Sign in
Categories
Your Saved List Become a Channel Partner Sell in AWS Marketplace Amazon Web Services Home Help

Security (4506 results) showing 2091 - 2100



Starting from $0.20/hr or from $1,226.40/yr (30% savings) for software + AWS usage fees

Zilla Plus is an enterprise-ready, Kafka-native edge, and service proxy. It is a flexible, secure, and reliable way of creating stateless, multi-protocol API entry points into your Redpanda cluster for both native and non-native Kafka clients. With Zilla Plus, you can also expose topics inside...

Linux/Unix, Amazon Linux 2023.3.20240108.1 - 64-bit Amazon Machine Image (AMI)


The Security Posture Assessment (SPA) is a both a business and technical based review of your companies security policies, processes and architecture including a cloud migration readiness assessment. Our primary goal is to help your organisation improve both your security and operational efficiency...


Adarma is a Splunk Professional Services partner that helps align IT strategy with business strategy. Our team of certified Splunk consultants work closely with clients to advise on complex or bespoke technical requirements and maximize ROI of their Splunk investment. Adarma enables clients to...

Free Trial


Starting from $0.00/hr or from $0.00/yr (100% savings) for software + AWS usage fees

This is a repackaged open source software product wherein additional charges apply for support provided by Galaxys. Experience seamless web server deployment with Httpd on Ubuntu 20.04, supported by Galaxys. This pre-configured Amazon Machine Image (AMI) combines the power of the Apache HTTP Server...

Linux/Unix, Ubuntu ubuntu20.04 - 64-bit Amazon Machine Image (AMI)


D’Amo is a cloud encryption solution that provides excellent encryption performance in various cloud system environments, focusing on D’Amo KMS for Cloud, a cloud encryption key management solution. D'Amo can be deployed on AWS Cloud to provide Data Encryption for servers and endpoints. It...


Starting from $0.02/hr or from $150.00/yr (14% savings) for software + AWS usage fees

The ACSC Information Security Manual (ISM) provides guidelines and controls to protect Australian government information and systems from cyber threats. It outlines security measures that organizations must implement to secure their information assets, including risk management, access control, and...

Linux/Unix, Red Hat Enterprise Linux 9 - 64-bit Amazon Machine Image (AMI)


ASSESSMENT, TESTING, AND OTHER SECURITY REQUIREMENTS BDO has been accredited by the PCI Security Standards Council (SSC) as a Qualified Security Assessor (QSA) company. To comply with PCI requirements, our Advisory Services team helps our clients navigate the PCI framework and provides PCI and IT...


Get ahead of the most common cause of cloud data breaches with our Cloud Security HealthCheck. Misconfigurations happen constantly and might expose your data to unnecessary risks, which is why it is important to get clarity of potential issues as soon as possible. Our Cloud Security HealthCheck is...