Sign in
Categories
Your Saved List Become a Channel Partner Sell in AWS Marketplace Amazon Web Services Home Help

Security (4654 results) showing 2401 - 2410



BlueVoyant's Accelerator Services are designed to be hands-on services that include onboarding and baseline configuration for the BlueVoyant MDR for both Splunk Cloud and Splunk Enterprise Platforms. The services are delivered by BlueVoyant Professional Services Consultants specializing in...


When you transfer your critical data to a SaaS vendor, you want to be sure that in the event of a major technical failure or if they cease operations that you have continued access to your data. In the situation where the SaaS vendor is hosting the software application within public cloud such as...


Starting from $0.00 to $0.00/hr for software + AWS usage fees

Privacy DAM is an API-based access control and monitoring tool for databases to protect the use of highly valuable and delicate data like personal data. By introducing Privacy DAM, you can check and manage all access to certain DB system or tables at a glance. You can generate and register all...

Linux/Unix, Ubuntu 22.04 LTS - 64-bit Amazon Machine Image (AMI)


Starting from $6.14/hr or from $35,995.00/yr (33% savings) for software + AWS usage fees

What's Included Note: Always ensure your operating system is current for your needs. This product includes both of the software packages described below: Endpoint Central | Endpoint management solution By: ZOHO Corporation A unified endpoint management software that enables patch management, asset...

Windows, Windows Server 2019 Base 2022.02.02 - 64-bit Amazon Machine Image (AMI)


Starting from $0.00/hr or from $0.00/yr (up to 57% savings) for software + AWS usage fees

This is a repackaged software wherein additional charges apply for extended support with a 24 hour response time. CockroachDB is a distributed SQL database built on a transactional and strongly-consistent key-value store. It scales horizontally; survives disk, machine, rack, and even datacenter...

Linux/Unix, Ubuntu 20 - 64-bit Amazon Machine Image (AMI)


Starting from $0.02/hr or from $150.00/yr (14% savings) for software + AWS usage fees

The ACSC Information Security Manual (ISM) provides guidelines and controls to protect Australian government information and systems from cyber threats. It outlines security measures that organizations must implement to secure their information assets, including risk management, access control, and...

Linux/Unix, CentOS 9 - 64-bit Amazon Machine Image (AMI)


Key Features: Comprehensive Security Checks: We conduct a thorough review of your AWS security, identifying key improvement areas and delivering a customised suggestions report. Our objective is to leverage various frameworks to recommend enhancements, aiming to strengthen your cloud...


Starting from $0.02/hr or from $150.00/yr (14% savings) for software + AWS usage fees

The ACSC Information Security Manual (ISM) provides guidelines and controls to protect Australian government information and systems from cyber threats. It outlines security measures that organizations must implement to secure their information assets, including risk management, access control, and...

Linux/Unix, CentOS 9 - 64-bit Amazon Machine Image (AMI)


In recent years, Distributed Denial of Service (DDoS) attacks have evolved to become more prevalent and sophisticated. DDoS attacks involve a multitude of systems on the Internet attacking a single target simultaneously to overload and prevent some or all legitimate requests from being serviced....


The service provide a true next generation end point protection, detection and response, thanks to an experienced security team and one of the best technology as EDR, CrowdStrike. Using the CrowdStrike platform underneath, the service protects customers against advanced cyberattacks using...