Sign in
Categories
Your Saved List Become a Channel Partner Sell in AWS Marketplace Amazon Web Services Home Help

Security (4192 results) showing 1791 - 1800


  • Version Userify AWS Free Release
  • By Userify

Secure your cloud instances and servers with Userify, the revolutionary decentralized administrative user administration solution. Unlike traditional authentication servers that can be vulnerable to attacks or failures, Userify deploys SSH cryptographic keys and configures sudo roles through a...

Linux/Unix, Ubuntu LTS - 64-bit Amazon Machine Image (AMI)


"WebOrion® Defacement Monitor will provide near real-time alerts in the event of a web defacement. Our high-fidelity approach in monitoring your website, using our powerful and innovative engines, provides you with a high level of assurance and reliability. WebOrion® Defacement Monitor comes with...


Sometimes the best defense is a good offense. As your organization engages in penetration testing by using LBMC Information Security, you will identify the holes in your defenses before cyber-attackers do. It is better for your penetration testers to find a weakness than your adversaries. We have...


Overview F9 Infotech’s Well-Architected Framework Review (WAFR) is a structured evaluation that helps identify potential gaps, risks, and inefficiencies in AWS environments. Our review provides actionable insights and remediation support to help improve reliability, availability, security, and...


If you have multiple AWS accounts and teams, cloud setup and governance can be complex and time consuming, slowing down the very innovation you’re trying to speed up. AWS Control Tower provides the easiest way to set up and govern a secure, multi-account AWS environment, called a landing zone. It...

Free Trial

  • Version 21.1.1 20230622
  • By Kurian

Starting from $0.00 to $0.05/hr for software + AWS usage fees

This is a repackaged open source software product wherein additional charges apply for patching the operating system and the maintenance provided by Kurian. Keycloak is an open-source identity and access management (IAM) solution that offers centralized authentication, authorization, and user...

Linux/Unix, Other 9.2 - 64-bit Amazon Machine Image (AMI)


Nowadays, it doesn't matter if you’re operating in a highly regulated vertical or not. Once the first customer is onboard, your workloads have to be secured. From this point on, security is always a consideration, and following security best practices is a habit. Automat-IT 360 AWS security...


Get the next-level security for better protected workloads in your AWS account by utilizing the FortiGate firewall from Fortinet. At VAST, we have the experience and expertise to properly configure and manage the next-generation firewall from FortiGate. Contact VAST today to see how we could help...


At Ibexlabs, we review your cloud infrastructure across the six pillars of AWS Well-Architected Framework to help you utilize the full potential of the cloud. Management & Governance (M&G) Lens: We use the M&G Lens to provide prescriptive management guidance for your AWS workloads so that you can...