Sign in
Categories
Your Saved List Become a Channel Partner Sell in AWS Marketplace Amazon Web Services Home Help

Security (4697 results) showing 3701 - 3710



Starting from $0.02/hr or from $130.00/yr (26% savings) for software + AWS usage fees

Siteage, LLC developed the Red Hat 8.9 (aarch64) cloud-hardened images with the standard of the National Checklist Program (NCP) U.S. government. Siteage, LLC Hardened images provide low-level design (LLD) on setting the security configuration of operating systems and applications in the AWS Cloud,...

Linux/Unix, Red Hat Enterprise Linux 8.9 - 64-bit Amazon Machine Image (AMI)


This is a repackaged software product that includes the installation and configuration of python which is a high-level, interpreted, general-purpose programming language. Its design philosophy emphasizes code readability with the use of significant indentation.Python is dynamically-typed and...

Linux/Unix, Fedora 32-1.6.x86_64-hvm - 64-bit Amazon Machine Image (AMI)


Starting from $0.00/hr or from $0.00/yr (14% savings) for software + AWS usage fees

The ANSSI framework is a comprehensive cybersecurity framework developed by the French National Agency for the Security of Information Systems (ANSSI). It provides guidelines and best practices for organizations to strengthen their security posture and protect against cyber threats. The framework...

Linux/Unix, Red Hat Enterprise Linux 9 - 64-bit Amazon Machine Image (AMI)


Isora GRC from SaltyCloud is the Lightweight GRC Assessment Platform that enables organizations to achieve continuous risk visibility at scale without the complexities of manual processes or legacy software solutions. With Isora GRC, Compliance, Infosec, IT, and Privacy teams can easily launch...


Starting from $0.01 to $1.00/hr for software + AWS usage fees

This is a repackaged open source software product wherein additional charges apply for support and maintenance by AskforCloud LLC. GnuCash is personal and small-business financial-accounting software, freely licensed under the GNU GPL and available for GNU/Linux, BSD, Solaris, Mac OS X and...

Windows, Windows Server 2016 Base Windows Server 2016 - 64-bit Amazon Machine Image (AMI)


iOCO helps to implement best practices vital to any successful security rollout and assists in effective maintenance of security solutions. The service includes specific pre-defined deliverables and will be completed at a time mutually agreed to between the customer and us. The objective of the...


The Six Pillars of Zero Trust are Identity, Devices, Applications, Data, Networks and Infrastructure. The primary aim of implementing a Zero Trust framework is to significantly reduce security risks. By assuming that no entity, whether inside or outside the network, can be trusted by default,...


Aligned Technology Group offers a comprehensive and tailored AWS Web Application Firewall (WAF) provisioning and configuration service. We understand the critical importance of safeguarding your web applications against evolving cyber threats and unauthorized access. Our approach combines manual...


Nodeware provides complete and continuous visibility of your network, its assets, and the vulnerabilities that put your business at risk, all while running silently in the background during normal business hours. Nodeware was developed by cybersecurity practitioners and combines new device...


How do you effectively integrate your security tools with Splunk? Splunk is an effective platform for security operations, automation and response (SOAR). As you look to deploy it, ask yourself: – Does my team have more important activities to perform than deploying security software? – Have I...