Sign in
Categories
Your Saved List Become a Channel Partner Sell in AWS Marketplace Amazon Web Services Home Help

Security (4679 results) showing 2931 - 2940



Starting from $0.00/hr or from $0.00/yr (15% savings) for software + AWS usage fees

This is a repackaged open source software wherein additional charges apply for extended support with a 24 hour response time. In order to receive support, please email support@hardenedimages.com. This image comes meticulously preconfigured by Hardened Images, adhering to the Security Technical...

Linux/Unix, CentOS 9 - 64-bit Amazon Machine Image (AMI)


AWS's Well-Architected Framework review with Vezzora is a cost-neutral investment to enhance security, reduce costs and improve scalability. Vezzora conducts the AWS Well-Architected Framework Review to ensure that your applications and systems are designed and operated in a way that meets your...


CirrusHQ have a track record of assisting cutomers within Finance sector to support IT teams (and key departments) to ensure the Well-Architected process is tailored to your needs to support all workloads effectively. We will ensure we work with you to understand your established and rigourous...


Assessment Highlights Evaluate existing AWS configurations against well established Well Architected Review security frameworks aligned with customer needs. Recommend opportunities for improving a client’s ability to detect security events and gain better visibility into risks through the use of...


PHP with Apache on Amazon Linux 2 (BYOL) from Zend by Perforce provides a turnkey solution for running PHP in the cloud. This supported PHP runtime includes the option to install any of PHP 7.2, 7.3, 7.4, 8.0, 8.1, 8.2, or 8.3, and can scale seamlessly across your cloud resources. ZendPHP gives PHP...

Linux/Unix, Amazon Linux 2 - 64-bit Amazon Machine Image (AMI)


DFIR - Digital Forensic and Incident Response (AKA CSIRT – CyberSecurity Incident Response Team) provides technical support in resolution of confirmed computer security incidents. Computer/Mobile security incident must fulfil all below characteristics: Adverse or negative act against...


Certain businesses and organizations are required to be certified many times within many frameworks, depending on their niche and the markets they enter. The more certifications needed, the harder it is to meet compliance standards. Digital Edge is an acknowledged expert in various compliance...


Accelerate your SOC 2 compliance journey with the leading provider of SOC 2 reports worldwide. Leveraging A-LIGN’s partnerhship with Vanta's compliance software solution, and network of expert compliance partners you can have the most efficient audit experience, from readiness to report, built by...


TeraVM is a family of products from VIAVI Solutions that enables network equipment manufacturers and service providers to efficiently test mobile RAN and Core Network elements at scale, with its fully virtualized architecture TeraVM runs on x86 Commercial Off The Shelf (COTS) hardware or in the...

Linux/Unix, Ubuntu 18.04 - 64-bit Amazon Machine Image (AMI)