Sign in
Categories
Your Saved List Become a Channel Partner Sell in AWS Marketplace Amazon Web Services Home Help

Security (4679 results) showing 3041 - 3050



Supercharge your organization’s digital transformation with the AWS Well-Architected Framework from OnX/CBTS. Our certified AWS engineers and architects can build and operate secure, high-performing, resilient, and efficient infrastructure for applications, as well as assess your current network...


Starting from $0.00/hr or from $0.00/yr (43% savings) for software + AWS usage fees

This product has charges associated with it for hardening and maintenance. This Citadel Hardened VM is secured using 300+ security controls and validated using Citadel Audit. This AMI delivers a secure, stable, and high-performance environment for developing and running cloud and enterprise...

Linux/Unix, Other 9 - 64-bit Amazon Machine Image (AMI)


Organizations of all sizes need the ability to detect, investigate, and respond to malicious activity in their IT environment. The problem is, standing up an effective detection and response program takes more than just buying and implementing the latest security products. It requires a dedicated...


Ynpact is an AWS consulting partner that has been approved as a certified to conduct Well-Architected Reviews (WAR). The WAR framework helps organisations build and maintain workloads in the AWS cloud using best practices based on five pillars: Operational...


Starting from $0.00/hr or from $0.00/yr (14% savings) for software + AWS usage fees

The ANSSI framework is a comprehensive cybersecurity framework developed by the French National Agency for the Security of Information Systems (ANSSI). It provides guidelines and best practices for organizations to strengthen their security posture and protect against cyber threats. The framework...

Linux/Unix, Ubuntu 18 - 64-bit Amazon Machine Image (AMI)


The CDN Compromise Defender™ solution helps organizations detect and contain compromise activity inside their systems. While many security approaches focus on blocking incoming threats, examining intrusions, or malware, the CD compromise activity examines malicious communication activity inside...


Thorough technical review of cloud architecture and configuration security, including: Cloud configs Data protection configs -CI/CD Access controls Security visibility Security control coverage