div>\n                        <\/div>\n                                            <div class=\"row solution-categry rel\">\n                            <div class=\"col-xl-4\">\n                                <h3 class=\"solution-categry__title\" data-fos=\"fade-up\">Comprehensive Data Security Partner<\/h3>\n                            <\/div>\n                            <div class=\"col-xl-8 solution__items__wrapper\">\n                                <ul class=\"solution__items\">\n                                                                            <li class=\"solution-item rel\" data-fos=\"fade-up\" data-fos-delay=\"150\">\n                                                                                        <div class=\"text-conent\">\n                                                <p>Aside from native AWS data security services, Nextlink Technology can address customers&#8217; additional data security requirements, such as next-gen network firewalls, vulnerability scanning, penetration testing, and more. We have comprehensive data security partners that can assist you with more comprehensive security protections.<\/p>\n                                            <\/div>\n                                                                                    <\/li>\n                                                                    <\/ul>\n                            <\/div>\n                        <\/div>\n                                    <\/div>\n            <\/div>\n            <div class=\"col-md-2 solutions__bg-wrapper order-md-first\" data-fos>\n                <div class=\"solutions__bg object-fit-image-wrapper\">\n                    <img decoding=\"async\" width=\"768\" height=\"433\" src=\"https:\/\/s3.ap-northeast-1.amazonaws.com\/website-image.bucket\/live\/wp-content\/uploads\/2020\/11\/img_aws_security-2-768x433.jpg\" class=\"attachment-medium_large size-medium_large\" alt=\"Nextlink \u96f2\u7aef\u8cc7\u8a0a\u5b89\u5168\" srcset=\"https:\/\/s3.ap-northeast-1.amazonaws.com\/website-image.bucket\/live\/wp-content\/uploads\/2020\/11\/img_aws_security-2-768x433.jpg 768w, https:\/\/s3.ap-northeast-1.amazonaws.com\/website-image.bucket\/live\/wp-content\/uploads\/2020\/11\/img_aws_security-2-300x169.jpg 300w, https:\/\/s3.ap-northeast-1.amazonaws.com\/website-image.bucket\/live\/wp-content\/uploads\/2020\/11\/img_aws_security-2-1024x577.jpg 1024w, https:\/\/s3.ap-northeast-1.amazonaws.com\/website-image.bucket\/live\/wp-content\/uploads\/2020\/11\/img_aws_security-2.jpg 1065w\" sizes=\"(max-width: 768px) 100vw, 768px\" \/>                <\/div>\n            <\/div>\n        <\/div>\n    <\/div>\n<\/div>\n<div class=\"editor-content container\">\n    <div class=\"row justify-content-center\">\n        <div class=\"col col-sm-10 col-lg-9 col-xl-8\">\n            <div class=\"article-content\"><\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"editor-content block custom-block block-link-to-the-cloud margin-small\" >\n    <div class=\"container\">\n        <div class=\"row\">\n            <div class=\"col-sm-11 offset-sm-1 rel\">\n                <div class=\"block-link-to-the-cloud__content rel\">\n                    <p class=\"text rel\" data-fos>\n                        <span class=\"word\">\n                            <span class=\"char\">L<\/span>\n                            <span class=\"char\">i<\/span>\n                            <span class=\"char\">n<\/span>\n                            <span class=\"char\">k<\/span>\n                        <\/span>\n                        <span class=\"word\">\n                            <span class=\"char\">T<\/span>\n                            <span class=\"char\">o<\/span>\n                        <\/span>\n                        <span class=\"word\">\n                            <span class=\"char\">T<\/span>\n                            <span class=\"char\">h<\/span>\n                            <span class=\"char\">e<\/span>\n                        <\/span>\n                        <span class=\"word\">\n                            <span class=\"char\">C<\/span>\n                            <span class=\"char\">l<\/span>\n                            <span class=\"char\">o<\/span>\n                            <span class=\"char\">u<\/span>\n                            <span class=\"char\">d<\/span>\n                        <\/span>\n                    <\/p>\n                    <div class=\"parallax-img abs\">\n                        <img decoding=\"async\" src=\"https:\/\/www.nextlink.cloud\/wp-content\/themes\/innovext\/images\/bg_link-to-the-cloud.jpg\" alt=\"link-to-the-cloud-bg\">\n                    <\/div>\n                <\/div>\n                <div class=\"block-link-to-the-cloud__border abs w-100 h-100\" data-fos><\/div>\n            <\/div>\n        <\/div>\n    <\/div>\n<\/div>\n<div class=\"editor-content container\">\n    <div class=\"row justify-content-center\">\n        <div class=\"col col-sm-10 col-lg-9 col-xl-8\">\n            <div class=\"article-content\"><\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"editor-content block custom-block block-solutions margin-small\" id=\"service\">\n    <div class=\"container\">\n                <div class=\"row justify-content-center justify-content-lg-start\">\n            <div class=\"col-sm-10 col-lg-4 offset-lg-1\">\n                                    <h2 class=\"block-title\" data-fos=\"fade-up\">Orientation of AWs Cloud Data Security Services<\/h2>\n                            <\/div>\n            <div class=\"col-sm-10 col-lg-5 offset-lg-1\">\n                                    <div class=\"block-description\" data-fos=\"fade-up\" data-fos-lg-delay=\"150\">\n                        <p>Data security incidents such as account or data theft are becoming increasingly common. Therefore, a key issue in cloud migration has been how enterprises can implement protections in advance to prevent massive financial losses from security catastrophes. As such, enterprise customers that can implement the following four strategies when using AWS services can greatly enhance the data security of their cloud accounts.<\/p>\n                    <\/div>\n                            <\/div>\n        <\/div>\n    <\/div>    <div class=\"container\">\n        <div class=\"row margin-small-top align-items-start justify-content-center justify-content-md-start\">\n            <div class=\"col-sm-10 col-md-8 offset-md-1\">\n                <div class=\"solutions__list rel\">\n                                            <div class=\"row solution-categry rel\">\n                            <div class=\"col-xl-4\">\n                                <h3 class=\"solution-categry__title\" data-fos=\"fade-up\">Infrastructure and Data Protections<\/h3>\n                            <\/div>\n                            <div class=\"col-xl-8 solution__items__wrapper\">\n                                <ul class=\"solution__items\">\n                                                                            <li class=\"solution-item rel\" data-fos=\"fade-up\" data-fos-delay=\"150\">\n                                                                                        <div class=\"text-conent\">\n                                                <p>Protecting infrastructure is the foundation of data security. It requires both customers and hosting teams to implement comprehensive infrastructure configurations, ad hoc testing, and monitoring for unauthorized activity to protect accounts, workloads, and data. Safety assessment reports generated for cloud applications are used to prevent malicious attacks such as DDoS attacks. The volume of data accumulated from enterprise development results in complex management, increasing challenges to security, and vulnerability to attacks on personal data or confidential documents. AWS offers &#8220;Amazon GuardDuty&#8221; and &#8220;AWS WAF&#8221; to provide customers with comprehensive data protections:<\/p>\n                                            <\/div>\n                                                                                    <\/li>\n                                                                            <li class=\"solution-item rel\" data-fos=\"fade-up\" data-fos-delay=\"150\">\n                                                                                            <div class=\"heading d-flex\">\n                                                    <div class=\"icon\">\n                                                        <svg width=\"50\" height=\"50\" viewBox=\"0 0 50 50\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n<path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M31.4031 11.5906C27.895 13.0941 23.7598 15.9631 19.8616 19.8613C15.9633 23.7596 13.0943 27.8948 11.5908 31.4029C10.8381 33.1592 10.4452 34.7177 10.4098 35.9871C10.3744 37.2541 10.6936 38.1527 11.2702 38.7293C11.8468 39.3059 12.7454 39.6251 14.0124 39.5897C15.2818 39.5543 16.8403 39.1614 18.5966 38.4087C22.1047 36.9052 26.2399 34.0362 30.1382 30.138C34.0365 26.2397 36.9054 22.1045 38.4089 18.5964C39.1616 16.8401 39.5545 15.2816 39.5899 14.0122C39.6253 12.7452 39.3061 11.8466 38.7295 11.27C38.1529 10.6934 37.2543 10.3742 35.9873 10.4096C34.7179 10.445 33.1595 10.8379 31.4031 11.5906ZM35.9408 8.74355C37.4935 8.70023 38.903 9.08644 39.908 10.0915C40.9131 11.0965 41.2993 12.506 41.256 14.0587C41.2127 15.6089 40.7428 17.3815 39.9408 19.2529C38.3348 23.0002 35.3265 27.3066 31.3167 31.3165C27.3068 35.3263 23.0004 38.3346 19.2531 39.9406C17.3818 40.7426 15.6091 41.2125 14.0589 41.2557C12.5062 41.2991 11.0967 40.9129 10.0917 39.9078C9.08665 38.9028 8.70044 37.4933 8.74376 35.9406C8.78702 34.3904 9.25689 32.6177 10.0589 30.7464C11.6649 26.9991 14.6732 22.6927 18.683 18.6828C22.6929 14.673 26.9993 11.6647 30.7466 10.0587C32.618 9.25668 34.3906 8.78681 35.9408 8.74355Z\" fill=\"#030000\"\/>\n<path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M11.5905 18.5963C13.094 22.1044 15.963 26.2396 19.8613 30.1379C23.7596 34.0362 27.8948 36.9052 31.4029 38.4086C33.1592 39.1613 34.7177 39.5542 35.9871 39.5897C37.2541 39.625 38.1527 39.3058 38.7292 38.7292C39.3058 38.1527 39.625 37.2541 39.5897 35.9871C39.5542 34.7177 39.1613 33.1592 38.4086 31.4029C36.9052 27.8948 34.0362 23.7596 30.1379 19.8613C26.2396 15.963 22.1044 13.094 18.5963 11.5905C16.84 10.8378 15.2815 10.4449 14.0121 10.4095C12.7451 10.3742 11.8465 10.6934 11.2699 11.2699C10.6934 11.8465 10.3742 12.7451 10.4095 14.0121C10.4449 15.2815 10.8378 16.84 11.5905 18.5963ZM8.74349 14.0586C8.70016 12.506 9.08637 11.0965 10.0914 10.0914C11.0965 9.08637 12.506 8.70016 14.0586 8.74349C15.6088 8.78675 17.3815 9.25662 19.2529 10.0586C23.0002 11.6646 27.3066 14.6729 31.3164 18.6828C35.3262 22.6926 38.3345 26.999 39.9405 30.7463C40.7426 32.6177 41.2124 34.3904 41.2557 35.9406C41.299 37.4932 40.9128 38.9027 39.9078 39.9078C38.9027 40.9128 37.4932 41.299 35.9406 41.2557C34.3904 41.2124 32.6177 40.7426 30.7463 39.9405C26.999 38.3345 22.6926 35.3262 18.6828 31.3164C14.6729 27.3066 11.6646 23.0002 10.0586 19.2528C9.25662 17.3815 8.78675 15.6088 8.74349 14.0586Z\" fill=\"#030000\"\/>\n<\/svg>                                                    <\/div>\n                                                    <h4>Amazon GuardDuty<\/h4>\n                                                <\/div>\n                                                                                        <div class=\"text-conent\">\n                                                <p>The threat detection service built into AWS can analyze incidents, track trends and models, identify exceptions with potential issues, and issue warnings.<\/p>\n                                            <\/div>\n                                                                                    <\/li>\n                                                                            <li class=\"solution-item rel\" data-fos=\"fade-up\" data-fos-delay=\"150\">\n                                                                                            <div class=\"heading d-flex\">\n                                                    <div class=\"icon\">\n                                                        <svg width=\"50\" height=\"50\" viewBox=\"0 0 50 50\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n<path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M31.4031 11.5906C27.895 13.0941 23.7598 15.9631 19.8616 19.8613C15.9633 23.7596 13.0943 27.8948 11.5908 31.4029C10.8381 33.1592 10.4452 34.7177 10.4098 35.9871C10.3744 37.2541 10.6936 38.1527 11.2702 38.7293C11.8468 39.3059 12.7454 39.6251 14.0124 39.5897C15.2818 39.5543 16.8403 39.1614 18.5966 38.4087C22.1047 36.9052 26.2399 34.0362 30.1382 30.138C34.0365 26.2397 36.9054 22.1045 38.4089 18.5964C39.1616 16.8401 39.5545 15.2816 39.5899 14.0122C39.6253 12.7452 39.3061 11.8466 38.7295 11.27C38.1529 10.6934 37.2543 10.3742 35.9873 10.4096C34.7179 10.445 33.1595 10.8379 31.4031 11.5906ZM35.9408 8.74355C37.4935 8.70023 38.903 9.08644 39.908 10.0915C40.9131 11.0965 41.2993 12.506 41.256 14.0587C41.2127 15.6089 40.7428 17.3815 39.9408 19.2529C38.3348 23.0002 35.3265 27.3066 31.3167 31.3165C27.3068 35.3263 23.0004 38.3346 19.2531 39.9406C17.3818 40.7426 15.6091 41.2125 14.0589 41.2557C12.5062 41.2991 11.0967 40.9129 10.0917 39.9078C9.08665 38.9028 8.70044 37.4933 8.74376 35.9406C8.78702 34.3904 9.25689 32.6177 10.0589 30.7464C11.6649 26.9991 14.6732 22.6927 18.683 18.6828C22.6929 14.673 26.9993 11.6647 30.7466 10.0587C32.618 9.25668 34.3906 8.78681 35.9408 8.74355Z\" fill=\"#030000\"\/>\n<path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M11.5905 18.5963C13.094 22.1044 15.963 26.2396 19.8613 30.1379C23.7596 34.0362 27.8948 36.9052 31.4029 38.4086C33.1592 39.1613 34.7177 39.5542 35.9871 39.5897C37.2541 39.625 38.1527 39.3058 38.7292 38.7292C39.3058 38.1527 39.625 37.2541 39.5897 35.9871C39.5542 34.7177 39.1613 33.1592 38.4086 31.4029C36.9052 27.8948 34.0362 23.7596 30.1379 19.8613C26.2396 15.963 22.1044 13.094 18.5963 11.5905C16.84 10.8378 15.2815 10.4449 14.0121 10.4095C12.7451 10.3742 11.8465 10.6934 11.2699 11.2699C10.6934 11.8465 10.3742 12.7451 10.4095 14.0121C10.4449 15.2815 10.8378 16.84 11.5905 18.5963ZM8.74349 14.0586C8.70016 12.506 9.08637 11.0965 10.0914 10.0914C11.0965 9.08637 12.506 8.70016 14.0586 8.74349C15.6088 8.78675 17.3815 9.25662 19.2529 10.0586C23.0002 11.6646 27.3066 14.6729 31.3164 18.6828C35.3262 22.6926 38.3345 26.999 39.9405 30.7463C40.7426 32.6177 41.2124 34.3904 41.2557 35.9406C41.299 37.4932 40.9128 38.9027 39.9078 39.9078C38.9027 40.9128 37.4932 41.299 35.9406 41.2557C34.3904 41.2124 32.6177 40.7426 30.7463 39.9405C26.999 38.3345 22.6926 35.3262 18.6828 31.3164C14.6729 27.3066 11.6646 23.0002 10.0586 19.2528C9.25662 17.3815 8.78675 15.6088 8.74349 14.0586Z\" fill=\"#030000\"\/>\n<\/svg>                                                    <\/div>\n                                                    <h4>AWS WAF<\/h4>\n                                                <\/div>\n                                                                                        <div class=\"text-conent\">\n                                                <p>The firewall for web applications can protect web applications and APIs from uncommon web hacking programs and bots so that availability and security remain uninterrupted. It doesn&#8217;t consume excessive resources, the API has comprehensive functionality, and it is automatically updated to automate security rules that can be created, deployed, and maintained.<\/p>\n                                            <\/div>\n                                                                                    <\/li>\n                                                                    <\/ul>\n                            <\/div>\n                        <\/div>\n                                            <div class=\"row solution-categry rel\">\n                            <div class=\"col-xl-4\">\n                                <h3 class=\"solution-categry__title\" data-fos=\"fade-up\">Automatic detection and prevention of attacks<\/h3>\n                            <\/div>\n                            <div class=\"col-xl-8 solution__items__wrapper\">\n                                <ul class=\"solution__items\">\n                                                                            <li class=\"solution-item rel\" data-fos=\"fade-up\" data-fos-delay=\"150\">\n                                                                                        <div class=\"text-conent\">\n                                                <p>Amazon Inspector combined with AWS Shield Standard can automatically detect software vulnerabilities and risks in order to prevent potential attacks. AWS Elastic Disaster Recovery assists with restoring internal architecture and cloud applications to reduce the scale of losses.<\/p>\n                                            <\/div>\n                                                                                    <\/li>\n                                                                            <li class=\"solution-item rel\" data-fos=\"fade-up\" data-fos-delay=\"150\">\n                                                                                            <div class=\"heading d-flex\">\n                                                    <div class=\"icon\">\n                                                        <svg width=\"50\" height=\"50\" viewBox=\"0 0 50 50\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n<path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M31.4031 11.5906C27.895 13.0941 23.7598 15.9631 19.8616 19.8613C15.9633 23.7596 13.0943 27.8948 11.5908 31.4029C10.8381 33.1592 10.4452 34.7177 10.4098 35.9871C10.3744 37.2541 10.6936 38.1527 11.2702 38.7293C11.8468 39.3059 12.7454 39.6251 14.0124 39.5897C15.2818 39.5543 16.8403 39.1614 18.5966 38.4087C22.1047 36.9052 26.2399 34.0362 30.1382 30.138C34.0365 26.2397 36.9054 22.1045 38.4089 18.5964C39.1616 16.8401 39.5545 15.2816 39.5899 14.0122C39.6253 12.7452 39.3061 11.8466 38.7295 11.27C38.1529 10.6934 37.2543 10.3742 35.9873 10.4096C34.7179 10.445 33.1595 10.8379 31.4031 11.5906ZM35.9408 8.74355C37.4935 8.70023 38.903 9.08644 39.908 10.0915C40.9131 11.0965 41.2993 12.506 41.256 14.0587C41.2127 15.6089 40.7428 17.3815 39.9408 19.2529C38.3348 23.0002 35.3265 27.3066 31.3167 31.3165C27.3068 35.3263 23.0004 38.3346 19.2531 39.9406C17.3818 40.7426 15.6091 41.2125 14.0589 41.2557C12.5062 41.2991 11.0967 40.9129 10.0917 39.9078C9.08665 38.9028 8.70044 37.4933 8.74376 35.9406C8.78702 34.3904 9.25689 32.6177 10.0589 30.7464C11.6649 26.9991 14.6732 22.6927 18.683 18.6828C22.6929 14.673 26.9993 11.6647 30.7466 10.0587C32.618 9.25668 34.3906 8.78681 35.9408 8.74355Z\" fill=\"#030000\"\/>\n<path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M11.5905 18.5963C13.094 22.1044 15.963 26.2396 19.8613 30.1379C23.7596 34.0362 27.8948 36.9052 31.4029 38.4086C33.1592 39.1613 34.7177 39.5542 35.9871 39.5897C37.2541 39.625 38.1527 39.3058 38.7292 38.7292C39.3058 38.1527 39.625 37.2541 39.5897 35.9871C39.5542 34.7177 39.1613 33.1592 38.4086 31.4029C36.9052 27.8948 34.0362 23.7596 30.1379 19.8613C26.2396 15.963 22.1044 13.094 18.5963 11.5905C16.84 10.8378 15.2815 10.4449 14.0121 10.4095C12.7451 10.3742 11.8465 10.6934 11.2699 11.2699C10.6934 11.8465 10.3742 12.7451 10.4095 14.0121C10.4449 15.2815 10.8378 16.84 11.5905 18.5963ZM8.74349 14.0586C8.70016 12.506 9.08637 11.0965 10.0914 10.0914C11.0965 9.08637 12.506 8.70016 14.0586 8.74349C15.6088 8.78675 17.3815 9.25662 19.2529 10.0586C23.0002 11.6646 27.3066 14.6729 31.3164 18.6828C35.3262 22.6926 38.3345 26.999 39.9405 30.7463C40.7426 32.6177 41.2124 34.3904 41.2557 35.9406C41.299 37.4932 40.9128 38.9027 39.9078 39.9078C38.9027 40.9128 37.4932 41.299 35.9406 41.2557C34.3904 41.2124 32.6177 40.7426 30.7463 39.9405C26.999 38.3345 22.6926 35.3262 18.6828 31.3164C14.6729 27.3066 11.6646 23.0002 10.0586 19.2528C9.25662 17.3815 8.78675 15.6088 8.74349 14.0586Z\" fill=\"#030000\"\/>\n<\/svg>                                                    <\/div>\n                                                    <h4>Amazon Inspector<\/h4>\n                                                <\/div>\n                                                                                        <div class=\"text-conent\">\n                                                <p>AWS utilizes penetration testing and automated management services to constantly detect software vulnerabilities and unexpected risks, greatly shortening the mean time to repair (MTTR)<\/p>\n                                            <\/div>\n                                                                                            <span class=\"btn-border-round\">Amazon Inspector<\/span>\n                                                <a class=\"stretched-link\" target=\"_blank\" href=\"https:\/\/aws.amazon.com\/inspector\/?nc1=h_ls\" aria-label=\"Read More\"><\/a>\n                                                                                    <\/li>\n                                                                            <li class=\"solution-item rel\" data-fos=\"fade-up\" data-fos-delay=\"150\">\n                                                                                            <div class=\"heading d-flex\">\n                                                    <div class=\"icon\">\n                                                        <svg width=\"50\" height=\"50\" viewBox=\"0 0 50 50\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n<path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M31.4031 11.5906C27.895 13.0941 23.7598 15.9631 19.8616 19.8613C15.9633 23.7596 13.0943 27.8948 11.5908 31.4029C10.8381 33.1592 10.4452 34.7177 10.4098 35.9871C10.3744 37.2541 10.6936 38.1527 11.2702 38.7293C11.8468 39.3059 12.7454 39.6251 14.0124 39.5897C15.2818 39.5543 16.8403 39.1614 18.5966 38.4087C22.1047 36.9052 26.2399 34.0362 30.1382 30.138C34.0365 26.2397 36.9054 22.1045 38.4089 18.5964C39.1616 16.8401 39.5545 15.2816 39.5899 14.0122C39.6253 12.7452 39.3061 11.8466 38.7295 11.27C38.1529 10.6934 37.2543 10.3742 35.9873 10.4096C34.7179 10.445 33.1595 10.8379 31.4031 11.5906ZM35.9408 8.74355C37.4935 8.70023 38.903 9.08644 39.908 10.0915C40.9131 11.0965 41.2993 12.506 41.256 14.0587C41.2127 15.6089 40.7428 17.3815 39.9408 19.2529C38.3348 23.0002 35.3265 27.3066 31.3167 31.3165C27.3068 35.3263 23.0004 38.3346 19.2531 39.9406C17.3818 40.7426 15.6091 41.2125 14.0589 41.2557C12.5062 41.2991 11.0967 40.9129 10.0917 39.9078C9.08665 38.9028 8.70044 37.4933 8.74376 35.9406C8.78702 34.3904 9.25689 32.6177 10.0589 30.7464C11.6649 26.9991 14.6732 22.6927 18.683 18.6828C22.6929 14.673 26.9993 11.6647 30.7466 10.0587C32.618 9.25668 34.3906 8.78681 35.9408 8.74355Z\" fill=\"#030000\"\/>\n<path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M11.5905 18.5963C13.094 22.1044 15.963 26.2396 19.8613 30.1379C23.7596 34.0362 27.8948 36.9052 31.4029 38.4086C33.1592 39.1613 34.7177 39.5542 35.9871 39.5897C37.2541 39.625 38.1527 39.3058 38.7292 38.7292C39.3058 38.1527 39.625 37.2541 39.5897 35.9871C39.5542 34.7177 39.1613 33.1592 38.4086 31.4029C36.9052 27.8948 34.0362 23.7596 30.1379 19.8613C26.2396 15.963 22.1044 13.094 18.5963 11.5905C16.84 10.8378 15.2815 10.4449 14.0121 10.4095C12.7451 10.3742 11.8465 10.6934 11.2699 11.2699C10.6934 11.8465 10.3742 12.7451 10.4095 14.0121C10.4449 15.2815 10.8378 16.84 11.5905 18.5963ZM8.74349 14.0586C8.70016 12.506 9.08637 11.0965 10.0914 10.0914C11.0965 9.08637 12.506 8.70016 14.0586 8.74349C15.6088 8.78675 17.3815 9.25662 19.2529 10.0586C23.0002 11.6646 27.3066 14.6729 31.3164 18.6828C35.3262 22.6926 38.3345 26.999 39.9405 30.7463C40.7426 32.6177 41.2124 34.3904 41.2557 35.9406C41.299 37.4932 40.9128 38.9027 39.9078 39.9078C38.9027 40.9128 37.4932 41.299 35.9406 41.2557C34.3904 41.2124 32.6177 40.7426 30.7463 39.9405C26.999 38.3345 22.6926 35.3262 18.6828 31.3164C14.6729 27.3066 11.6646 23.0002 10.0586 19.2528C9.25662 17.3815 8.78675 15.6088 8.74349 14.0586Z\" fill=\"#030000\"\/>\n<\/svg>                                                    <\/div>\n                                                    <h4>AWS Shield Standard<\/h4>\n                                                <\/div>\n                                                                                        <div class=\"text-conent\">\n                                                <p>Distributed denial of service (DDoS) attacks are managed by offering always-on detection services with automatic built-in risk mitigation functionality to minimize application downtime and latency; upgrade to Shield Advanced to defend against large scale DDoS attacks.<\/p>\n                                            <\/div>\n                                                                                    <\/li>\n                                                                            <li class=\"solution-item rel\" data-fos=\"fade-up\" data-fos-delay=\"150\">\n                                                                                            <div class=\"heading d-flex\">\n                                                    <div class=\"icon\">\n                                                        <svg width=\"50\" height=\"50\" viewBox=\"0 0 50 50\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n<path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M31.4031 11.5906C27.895 13.0941 23.7598 15.9631 19.8616 19.8613C15.9633 23.7596 13.0943 27.8948 11.5908 31.4029C10.8381 33.1592 10.4452 34.7177 10.4098 35.9871C10.3744 37.2541 10.6936 38.1527 11.2702 38.7293C11.8468 39.3059 12.7454 39.6251 14.0124 39.5897C15.2818 39.5543 16.8403 39.1614 18.5966 38.4087C22.1047 36.9052 26.2399 34.0362 30.1382 30.138C34.0365 26.2397 36.9054 22.1045 38.4089 18.5964C39.1616 16.8401 39.5545 15.2816 39.5899 14.0122C39.6253 12.7452 39.3061 11.8466 38.7295 11.27C38.1529 10.6934 37.2543 10.3742 35.9873 10.4096C34.7179 10.445 33.1595 10.8379 31.4031 11.5906ZM35.9408 8.74355C37.4935 8.70023 38.903 9.08644 39.908 10.0915C40.9131 11.0965 41.2993 12.506 41.256 14.0587C41.2127 15.6089 40.7428 17.3815 39.9408 19.2529C38.3348 23.0002 35.3265 27.3066 31.3167 31.3165C27.3068 35.3263 23.0004 38.3346 19.2531 39.9406C17.3818 40.7426 15.6091 41.2125 14.0589 41.2557C12.5062 41.2991 11.0967 40.9129 10.0917 39.9078C9.08665 38.9028 8.70044 37.4933 8.74376 35.9406C8.78702 34.3904 9.25689 32.6177 10.0589 30.7464C11.6649 26.9991 14.6732 22.6927 18.683 18.6828C22.6929 14.673 26.9993 11.6647 30.7466 10.0587C32.618 9.25668 34.3906 8.78681 35.9408 8.74355Z\" fill=\"#030000\"\/>\n<path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M11.5905 18.5963C13.094 22.1044 15.963 26.2396 19.8613 30.1379C23.7596 34.0362 27.8948 36.9052 31.4029 38.4086C33.1592 39.1613 34.7177 39.5542 35.9871 39.5897C37.2541 39.625 38.1527 39.3058 38.7292 38.7292C39.3058 38.1527 39.625 37.2541 39.5897 35.9871C39.5542 34.7177 39.1613 33.1592 38.4086 31.4029C36.9052 27.8948 34.0362 23.7596 30.1379 19.8613C26.2396 15.963 22.1044 13.094 18.5963 11.5905C16.84 10.8378 15.2815 10.4449 14.0121 10.4095C12.7451 10.3742 11.8465 10.6934 11.2699 11.2699C10.6934 11.8465 10.3742 12.7451 10.4095 14.0121C10.4449 15.2815 10.8378 16.84 11.5905 18.5963ZM8.74349 14.0586C8.70016 12.506 9.08637 11.0965 10.0914 10.0914C11.0965 9.08637 12.506 8.70016 14.0586 8.74349C15.6088 8.78675 17.3815 9.25662 19.2529 10.0586C23.0002 11.6646 27.3066 14.6729 31.3164 18.6828C35.3262 22.6926 38.3345 26.999 39.9405 30.7463C40.7426 32.6177 41.2124 34.3904 41.2557 35.9406C41.299 37.4932 40.9128 38.9027 39.9078 39.9078C38.9027 40.9128 37.4932 41.299 35.9406 41.2557C34.3904 41.2124 32.6177 40.7426 30.7463 39.9405C26.999 38.3345 22.6926 35.3262 18.6828 31.3164C14.6729 27.3066 11.6646 23.0002 10.0586 19.2528C9.25662 17.3815 8.78675 15.6088 8.74349 14.0586Z\" fill=\"#030000\"\/>\n<\/svg>                                                    <\/div>\n                                                    <h4>AWS Elastic Disaster Recovery<\/h4>\n                                                <\/div>\n                                                                                        <div class=\"text-conent\">\n                                                <p>Affordable storage services are utilized to restore on-premise and cloud-based applications while minimizing downtime and data loss through low compute time and restoring from snapshots. It can be combined and used with CloudEndure Disaster Recovery.<\/p>\n                                            <\/div>\n                                                                                            <span class=\"btn-border-round\">CloudEndure Disaster Recovery<\/span>\n                                                <a class=\"stretched-link\" target=\"_self\" href=\"https:\/\/aws.amazon.com\/disaster-recovery\/when-to-choose-aws-drs\/?nc1=h_ls&#038;cloud-endure-blogs.sort-by=item.additionalFields.createdDate&#038;cloud-endure-blogs.sort-order=desc\" aria-label=\"Read More\"><\/a>\n                                                                                    <\/li>\n                                                                    <\/ul>\n                            <\/div>\n                        <\/div>\n                                            <div class=\"row solution-categry rel\">\n                            <div class=\"col-xl-4\">\n                                <h3 class=\"solution-categry__title\" data-fos=\"fade-up\">IAM identity and access management<\/h3>\n                            <\/div>\n                            <div class=\"col-xl-8 solution__items__wrapper\">\n                                <ul class=\"solution__items\">\n                                                                            <li class=\"solution-item rel\" data-fos=\"fade-up\" data-fos-delay=\"150\">\n                                                                                        <div class=\"text-conent\">\n                                                <p>Many common data security vulnerabilities are due to misuse, theft, or internal leaks of accounts and access authorization. AWS IAM (identity &#038; access management) allows enterprise administrators to set precise access authorizations for services and data with different configurations based on the user&#8217;s role or team. <\/p>\n                                            <\/div>\n                                                                                    <\/li>\n                                                                    <\/ul>\n                            <\/div>\n                        <\/div>\n                                            <div class=\"row solution-categry rel\">\n                            <div class=\"col-xl-4\">\n                                <h3 class=\"solution-categry__title\" data-fos=\"fade-up\">Regulatory compliant services<\/h3>\n                            <\/div>\n                            <div class=\"col-xl-8 solution__items__wrapper\">\n                                <ul class=\"solution__items\">\n                                                                            <li class=\"solution-item rel\" data-fos=\"fade-up\" data-fos-delay=\"150\">\n                                                                                        <div class=\"text-conent\">\n                                                <p>In response to the regulatory compliance and audit requirements of enterprises, AWS offers many documents for multinational regulatory compliance such as: ISO 27001 for building secure cloud environments, ISO 27018 for personal data privacy protections, Germany&#8217;s C5, and GDPR. Assistance can therefore be provided to enterprises in satisfying the security and compliance standards related to finance, retail, healthcare, government, and other fields.<\/p>\n                                            <\/div>\n                                                                                    <\/li>\n                                                                            <li class=\"solution-item rel\" data-fos=\"fade-up\" data-fos-delay=\"150\">\n                                                                                            <div class=\"heading d-flex\">\n                                                    <div class=\"icon\">\n                                                        <svg width=\"50\" height=\"50\" viewBox=\"0 0 50 50\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n<path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M31.4031 11.5906C27.895 13.0941 23.7598 15.9631 19.8616 19.8613C15.9633 23.7596 13.0943 27.8948 11.5908 31.4029C10.8381 33.1592 10.4452 34.7177 10.4098 35.9871C10.3744 37.2541 10.6936 38.1527 11.2702 38.7293C11.8468 39.3059 12.7454 39.6251 14.0124 39.5897C15.2818 39.5543 16.8403 39.1614 18.5966 38.4087C22.1047 36.9052 26.2399 34.0362 30.1382 30.138C34.0365 26.2397 36.9054 22.1045 38.4089 18.5964C39.1616 16.8401 39.5545 15.2816 39.5899 14.0122C39.6253 12.7452 39.3061 11.8466 38.7295 11.27C38.1529 10.6934 37.2543 10.3742 35.9873 10.4096C34.7179 10.445 33.1595 10.8379 31.4031 11.5906ZM35.9408 8.74355C37.4935 8.70023 38.903 9.08644 39.908 10.0915C40.9131 11.0965 41.2993 12.506 41.256 14.0587C41.2127 15.6089 40.7428 17.3815 39.9408 19.2529C38.3348 23.0002 35.3265 27.3066 31.3167 31.3165C27.3068 35.3263 23.0004 38.3346 19.2531 39.9406C17.3818 40.7426 15.6091 41.2125 14.0589 41.2557C12.5062 41.2991 11.0967 40.9129 10.0917 39.9078C9.08665 38.9028 8.70044 37.4933 8.74376 35.9406C8.78702 34.3904 9.25689 32.6177 10.0589 30.7464C11.6649 26.9991 14.6732 22.6927 18.683 18.6828C22.6929 14.673 26.9993 11.6647 30.7466 10.0587C32.618 9.25668 34.3906 8.78681 35.9408 8.74355Z\" fill=\"#030000\"\/>\n<path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M11.5905 18.5963C13.094 22.1044 15.963 26.2396 19.8613 30.1379C23.7596 34.0362 27.8948 36.9052 31.4029 38.4086C33.1592 39.1613 34.7177 39.5542 35.9871 39.5897C37.2541 39.625 38.1527 39.3058 38.7292 38.7292C39.3058 38.1527 39.625 37.2541 39.5897 35.9871C39.5542 34.7177 39.1613 33.1592 38.4086 31.4029C36.9052 27.8948 34.0362 23.7596 30.1379 19.8613C26.2396 15.963 22.1044 13.094 18.5963 11.5905C16.84 10.8378 15.2815 10.4449 14.0121 10.4095C12.7451 10.3742 11.8465 10.6934 11.2699 11.2699C10.6934 11.8465 10.3742 12.7451 10.4095 14.0121C10.4449 15.2815 10.8378 16.84 11.5905 18.5963ZM8.74349 14.0586C8.70016 12.506 9.08637 11.0965 10.0914 10.0914C11.0965 9.08637 12.506 8.70016 14.0586 8.74349C15.6088 8.78675 17.3815 9.25662 19.2529 10.0586C23.0002 11.6646 27.3066 14.6729 31.3164 18.6828C35.3262 22.6926 38.3345 26.999 39.9405 30.7463C40.7426 32.6177 41.2124 34.3904 41.2557 35.9406C41.299 37.4932 40.9128 38.9027 39.9078 39.9078C38.9027 40.9128 37.4932 41.299 35.9406 41.2557C34.3904 41.2124 32.6177 40.7426 30.7463 39.9405C26.999 38.3345 22.6926 35.3262 18.6828 31.3164C14.6729 27.3066 11.6646 23.0002 10.0586 19.2528C9.25662 17.3815 8.78675 15.6088 8.74349 14.0586Z\" fill=\"#030000\"\/>\n<\/svg>                                                    <\/div>\n                                                    <h4>AWS Artifact<\/h4>\n                                                <\/div>\n                                                                                        <div class=\"text-conent\">\n                                                <p>Freely access AWS security and regulatory compliance reports and select online protocols. This includes service organization controls (SOC) and payment card industry (PCI) reports provided by regulatory compliant and certified institutions in all geographic locations to verify that AWS has effectively implemented and operates security controls.<\/p>\n                                            <\/div>\n                                                                                            <span class=\"btn-border-round\">AWS Artifact<\/span>\n                                                <a class=\"stretched-link\" target=\"_self\" href=\"https:\/\/aws.amazon.com\/artifact\/?nc1=h_ls\" aria-label=\"Read More\"><\/a>\n                                                                                    <\/li>\n                                                                    <\/ul>\n                            <\/div>\n                        <\/div>\n                                    <\/div>\n            <\/div>\n            <div class=\"col-md-2 solutions__bg-wrapper order-md-first\" data-fos>\n                <div class=\"solutions__bg object-fit-image-wrapper\">\n                    <img decoding=\"async\" width=\"768\" height=\"433\" src=\"https:\/\/s3.ap-northeast-1.amazonaws.com\/website-image.bucket\/live\/wp-content\/uploads\/2020\/11\/img_aws_security-1-768x433.jpg\" class=\"attachment-medium_large size-medium_large\" alt=\"\u535a\u5f18\u96f2\u7aef\u70ba\u60a8\u628a\u95dcAWS\u96f2\u7aef\u8cc7\u8a0a\u5b89\u5168\" srcset=\"https:\/\/s3.ap-northeast-1.amazonaws.com\/website-image.bucket\/live\/wp-content\/uploads\/2020\/11\/img_aws_security-1-768x433.jpg 768w, https:\/\/s3.ap-northeast-1.amazonaws.com\/website-image.bucket\/live\/wp-content\/uploads\/2020\/11\/img_aws_security-1-300x169.jpg 300w, https:\/\/s3.ap-northeast-1.amazonaws.com\/website-image.bucket\/live\/wp-content\/uploads\/2020\/11\/img_aws_security-1-1024x577.jpg 1024w, https:\/\/s3.ap-northeast-1.amazonaws.com\/website-image.bucket\/live\/wp-content\/uploads\/2020\/11\/img_aws_security-1.jpg 1065w\" sizes=\"(max-width: 768px) 100vw, 768px\" \/>                <\/div>\n            <\/div>\n        <\/div>\n    <\/div>\n<\/div>\n<div class=\"editor-content container\">\n    <div class=\"row justify-content-center\">\n        <div class=\"col col-sm-10 col-lg-9 col-xl-8\">\n            <div class=\"article-content\"><\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"editor-content block custom-block block-case-studies bg-grey over-hidden padding-xsmall\" id=\"case\">\n    <div class=\"container component__case-studies rel\">\n    <div class=\"row\">\n        <div class=\"col-lg-11 offset-lg-1\">\n                        <div class=\"d-flex flex-wrap flex-column flex-sm-row justify-content-sm-between align-items-sm-end component__case-studies__heading\" data-fos=\"fade-up\">\n                <h2 class=\"module-title mb-0\">Success Stories from Customers<\/h2>\n                <a class=\"btn-arrow\" href=\"https:\/\/www.nextlink.cloud\/en\/customer-stories\/\">More Stories<span class=\"btn-arrow-effect\"><\/span><\/a>\n            <\/div>\n            <div class=\"case-studies-slider swiper\" data-fos=\"fade-up\">\n                <div class=\"swiper-wrapper\">\n                    <div class=\"swiper-slide\"><div class=\"case-study-item hover-img-zoom-in rel\">\n    <div class=\"case-study-item__img cover-img object-fit-image-wrapper\">\n        <img decoding=\"async\" width=\"768\" height=\"320\" src=\"https:\/\/s3.ap-northeast-1.amazonaws.com\/website-image.bucket\/live\/wp-content\/uploads\/2021\/01\/Plaza-Premium-768x320.jpg\" class=\"attachment-medium_large size-medium_large wp-post-image\" alt=\"Plaza Premium\" srcset=\"https:\/\/s3.ap-northeast-1.amazonaws.com\/website-image.bucket\/live\/wp-content\/uploads\/2021\/01\/Plaza-Premium-768x320.jpg 768w, https:\/\/s3.ap-northeast-1.amazonaws.com\/website-image.bucket\/live\/wp-content\/uploads\/2021\/01\/Plaza-Premium-300x125.jpg 300w, https:\/\/s3.ap-northeast-1.amazonaws.com\/website-image.bucket\/live\/wp-content\/uploads\/2021\/01\/Plaza-Premium-1024x427.jpg 1024w, https:\/\/s3.ap-northeast-1.amazonaws.com\/website-image.bucket\/live\/wp-content\/uploads\/2021\/01\/Plaza-Premium-1536x640.jpg 1536w, https:\/\/s3.ap-northeast-1.amazonaws.com\/website-image.bucket\/live\/wp-content\/uploads\/2021\/01\/Plaza-Premium.jpg 1920w\" sizes=\"(max-width: 768px) 100vw, 768px\" \/>    <\/div>\n    <div class=\"case-study-item__content d-flex flex-column h-100 align-items-start\">\n        <h3 class=\"title h4\">Plaza Premium<\/h3>\n        <div class=\"description\">\n            <p>Architecture diagram Nextlink assisted Plaza Premium in migrating workloads to AWS with high scalability and security, and improved the reliability of the AWS system architecture by 20% and reduced costs by 50%. With AWS information security best practices, Nextlink has strengthened the five aspects of security for Plaza Premium, and greatly improved the security protection. [&hellip;]<\/p>\n        <\/div>\n        <div class=\"button\">\n            <span class=\"btn-border-round\">Read More<\/span>\n        <\/div>\n    <\/div>\n    <a class=\"stretched-link\" href=\"https:\/\/www.nextlink.cloud\/en\/customer-story\/plaza-premium\/\" aria-label=\"Go to customer story\"><\/a>\n<\/div><\/div><div class=\"swiper-slide\"><div class=\"case-study-item hover-img-zoom-in rel\">\n    <div class=\"case-study-item__img cover-img object-fit-image-wrapper\">\n        <img decoding=\"async\" width=\"768\" height=\"375\" src=\"https:\/\/s3.ap-northeast-1.amazonaws.com\/website-image.bucket\/live\/wp-content\/uploads\/2020\/05\/nuvoton01-768x375.jpg\" class=\"attachment-medium_large size-medium_large wp-post-image\" alt=\"\u65b0\u5510\u79d1\u6280\u70ba\u534a\u5c0e\u9ad4\u7522\u696d\u63d0\u4f9b\u5275\u65b0\u89e3\u6c7a\u65b9\u6848\" srcset=\"https:\/\/s3.ap-northeast-1.amazonaws.com\/website-image.bucket\/live\/wp-content\/uploads\/2020\/05\/nuvoton01-768x375.jpg 768w, https:\/\/s3.ap-northeast-1.amazonaws.com\/website-image.bucket\/live\/wp-content\/uploads\/2020\/05\/nuvoton01-300x146.jpg 300w, https:\/\/s3.ap-northeast-1.amazonaws.com\/website-image.bucket\/live\/wp-content\/uploads\/2020\/05\/nuvoton01-1024x500.jpg 1024w, https:\/\/s3.ap-northeast-1.amazonaws.com\/website-image.bucket\/live\/wp-content\/uploads\/2020\/05\/nuvoton01-1536x750.jpg 1536w, https:\/\/s3.ap-northeast-1.amazonaws.com\/website-image.bucket\/live\/wp-content\/uploads\/2020\/05\/nuvoton01.jpg 1920w\" sizes=\"(max-width: 768px) 100vw, 768px\" \/>    <\/div>\n    <div class=\"case-study-item__content d-flex flex-column h-100 align-items-start\">\n        <h3 class=\"title h4\">Nuvoton<\/h3>\n        <div class=\"description\">\n            <p>Nextlink made the most suitable AWS architecture for us to expand our new market.<\/p>\n        <\/div>\n        <div class=\"button\">\n            <span class=\"btn-border-round\">Read More<\/span>\n        <\/div>\n    <\/div>\n    <a class=\"stretched-link\" href=\"https:\/\/www.nextlink.cloud\/en\/customer-story\/customerstories-nuvoton\/\" aria-label=\"Go to customer story\"><\/a>\n<\/div><\/div>                <\/div>\n            <\/div>\n            <div class=\"slider-control\" data-fos=\"fade-up\">\n                <button class=\"btn-prev\" aria-label=\"Prev\" type=\"button\"><\/button>\n                <div class=\"pagination-number order-md-last\"><\/div>\n                <button class=\"btn-next\" aria-label=\"Next\" type=\"button\"><\/button>\n            <\/div>\n        <\/div>\n    <\/div>\n<\/div><\/div>\n<div class=\"editor-content container\">\n    <div class=\"row justify-content-center\">\n        <div class=\"col col-sm-10 col-lg-9 col-xl-8\">\n            <div class=\"article-content\">","protected":false},"excerpt":{"rendered":"<p>Data security is a priority for any cloud service. Nextlink Technology&#8217;s data security protects enterprise clouds according to the 5 major aspects of AWS. We work with data security partners to offer a range of enterprise solutions with comprehensive protections for all environments.<\/p>\n","protected":false},"template":"","class_list":["post-56762","aws_service","type-aws_service","status-publish","has-post-thumbnail","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.nextlink.cloud\/en\/wp-json\/wp\/v2\/aws_service\/56762","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.nextlink.cloud\/en\/wp-json\/wp\/v2\/aws_service"}],"about":[{"href":"https:\/\/www.nextlink.cloud\/en\/wp-json\/wp\/v2\/types\/aws_service"}],"version-history":[{"count":1,"href":"https:\/\/www.nextlink.cloud\/en\/wp-json\/wp\/v2\/aws_service\/56762\/revisions"}],"predecessor-version":[{"id":61861,"href":"https:\/\/www.nextlink.cloud\/en\/wp-json\/wp\/v2\/aws_service\/56762\/revisions\/61861"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.nextlink.cloud\/en\/wp-json\/wp\/v2\/media\/41102"}],"wp:attachment":[{"href":"https:\/\/www.nextlink.cloud\/en\/wp-json\/wp\/v2\/media?parent=56762"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}