Sign in
Categories
Your Saved List Become a Channel Partner Sell in AWS Marketplace Amazon Web Services Home Help

Security (4717 results) showing 3961 - 3970



Converge’s penetration-testing methodology is based on components from NIST SP800-115, the Penetration Testing Execution Standard (PTES), and the Open Web Application Security Project (OWASP) Top 10. Converge maintains a separate, detailed penetration testing methodology document that is available...


During our SaaS Readiness Assessment, our team of AWS-Certified Solutions Architects will work closely with you to understand your business objectives, current infrastructure setup, and SaaS application requirements. We'll conduct a comprehensive review of your existing infrastructure, including...

Free Trial


AppViewX KUBE+ is a comprehensive certificate lifecycle management solution that simplifies certificate management in complex Kubernetes environments. It provides a central platform to discover, manage, automate, control and govern certificates across containerized workloads and Kubernetes...


Starting from $0.00/hr or from $0.00/yr (14% savings) for software + AWS usage fees

The NIST compliance framework, developed by the National Institute of Standards and Technology, is a set of guidelines, standards, and best practices that organizations can follow to manage and mitigate cybersecurity risks. It is widely recognized as a best practice for organizations looking to...

Linux/Unix, Red Hat Enterprise Linux 9 - 64-bit Amazon Machine Image (AMI)


The potential benefits of a security framework As the volume and potential impact of cyber security risks continue to grow, today’s organizations face mounting challenges in their efforts to manage them. But in the race to develop effective risk management programs and policies, it’s become clear...


Cloudbric Private Access Solution (PAS) is an agent (Endpoint-Initiated) based Zero Trust Network Access (ZTNA) solution that provides safe and easy application access from anywhere at any time with segmented procedure and flexible access policy that utilizes the Software-Defined Perimeter (SDP)...


Starting from $0.02/hr or from $150.00/yr (14% savings) for software + AWS usage fees

The Criminal Justice Information Services (CJIS) Security Policy establishes the minimum security requirements needed to protect criminal justice information (CJI) in both storage and transmission. Compliance with CJIS ensures that organizations handling CJI implement robust security controls to...

Linux/Unix, CentOS 7 - 64-bit Amazon Machine Image (AMI)


Bedroc consulting engineering operating with your AWS-based cloud and engineering teams offer management a thorough risk based analysis and analyze the vulnerabilities and threats, with platforms. These PaaS solutions also give IT Security, DevOps teams, Operations, Infrastructure, Enterprise...


The Trend Micro Vision One platform includes advanced XDR capabilities that collect and correlate deep activity data across multiple vectors – email, endpoints, servers, cloud workloads, and networks - enabling a level of detection and investigation that is difficult or impossible to achieve with...