Sign in
Categories
Your Saved List Become a Channel Partner Sell in AWS Marketplace Amazon Web Services Home Help

Security (4686 results) showing 3261 - 3270


  • Version Rancher Prime 2.8.4
  • By SUSE

SUSE Rancher is a 100% open-source Kubernetes management platform built for enterprise-grade environments. Supported by a strong community of users, SUSE Rancher provides a single pane of glass for managing and operating clusters. SUSE Rancher enables you to run Kubernetes everywhere - from cloud...


CyberCX uses the Cybersecurity Maturity Model (CMM) to conduct cybersecurity maturity assessments across organisation IT (and OT) environments, inclusive of Policy and Process elements. This helps to identify key internal and external stakeholders, and for larger organisations, helps integrate and...


Starting from $0.02/hr or from $150.00/yr (14% savings) for software + AWS usage fees

The Operating System Protection Profile (OSPP) is a set of security standards that provides a baseline for evaluating the security of operating systems. Compliance with OSPP ensures that systems are equipped with necessary security controls to protect against a range of cyber threats. This is...

Linux/Unix, Other 8 - 64-bit Amazon Machine Image (AMI)

Free Trial


Starting from $200.00 to $200.00/hr for software + AWS usage fees

In the contemporary era of digital transformation, organisations are often hindered by unsupported versions of Microsoft Windows Operating Systems. These unsupported versions pose significant risks, mainly due to the absence of security patches and the high support costs associated with outdated...

Linux/Unix, Debian 11 - 64-bit Amazon Machine Image (AMI)


CyberArk Secrets Manager offers solutions which enable applications, automation tools and other non-human identities to secure the credentials and secrets used to access cloud and other IT resources at scale - without burdening developers. CyberArk Secrets Hub Security teams gain full visibility,...


Cisco Secure Firewall Threat Defense Virtual (formerly FTDv/NGFWv) combines Cisco’s proven network firewall with Snort IPS, URL filtering, and malware defense. It simplifies threat protection with consistent security policies across physical, private, and public cloud environments. Get deep...


Cloud Hosted Web Application Pen testing PenTestUS identifies exploitable vulnerabilities in web applications performed by highly skilled consultants with rich experience in the field who provide strategic and tactical recommendations to assist in prioritizing mitigation of detected...


BPMLinks provides various cyber and cloud services such as Assessments (Security Assessment, Vulnerability Assessment, Pen testing...), Audit and Compliance, Consulting, Managed security services. Assessments and Audit Complaince services : Security assessment is the key aspect for any...


Starting from $0.00/hr or from $0.00/yr (43% savings) for software + AWS usage fees

This product has charges associated with it for hardening and maintenance. This Citadel Hardened VM is secured using 300+ security controls and validated using Citadel Audit. This AMI delivers a secure, stable, and high-performance environment for developing and running cloud and enterprise...

Linux/Unix, Ubuntu 20 - 64-bit Amazon Machine Image (AMI)