Sign in
Categories
Your Saved List Become a Channel Partner Sell in AWS Marketplace Amazon Web Services Home Help

Security (4645 results) showing 2901 - 2910



PHP with Apache on Amazon Linux 2 (BYOL) from Zend by Perforce provides a turnkey solution for running PHP in the cloud. This supported PHP runtime includes the option to install any of PHP 7.2, 7.3, 7.4, 8.0, 8.1, 8.2, or 8.3, and can scale seamlessly across your cloud resources. ZendPHP gives PHP...

Linux/Unix, Amazon Linux 2 - 64-bit Amazon Machine Image (AMI)


DFIR - Digital Forensic and Incident Response (AKA CSIRT – CyberSecurity Incident Response Team) provides technical support in resolution of confirmed computer security incidents. Computer/Mobile security incident must fulfil all below characteristics: Adverse or negative act against...


Certain businesses and organizations are required to be certified many times within many frameworks, depending on their niche and the markets they enter. The more certifications needed, the harder it is to meet compliance standards. Digital Edge is an acknowledged expert in various compliance...


Accelerate your SOC 2 compliance journey with the leading provider of SOC 2 reports worldwide. Leveraging A-LIGN’s partnerhship with Vanta's compliance software solution, and network of expert compliance partners you can have the most efficient audit experience, from readiness to report, built by...


TeraVM is a family of products from VIAVI Solutions that enables network equipment manufacturers and service providers to efficiently test mobile RAN and Core Network elements at scale, with its fully virtualized architecture TeraVM runs on x86 Commercial Off The Shelf (COTS) hardware or in the...

Linux/Unix, Ubuntu 18.04 - 64-bit Amazon Machine Image (AMI)


NTT CISO Advisory Services are designed to help organizations of all sizes and in all sectors address their specific and unique security challenges. The service provides organizations with experienced senior consultants whose duties range from overseeing governance, risk and compliance (GRC)...


FilingBox MEGA protects data not only from ransomware but also from data breach malware. It provides a real file to the pre-registered applications and a fake file with a read-only attribute to the unregistered application. It does not allow any application to create, read, modify, or delete a file...

Linux/Unix, CentOS 7 - 64-bit Amazon Machine Image (AMI)


We stop advanced cyber threats, eliminate vulnerabilities, and take command of sprawling IT Operations with our Managed Detection and Response (MDR) Plus SOC platform. Your Security Operations can be fully outsourced or co-managed leveraging our Security Operations Center to protect your business...


The goal of this project is to design and deploy an Amazon Web Services (AWS) Landing Zone pattern, capable of hosting your customers' data that has been approved by InfoSec. The Business Requirements/Analysis Phase may include activities such as: • Database and storage test metric goals • Success...