InfusionPoints’ First APN TV video is Live! | InfusionPoints Skip to main content
APN_FirstVideo

InfusionPoints’ First APN TV video is Live!

As an AWS Advanced Consulting Partner and Public Sector Partner, InfusionPoints makes use of the highly innovative features of the AWS platform to deliver a highly available and secure customer experience. InfusionPoints provides AWS expertise from highly trained and certified AWS experts to deploy cloud solutions. 

In January of 2020, Amazon Web Services launched their AWS Partner Network TV (APN TV) to provide videos to AWS customers that will aid them in their cloud knowledge, offerings, and sharpen their skills.  Since its launch, InfusionPoints has been eager to add video content to this channel.  As of today, April 6th, 2021, InfusionPoints has launched its first video on APN TV!  In this video, InfusionPoints discusses the hot topic of database vulnerability scanning within their FedRAMP in FIVE video series.  

InfusionPoints will continue to add helpful video content to APN TV and looks forward to this fantastic opportunity provided by Amazon Web Services to help the cloud community.  

The Video Can be Viewed Here: 

https://pages.awscloud.com/apn-tv-other-ep-153.html

Here Is a Link to Our Partner Profile on AWS: 

https://partners.amazonaws.com/partners/0010L00001kYE8nQAG/InfusionPoints 

About the Video 

Jason Shropshire, COO for InfusionPoints, explains how Database Vulnerability Scanning is an important part of obtaining and keeping a FedRAMP ATO. There are nuances that can complicate things such as FedRAMP requiring three types of scanning: Infrastructure, Web App, and Database. This video will answer common questions relating to Database Vulnerability Scanning. 

About InfusionPoints 

InfusionPoints is your independent trusted partner dedicated to building your secure and compliant business solutions and protecting your information. We are a strategy and technology security consulting firm that is comprised of experienced security professionals who take an independent approach to infuse security and privacy into your people, process, and technology. 

Authors Name