Sign in
Categories
Your Saved List Become a Channel Partner Sell in AWS Marketplace Amazon Web Services Home Help

Security (4372 results) showing 2981 - 2990


Free Trial

  • Version 21.1.1 20230523
  • By Kurian

Starting from $0.00 to $0.05/hr for software + AWS usage fees

This is a repackaged open source software product wherein additional charges apply for patching the operating system and the maintenance provided by Kurian. Keycloak is an open-source identity and access management (IAM) solution that offers centralized authentication, authorization, and user...

Linux/Unix, Other 8.4 - 64-bit Amazon Machine Image (AMI)


Preliminary Assessment of Security Controls Abira Security will assess current architecture and security controls to make sure it is sufficient to conduct a comprehensive compromise assessment and if any additional tools will need to be deployed. Apply the Kill Chain Methodology Abira Security...

Free Trial

  • Version 21.1.1 20230625
  • By Kurian

Starting from $0.00 to $0.05/hr for software + AWS usage fees

This is a repackaged open source software product wherein additional charges apply for patching the operating system and the maintenance provided by Kurian. Keycloak is an open-source identity and access management (IAM) solution that offers centralized authentication, authorization, and user...

Linux/Unix, Red Hat Enterprise Linux 8.8 - 64-bit Amazon Machine Image (AMI)


IR readiness assessments help mitigate the impacts of an incident and are one of the most important aspects of cyber security defenses. It is not important to consider “if” a cyber attack will occur but “when” it will happen. You need to be prepared. The best way to counter cyber threats'...

Free Trial

  • Version 4.0.0.3707
  • By Myota

Starting from $0.85 to $30.24/hr for software + AWS usage fees

Using disparate technologies to encrypt, shred, disperse and back up your data is frustrating and time-consuming. With Myota Cyberstorage you can deploy all these protections in a few clicks. Myota secures unstructured data from ransomware or other malicious actors through a dynamic object...

Linux/Unix, Amazon Linux 2 - 64-bit Amazon Machine Image (AMI)


Satisfy both your compliance requirements and security needs with the Enterprise Generative AI Security Hub from AddValueMachine. We operate as a control point for your organization's LLMs, inspecting data such as PHI, PII, or PCI. You can establish organizational policies on this data to decide...


Kodem is the context-based application security platform delivering end-to-end protection from code to runtime. Powered by complete SDLC coverage and Runtime Intelligence™, Kodem accurately determines what really puts you at risk. Security and engineering teams are using Kodem to gain unmatched...