Sign in
Categories
Your Saved List Become a Channel Partner Sell in AWS Marketplace Amazon Web Services Home Help

Security (4687 results) showing 2311 - 2320



NowSecure provides cloud-based automated mobile app security testing for dev & security teams on-demand and in DevSecOps continuous testing scenarios. Now you can build and deploy mobile apps faster with the confidence that security and privacy are built in. NowSecure has pre-built integrations...


Traditional PAM solutions are a pain to set up, and even more painful to use. With our intuitive solutions, you can define the boundaries of access with the ability and agility to stay ahead—without the excess. We make it simple to deploy, configure and manage privileged access in the cloud or...


Unlock the scalable security with the AWS Secure Landing Zone, striking the optimal balance between robust security and streamlined IT governance for large-scale AWS workloads. FEATURES Centralized Governance and Compliance Centralized management of security policies, compliance requirements, and...


The Well-Architected Review (WAR) framework helps organisations build and maintain workloads in the cloud using best practices based on five pillars: Operational excellence Security Reliability Performance efficiency Cost optimisation transACT's highly trained and accredited team will work with...


Deepfactor is AppSec 2.0, delivering security without the noise. A new approach to AppSec, the Deepfactor Developer Security platform combines software composition analysis (SCA), container scans, container runtime security, and SBOM into a powerful integrated platform. With Deepfactor unique...


The Dragos Platform is operational technology (OT) cybersecurity technology that delivers unmatched visibility of your industrial control system (ICS) assets and communications. It rapidly pinpoints threats through ICS network monitoring and intelligence-driven analytics, identifies and provides...


SMBs (Small and Mid-sized businesses) must make a significant investment in time, resources, and training to become compliance proficient (6 to 12 months-Ideal). And that presumes your team possess the IT and cybersecurity skills to ensure your infrastructure is configured and supported to align...


Our goal is to provide a comprehensive assessment and a clear view of the risks associated with the current cloud infrastructure. This report is the result of a thorough analysis involving expert collaborators in multiple information security domains such as cloud security, perimeter security,...