Sign in
Categories
Your Saved List Become a Channel Partner Sell in AWS Marketplace Amazon Web Services Home Help

Security (4652 results) showing 2021 - 2030



Starting from $0.00/hr or from $0.00/yr (14% savings) for software + AWS usage fees

The NIST compliance framework, developed by the National Institute of Standards and Technology, is a set of guidelines, standards, and best practices that organizations can follow to manage and mitigate cybersecurity risks. It is widely recognized as a best practice for organizations looking to...

Linux/Unix, Amazon Linux 2 - 64-bit Amazon Machine Image (AMI)


Starting from $0.10 to $0.10/hr for software + AWS usage fees

Certifient Guardian is a secure gateway that safeguards sensitive email messages by scanning your email for compliance, and performing policy-based actions.

Windows, Windows Server 2022 Base Windows Server 2022 - 64-bit Amazon Machine Image (AMI)


"This Telos Software combines the benefits of the Private Offer feature along with Carahsoft's contract vehicles in providing customers a seamless acquisition process for their cloud-based products and solutions from AWS Marketplace. Xacta 360 is the premier SaaS solution for IT risk and...

  • Version NeuVector Prime 5.3.3
  • By SUSE

NeuVector Prime is a 100% open-source Kubernetes container security platform built for enterprise-grade environments and offered by SUSE. Supported by SUSE dedicated security specialists and a strong community of users, NeuVector Prime provides full lifecycle container security from build,...


Starting from $0.05/hr or from $400.00/yr (9% savings) for software + AWS usage fees

This is a repackaged software product wherein additional charges apply for seller hardening and maintenance support. Hardened Images Oracle Linux 8 is meticulously designed to meet the rigorous Security Technical Implementation Guide (STIG) compliance standards. Our hardened virtual machines ensure...

Linux/Unix, Other 8 - 64-bit Amazon Machine Image (AMI)


Backslash's fusion of Static Application Security Testing (SAST) and Software Composition Analysis (SCA) is designed to enhance your security posture through risk-based vulnerability management. By identifying authentic attack paths leading to reachable code, Backslash empowers you to focus on...


Penetration testing services of Android and iOS based mobile applications is performed in order to identify vulnerabilities in both the mobile application client and the backend application programming interfaces (API). Utilizing highly-customized Android and iOS devices to interact with the target...


As you shift your applications to new infrastructures, you need a solution that can protect all your data on-premises as well as in the cloud. Fortanix Data Security Manager is a unified Key Management, Tokenization, and Secrets management solution. Fortanix protects sensitive data across public,...


Well-Architected Review provides a set of best practices to implement and fix the issues based on the five pillars of security, operational excellence, performance efficiency, reliability, and cost optimization. We as an authorized AWS Well-Architected Review Partner, offers expertise in conducting...