Sign in
Categories
Your Saved List Become a Channel Partner Sell in AWS Marketplace Amazon Web Services Home Help

Security (4717 results) showing 4121 - 4130



Nexusguard Application Protection mitigates all types and sizes of DDoS attacks and cyber threats, delivering maximum uptime to organizations with an uninterrupted online presence. Our solutions are secure, reliable, customizable, and backed by enterprise grade SLAs. A multi-layered protection...


As a standalone offering Orca is fantastic at identifying core risks within AWS cloud environments which leaves the efficiency and effectiveness of remediation as the responsibility of the cloud or security engineers. To enable the appropriate teams and effectively remediate misconfigurations,...


The Discovery Module automatically creates a full map of your network, without any need for installation or integration. The Map will provide an interactive interface, allowing users to toggle their network, providing a detailed graphic view of the network architecture. Due to the unique nature...


Background Tesserent's approach to security consulting services are outcome-driven and aim to support our customer’s cybersecurity strategies, risk management plans and compliance requirements. It is important to us that you, our customer, achieve a tangible benefit from our services. To achieve...


Starting from $0.02/hr or from $150.00/yr (14% savings) for software + AWS usage fees

The Australian Cyber Security Centre's (ACSC) Essential Eight is a set of strategies to mitigate cybersecurity incidents. These strategies are designed to help organizations protect their systems against a wide range of cyber threats. Compliance with the ACSC Essential Eight is crucial for...

Linux/Unix, Other 9 - 64-bit Amazon Machine Image (AMI)


The Trellix EDR Services Subscription provides subject matter expertise to work alongside your existing team to operationalize the EDR solution. The Trellix SME will work with your team to review the top threats targeting your environment and proactively search the environment for relevant IOCs...

Free Trial

  • Version 1.1-20230224
  • By Kurian

Starting from $0.00 to $0.05/hr for software + AWS usage fees

This is a repackaged open source software product wherein additional charges apply for patching the operating system and the maintenance provided by Kurian. SFTP Server by Kurian is based on the OpenSSH Server platform and it is configured as a secured, robust FTP server for any file transfer...

Linux/Unix, Other 8.7 - 64-bit Amazon Machine Image (AMI)


Starting from $14.27 to $14.27/hr for software + AWS usage fees

Polarity automatically and instantly searches unlimited data sources in parallel enriching every tool and workflow. Data can stay where it resides today, and Polarity brings it to the analyst when it is needed most. No need for data to be replicated, moved, or duplicated. Polarity allows analysts...

Linux/Unix, Amazon Linux 2 - 64-bit Amazon Machine Image (AMI)


With Legit, enterprises get a cleaner, easier way to manage and scale application security and address risks from code to cloud. Built for the modern SDLC, Legit tackles the toughest problems facing security teams, including GenAI usage, proliferation of secrets, and an uncontrolled dev...