Sign in
Categories
Your Saved List Become a Channel Partner Sell in AWS Marketplace Amazon Web Services Home Help

Security (4506 results) showing 2771 - 2780



Starting from $0.02/hr or from $150.00/yr (14% savings) for software + AWS usage fees

The ACSC Essential Eight is a set of strategies to mitigate cybersecurity incidents, created by the Australian Cyber Security Centre. These strategies are designed to help organizations protect their systems against a wide range of cyber threats. Compliance with the ACSC Essential Eight is crucial...

Linux/Unix, Red Hat Enterprise Linux 8 - 64-bit Amazon Machine Image (AMI)


Achieving cyber resiliency is the gold standard for security programs. Organizations need a diversified approach that combines proactive and responsive strategies, including Incident Response support. This helps organizations without sufficient in-house expertise, and it reduces the time...


Your Solution + InfusionPoints Dedicated Advisor = Accelerated and Expanded Market Path InfusionPoints Dedicated Advisor augments your team by providing access to experienced Advisory and Engineering resources who are available to provide project management, gap analysis, documentation...


Multi-cloud and multi-runtime connectivity for distributed applications: choose any technology or cloud provider best suited for your applications to meet performance, reliability, and security objectives-while accelerating application modernization and multi-cloud initiatives. For custom pricing,...

Free Trial

  • Version 21.1.1 20230523
  • By Kurian

Starting from $0.00 to $0.05/hr for software + AWS usage fees

This is a repackaged open source software product wherein additional charges apply for patching the operating system and the maintenance provided by Kurian. Keycloak is an open-source identity and access management (IAM) solution that offers centralized authentication, authorization, and user...

Linux/Unix, Ubuntu 20.04 - 64-bit Amazon Machine Image (AMI)


Quaxar suggests optimal services for dealing with external threats. 1. Customized analysis and solution suggestions considering clients' situations and operating systems. 2. Unrivaled quantity and quality of external threat intelligence. 3. Create an external threat information database with its...


This is a repackaged software product that includes the installation and configuration of python which is a high-level, interpreted, general-purpose programming language. Its design philosophy emphasizes code readability with the use of significant indentation.Python is dynamically-typed and...

Linux/Unix, Ubuntu 22.04 - 64-bit Amazon Machine Image (AMI)


Zilla Security delivers an identity security solution focused on comprehensive security and compliance that is automated and easy to use. The platform combines identity governance with cloud security to deliver access visibility, compliance reviews, user lifecycle management, segregation of duties,...