Sign in
Categories
Your Saved List Become a Channel Partner Sell in AWS Marketplace Amazon Web Services Home Help

Security (4650 results) showing 1981 - 1990



Topics covered in this course include: Setting Up the BIG-IP System Traffic Processing with Local Traffic Manager (LTM) Using NATs and SNATs Using the Traffic Management Shell (TMSH) Monitoring Application Health Modifying Traffic Behavior with Profiles Modifying Traffic Behavior with Persistence...


The security assessment is a point in time snapshot of your AWS cloud infrastructure posture, which provides you insight to your environment security. The assessment is conducted by querying your environment’s infrastructure using AWS management read-only APIs. In addition to assessing...


Vorlon empowers security teams to detect, investigate and respond to third-party application risks. Our solution facilitates risk profiling of apps, delivers visibility, and enables continuous discovery and monitoring of third-party applications and data in motion. After purchasing our product, a...


Starting from $0.11/hr or from $850.00/yr (15% savings) for software + AWS usage fees

PHP with Apache on Alma Linux 8 from Zend by Perforce provides a turnkey solution for running PHP in the cloud. This supported PHP runtime includes the option to install any of PHP 7.2, 7.3, 7.4, 8.0, 8.1, 8.2, or 8.3, and can scale seamlessly across your cloud resources. ZendPHP gives PHP...

Linux/Unix, Other 8 - 64-bit Amazon Machine Image (AMI)


We offer you a reliable solution with high security for receiving and sending files both inside a company and outside for communicating with other entities. SOFiE will significantly increase the protection to a level very difficult to achieve when using other file exchange solutions, like e-mail or...

Linux/Unix, Red Hat Enterprise Linux 8 - 64-bit Amazon Machine Image (AMI)


Starting from $0.02/hr or from $150.00/yr (14% savings) for software + AWS usage fees

The Defense Information Systems Agency Security Technical Implementation Guides (DISA STIG) provide a comprehensive set of guidelines for securing information systems and software used by the U.S. Department of Defense. Compliance with DISA STIG ensures that systems are equipped with robust...

Linux/Unix, Other 9 - 64-bit Amazon Machine Image (AMI)


Why CheckPoint? Many vendors and cloud provider offer their own product in terms of VPN gateways, so a valid question is: why should we use CheckPoint CloudGuard for our remote access VPN users? CheckPoint offers a broad set of features within the CloudGuard Gateway, which is simply a virtual...