Connect with us

Hi, what are you looking for?


Cloud Security

AWS Provides Secure Access to Internal Assets With Amazon WorkLink

Amazon Web Services (AWS) on Wednesday announced the launch of Amazon WorkLink, a service that enables organizations to provide employees easy and secure access to internal websites and applications from their mobile devices without the need for a VPN or custom browser.

Amazon Web Services (AWS) on Wednesday announced the launch of Amazon WorkLink, a service that enables organizations to provide employees easy and secure access to internal websites and applications from their mobile devices without the need for a VPN or custom browser.

When employees install Amazon WorkLink on their mobile devices, they can access their company’s internal assets from the existing browser. On the administration side, WorkLink allows IT admins to select what content they want to make available to employees.

AWS launches Amazon WorkLinkBehind the scenes, when a user attempts to access a corporate website through WorkLink, the requested page is first rendered in a secure container in AWS. The content is then sent from this container to the employee’s device, which eliminates the need to store or cache content locally and to directly access the corporate network.

Using WorkLink also eliminates the need to use sophisticated mobile device management (MDM) solutions and maintain complex infrastructure to provide secure access to internal assets, AWS says.

According to AWS, WorkLink delivers webpages to mobile devices as a fully interactive simple vector graphics (SVG) graphical representation. This means that users can interact with the page as they normally would, but less bandwidth is needed and, since no content is stored on the device, there is no need to remotely wipe it in case it gets lost or stolen.

“At the end of the session, the ephemeral cloud-based web browser disappears, ensuring corporate content only resides within the customer’s network. Because Amazon WorkLink is fully managed, it removes the heavy lifting of software and infrastructure deployment, capacity planning, and scaling, as well as the need for custom browser updates,” AWS explained. “With Amazon WorkLink, mobile devices never connect directly to the corporate network, narrowing the path for device-based malware to reach enterprise resources behind the corporate firewall.”

WorkLink is immediately available in North America and Europe, but AWS expects to expand to other regions over the next year. The service costs $5 per active user per month and can be configured from the AWS Management Console. The iOS app is already available in the Apple App Store and the Android version will be published to Google Play in a few weeks.

The service is powered by Okta and Ping identity solutions, and it works with Safari, with Chrome support expected in the upcoming weeks.

Advertisement. Scroll to continue reading.

Several companies have already been using Amazon WorkLink, including Intuit, Unisys, Oak Hill Advisors, Brillio, Privo, 8K Miles, and Eplexity.

Related: AWS Security Hub Aggregates Alerts From Third-Party Tools

Related: AWS Adds New Feature for Preventing Data Leaks

Related: AWS Launches New Tools for Firewalls, Certificates, Credentials

Written By

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

SecurityWeek’s Threat Detection and Incident Response Summit brings together security practitioners from around the world to share war stories on breaches, APT attacks and threat intelligence.


Securityweek’s CISO Forum will address issues and challenges that are top of mind for today’s security leaders and what the future looks like as chief defenders of the enterprise.


Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Data Protection

The cryptopocalypse is the point at which quantum computing becomes powerful enough to use Shor’s algorithm to crack PKI encryption.

Artificial Intelligence

The CRYSTALS-Kyber public-key encryption and key encapsulation mechanism recommended by NIST for post-quantum cryptography has been broken using AI combined with side channel attacks.

Identity & Access

Zero trust is not a replacement for identity and access management (IAM), but is the extension of IAM principles from people to everyone and...

Artificial Intelligence

ChatGPT is increasingly integrated into cybersecurity products and services as the industry is testing its capabilities and limitations.

Mobile & Wireless

Infonetics Research has shared excerpts from its Mobile Device Security Client Software market size and forecasts report, which tracks enterprise and consumer security client...

Network Security

Attack surface management is nothing short of a complete methodology for providing effective cybersecurity. It doesn’t seek to protect everything, but concentrates on areas...

Identity & Access

Hackers rarely hack in anymore. They log in using stolen, weak, default, or otherwise compromised credentials. That’s why it’s so critical to break the...