Sign in
Categories
Your Saved List Become a Channel Partner Sell in AWS Marketplace Amazon Web Services Home Help

Security (4711 results) showing 3871 - 3880



Kinect will build a fully automated cloud landing zone and application CICD pipeline scaffolding that enables running applications in the cloud with security, governance, and efficiency that meet well-architected best practices. Deliverables Best-practices met. Security and governance monitoring...


Starting from $0.02/hr or from $150.00/yr (14% savings) for software + AWS usage fees

The Health Insurance Portability and Accountability Act (HIPAA) is a set of regulations that establishes national standards for protecting the privacy and security of individuals' sensitive health information. HIPAA compliance is mandatory for any entity that deals with protected health information...

Linux/Unix, CentOS 8 - 64-bit Amazon Machine Image (AMI)


There is a lot riding on the shoulders of your security operations team — protecting the organization’s reputation, safeguarding sensitive client information, and ensuring the organization’s ability to deliver products and services. Our Services team can help you safeguard your mission-critical...


Our goal is to provide you with the time and confidence to focus on other aspects of design, functional requirements, and business rules, while Escala 24x7 accompanies you in defining an architecture that is adapted and aligned with best practices. Together, we will assess the current state of...

Free Trial


Starting from $0.00/hr or from $0.00/yr (100% savings) for software + AWS usage fees

This is a repackaged open source software product wherein additional charges apply for support provided by Galaxys Experience the power of OpenJDK 11 on the reliable Ubuntu 20.04 platform, supported and optimized by Galaxys. Our offering provides a robust and secure Java development environment,...

Linux/Unix, Ubuntu ubuntu 20.04 - 64-bit Amazon Machine Image (AMI)


Starting from $0.02/hr or from $150.00/yr (14% savings) for software + AWS usage fees

The ACSC Information Security Manual (ISM) provides guidelines and controls to protect Australian government information and systems from cyber threats. It outlines security measures that organizations must implement to secure their information assets, including risk management, access control, and...

Linux/Unix, Other 8 - 64-bit Amazon Machine Image (AMI)


Review and Improve Your AWS Workloads Conduct an AWS Well-Architected Framework Review Review your workloads across six AWS Well-Architected pillars Cloudlytics will help you evaluate your workloads for potential risks and help you define how well your architecture aligns with AWS best practices...