Security (4193 results) showing 3371 - 3380
- Version 1.3
- By NGINX, Inc.
Starting from $0.29/hr or from $2,100.00/yr (17% savings) for software + AWS usage fees
Simplify your stack and deliver consistent high-performance apps and APIs reliably, securely and at scale with NGINX Plus and NGINX App Protect DoS, the all in one, lightweight, load balancer, reverse proxy, and API gateway with Layer 7 DoS protection. Get your free 30-day trial today! NGINX Plus...
Linux/Unix, Red Hat Enterprise Linux 7 - 64-bit Amazon Machine Image (AMI)
- By Sierra-Cedar
What is it? A Well-Architected Review is a framework describing key concepts, design principles, and architectural best practices against defined Operations, Security, Reliability, Performance, Cost Optimization, and Sustainability pillars to improve workload architecture against best practices. A...
- By Teqfocus
Custom Migration Solutions Offered Cloud Foundational Architecture Service Planning and Analysis: Comprehensive Total Cost of Ownership Analysis, Detailed Landscape Report, Capability Roadmap Migration and Modernisation: Secure Landing Zone Creation, Application Migrations to the Cloud,...
- By NTT Ltd
CrowdStrike Falcon is the foundation of next-generation endpoint protection. Discover the power of real-time threat detection, simplified management, and proactive threat hunting, and unleash the unmatched protection of CrowdStrike. CrowdStrike offers 4 different endpoint protection...
- Version 1.0.0
- By Apollo
Starting from $0.00/hr or from $0.00/yr (up to 57% savings) for software + AWS usage fees
This is a repackaged software wherein additional charges apply for extended support with a 24 hour response time. CockroachDB is a distributed SQL database built on a transactional and strongly-consistent key-value store. It scales horizontally; survives disk, machine, rack, and even datacenter...
Linux/Unix, Amazon Linux 2023 - 64-bit Amazon Machine Image (AMI)
- By Amitron
The information is gathered by AWS and other cloud tooling and handson consultancy engagement with the customer. The gathered information is incorporated, including one recommended measure per identified security risk. The Security Gap Analysis report also includes budget estimates, implementation...
- By Fujitsu
Fujitsu provide essential security capabilities to our Public Sector customers, supporting their drive to protect information assets in the face of emerging strategic and operational business challenges. We are a critical component of our customers’ approach to regulatory and legislator demands,...
- By Sekuro
Sekuro's Zero Trust Strategy, grounded in the principles of zero trust, is a pragmatic and customised cyber security service designed in-house by seasoned global security professionals. It serves organisations of all scales and complexities. Focusing on eight key pillars (People, Identities,...
Key features of our Storage Scanning Solutions: Comprehensive Coverage: Implement real-time virus and malware scanning across Amazon S3, Amazon WorkDocs, Amazon EFS, Amazon FSx ONTAP, and Amazon EBS. Single or Multi-Account Support: Our services are tailored to accommodate the needs of both single...
showing 3371 - 3380