Sign in
Categories
Your Saved List Become a Channel Partner Sell in AWS Marketplace Amazon Web Services Home Help

Security (4716 results) showing 3911 - 3920



Starting from $0.00/hr or from $0.00/yr (up to 57% savings) for software + AWS usage fees

This is a repackaged software wherein additional charges apply for extended support with a 24 hour response time. HAProxy is a open source software that provides a high availability load balancer and reverse proxy for TCP and HTTP-based applications that spreads requests across multiple...

Linux/Unix, Ubuntu 18 - 64-bit Amazon Machine Image (AMI)


Starting from $0.00/hr or from $0.00/yr (15% savings) for software + AWS usage fees

This is a repackaged open source software wherein additional charges apply for extended support with a 24 hour response time. MongoDB, a leading NoSQL database, is renowned for its flexibility, scalability, and performance, offering a robust solution for managing voluminous and varied data sets...

Linux/Unix, Ubuntu 24.04 - 64-bit Amazon Machine Image (AMI)


Our goal is to help you get the most value out of Crowdstrike to stop breaches and drive business. We help you implement and optimize your Crowdstrike licenses so the platform can continuously monitor all endpoint activity and analyze the data in real time to automatically identify threat activity,...


In security as in life, the hardest weaknesses to pinpoint are your own. Fortunately, we have no problem thoroughly documenting all of your flaws. In fact, it’s our job. And that’s a good thing: knowing your vulnerabilities—and the ways in which attackers could exploit them—is one of the greatest...


Continuous visibility, remotely deployable and centrally managed. Our vulnerability scanning appliances provide continuous visibility. Remotely deployable, centrally managed and self-updating, the sensors come as virtual appliances. What's Included: Vulnerability Scanning Scans Connected IP...


The cloud enterprise infrastructure needs to follow company regulations and compliance. Without any comprehensive visibility, remediation and report, the manual check and best-effort remediation reduce your productivity. The ICS Security Posture Management is the professional service, managed...


Conscia Cyberdefense Enterprise offering is designed for customers that require the highest level of flexibility and adaptability because of the complexity of their IT environment. Our Threat Detection Framework and advanced managed security services on top, can integrate heterogenous data sources...


Starting from $0.00/hr or from $0.00/yr (9% savings) for software + AWS usage fees

This AMI is hardened and maintained by Citadel. In order to receive support, please email support@citadelelement.com. Step into the realm of advanced security with our Hardened tier, featuring a VM image meticulously configured with over 200+ security measures to fortify your AWS deployments...

Linux/Unix, CentOS 8 - 64-bit Amazon Machine Image (AMI)


Dash compliance experts will help your team develop your security program by reviewing policies and procedures created with the ComplyOps platform. Dash will conduct remote review sessions and will cover any questions and concerns the customer has around the policies generated using the ComplyOps...


Fairwinds Insights was created for platform teams that need to enable developers on Kubernetes. The software uniquely solves this problem by implementing policies across the development lifecycle to standardize Kubernetes. It saves time, resources and frustration by enabling developers to create...