Sign in
Categories
Your Saved List Become a Channel Partner Sell in AWS Marketplace Amazon Web Services Home Help

Security (4686 results) showing 2321 - 2330



PHP with Apache on RHEL 9 (BYOL) from Zend by Perforce provides a turnkey solution for running PHP in the cloud. This supported PHP runtime includes the option to install any of PHP 7.2, 7.3, 7.4, 8.0, 8.1, 8.2, or 8.3, and can scale seamlessly across your cloud resources. ZendPHP gives PHP...

Linux/Unix, Red Hat Enterprise Linux 9 - 64-bit Amazon Machine Image (AMI)


Starting from $0.01/hr or from $70.08/yr (20% savings) for software + AWS usage fees

Unveiling our comprehensive solution: the Apache Guacamole server pre-installed on a meticulously fortified Ubuntu system, meticulously designed to address the diverse needs of modern enterprises within the AWS ecosystem. Our product offers a sophisticated blend of powerful functionality,...

Linux/Unix, Ubuntu 22.04 - 64-bit Amazon Machine Image (AMI)


Designed specifically for security needs, Corelight Cloud Sensor delivers high-fidelity data for threat detection and incident response in AWS. Detect and respond to threats targeting AWS workloads that other tools miss. Corelight's Cloud Security Solutions provide deep visibility into cloud...


The goal for the Trace3 Cloud Adoption Framework engagement is to facilitate conversation between key stakeholders of an organization on their preparedness to address common obstacles, and proactively avoid pitfalls found during the early stages of cloud adoption. This engagement is a partnership...


With Pangea's comprehensive platform of essential API-based security services, you can effectively and efficiently protect your users, meet security and compliance standards, and block threats. Pangea is turning the complex and fragmented world of security into a simple set of pay-as-you-go APIs...


Scytale is the global leader in information security compliance automation, helping security-conscious SaaS companies get compliant and stay compliant. Our compliance experts offer personalized guidance to streamline compliance, enabling faster growth and boosting customer trust. Scytale gets...


Secure by Design We start with design principles and use reference patterns and templates to ensure that security is woven into your architectural fabric from day one, not overlaid as an afterthought. NCC leverages both, industry best practices, and our own attacker and defender expertise to...


Quantum computers are coming, and with that the risk of breaking public key cryptography that is used pervasively today. Organizations are upgrading to become quantum safe using new technologies including Quantum Key Distribution. BasejumpSIM allows you to simulate a Quantum Delivery Network and...


When considering acquiring a Resident from Trellix, clients are drawn to their expertise in maintaining environments, configuring policies, managing upgrades, and conducting thorough testing within the Trellix Product Suite. These consultants integrate seamlessly into the client's organization,...