Sign in
Categories
Your Saved List Become a Channel Partner Sell in AWS Marketplace Amazon Web Services Home Help

Security (4866 results) showing 4551 - 4560


Free Trial

  • Version Amazon Linux 2 20230401
  • By Kurian

Starting from $0.05 to $0.05/hr for software + AWS usage fees

This item is a repackaged open source software, additional charges apply for support by Kurian. The Linux operating systems AMIs by Kurian are patched and up-to-date on the day of the release, and the updates are published every quarter. These AMIs are ideal to be used in automated provisioning...

Linux/Unix, Amazon Linux 2 - 64-bit Amazon Machine Image (AMI)

Free Trial

  • Version Amazon Linux 2018.03 20220820
  • By Kurian

Starting from $0.05 to $0.05/hr for software + AWS usage fees

This item is a repackaged open source software, additional charges apply for support by Kurian. Kurians Linux operating systems AMIs are patched and up-to-date on the day of the release, and the updates are published every quarter. These AMIs are ideal to be used in automated provisioning processes...

Linux/Unix, Amazon Linux 2018.03 - 64-bit Amazon Machine Image (AMI)


This AMI image is an ubuntu based syslog collector as part of Seclytics Augur's PDR network security solution. It can be launched in your company's VPC environment to listen for syslog data that are forwarded to its IP. The VM will perform ETL transformation on the data, then send relevant events...

Linux/Unix, Ubuntu 20.04 - 64-bit Amazon Machine Image (AMI)

  • Version v2.8.1
  • By D2iQ

DKP Essential is an enterprise-grade Kubernetes distribution designed to help companies go into production quickly and easily. Built on pure open-source Kubernetes to avoid vendor lock-in, DKP Essential provides platform services for networking, storage, logging, monitoring and more, all of which...


It's time to fix the way the world logs in. HYPR delivers uncompromising assurance with a consumer-grade experience. The first step starts with True Passwordless MFA at the workforce desktop. HYPR's patented mobile-initiated login prevents phishing and PUSH attacks that come with legacy MFA....


By automating data capture and processing across cloud and container environments, Cado Response enables security teams to effectively investigate and respond to cyber incidents at cloud speed.

Linux/Unix, Debian Debian 10 (20210329-591) - 64-bit Amazon Machine Image (AMI)


The CyCognito platform is the first smart platform that helps organizations protect their external attack surface and preempt attackers. The platform automatically discovers the entire extended IT ecosystem, including all digital, internet exposed IT assets across your own infrastructure, those...


Secure Private Access (SPA) from Exium provides fast, seamless way of accessing private applications without the clunkiness of VPN infrastructure. Exium Intelligent Cybersecurity Mesh. Adjacent to the internal applications running in a public cloud, data center, or on-premise server, SPA places a...

Linux/Unix, Ubuntu 18.04 - 64-bit Amazon Machine Image (AMI)


The Nirmata Enterprise for Kyverno is designed to address the needs of organizations running production Kubernetes clusters with critical applications. Nirmata, the team behind the #1 Kubernetes-native policy engine, Kyverno, provides its certified distribution of Kyverno along with curated...


Misconfigurations are the leading cause of security issues in Kubernetes. Eliminate misconfigurations and automate operations with Kubernetes-native policies. Built by the creators of Kyverno, Nirmata Policy Manager simplifies Kubernetes operations with automated policy-based governance to reduce...