Sign in
Categories
Your Saved List Become a Channel Partner Sell in AWS Marketplace Amazon Web Services Home Help

Security (4650 results) showing 2511 - 2520



Relying on our expertise and our cloud security experiences acquired with clients in all business sectors, we will co-parameter and deploy scalable solutions covering broad IT scopes that help you proactively and continuously monitor the level of compliance and security of your Cloud and CI/CD...


Our Serverless AMI Bakery Accelerator (SABA) is a great starting point to simplify and secure the process of maintaining and deploying Amazon Machine Images (AMIs). What used to be a time consuming, error prone manual process that resulted in inconsistent security across AWS environments is now...


For businesses at every stage of the cloud adoption process, there are two major steps that change how your business works. The first is getting your environment running on the cloud. The second is ensuring that your business is getting the most value out of the cloud. For many IT departments,...

Free Trial


Oort Identity Security is a threat detection and automation platform purpose-built for enterprise identity security. It integrates with your existing ecosystem of tools (IAM, HCM, ITSM, Chat) to investigate users, measure compliance, and automate fixes to common IAM issues With Oort, you can reduce...


Starting from $0.02/hr or from $150.00/yr (14% savings) for software + AWS usage fees

The Defense Information Systems Agency Security Technical Implementation Guides (DISA STIG) provide a comprehensive set of guidelines for securing information systems and software used by the U.S. Department of Defense. Compliance with DISA STIG ensures that systems are equipped with robust...

Linux/Unix, Red Hat Enterprise Linux 9 - 64-bit Amazon Machine Image (AMI)


Design and architecture We provide cloud security architecture design based on best practices and customized for your cloud environments. We can enable you to: Maintain and measure compliance across the entire state Uphold a consistent security posture in AWS cloud Cloud security and networking...


Description: Security threats are real for everyone, while large enterprise companies often have full teams tasked with monitoring this, Evoque Cloud Engineering powered by Evoque Cloud Engineering powered by Foghorn can bring the peace of mind any CIO seeks in the fast and cost effective manner...


NetApp Private Offer Only combines the benefits of the Private Offer feature along with Carahsoft's contract vehicles in providing customers a seamless acquisition process for their cloud-based products and solutions from AWS Marketplace. NetApp Cloud Insights Premium Edition gives comprehensive...


Starting from $0.02/hr or from $150.00/yr (14% savings) for software + AWS usage fees

The National Cryptologic Center (CCN) Advanced Level compliance provides a framework for implementing high-level security measures to protect information systems from sophisticated cyber threats. This compliance is essential for organizations that handle sensitive information and require advanced...

Linux/Unix, Red Hat Enterprise Linux 9 - 64-bit Amazon Machine Image (AMI)


PHP with NGINX on RHEL 9 (BYOL) from Zend by Perforce provides a turnkey solution for running PHP in the cloud. This supported PHP runtime includes the option to install any of PHP 7.2, 7.3, 7.4, 8.0, 8.1, 8.2, or 8.3, and can scale seamlessly across your cloud resources. ZendPHP gives PHP...

Linux/Unix, Red Hat Enterprise Linux 9 - 64-bit Amazon Machine Image (AMI)