Sign in
Categories
Your Saved List Become a Channel Partner Sell in AWS Marketplace Amazon Web Services Home Help

Device Security (174 results) showing 161 - 170



Everyware Cloud (EC) is a complete edge management platform that provides all the tools needed to manage remotely your edge deployments in a secure context. EC provides connectors to various AWS services and the most popular enterprise platforms for full business integration. In combination with...

Free Trial


AppViewX PKI+ quickly enables organizations to migrate on-prem private CAs to a highly scalable, secure and compliant enterprise grade PKI-as-a-Service offering for all private trust security use cases. Setting up a secure, scalable, and compliant cloud-based PKI is easier and faster than ever...


The CyCognito platform is the first smart platform that helps organizations protect their external attack surface and preempt attackers. The platform automatically discovers the entire extended IT ecosystem, including all digital, internet exposed IT assets across your own infrastructure, those...


Edge to Edge Enterprise Security Platform. One platform to prevent, detect, respond, and hunt in the context of all enterprise assets. See what has never been seen before. Control the unknown. All at machine speed. ActiveEDR: EDR That Works for the SOC Track everything as it happens. Identify...


DeTCT is a cutting-edge digital risk protection platform that includes attack surface discovery, vulnerability intelligence, brand monitoring, data leak and breach notification, dark web monitoring as well as surface web and social media monitoring for infringement and impersonation.


Cyber-intelligence platform with attack surface discovery, vulnerability intelligence, brand intelligence, situational awareness and digital risk protection on a single pane of glass. The platform provides risk and hackability scores to help clients prioritize security actions. Clients also receive...


5G and LTE Access Security is a Cellular Internet of Things (CIOT) offering that protect the endpoints from Fake Base Station attacks. The software makes use of AI + ML to detect Fake Base Station presence in near real time. We aid the endpoint to securely authenticate, securely perform Handovers...


Identity credentials are vulnerable. With Verviam, private data is encrypted in the browser, over the network, in process as well as at rest. End users, applications and devices can securely access services even over the public internet. The identity credential is a JSON web token (JWT)...


The CyberMDX Healthcare Security Suite focuses on IoT, medical devices, and assets connected to clinical networks, providing complete visibility and network protection by leveraging our expertise with Artificial Intelligence (AI) technology, medical device vulnerability research, and a wide range...


Spriv's machine learning capabilities allow you to eliminate the need for repeated Two Factor Authentications. With Risk-Based Authentication, Spriv creates a 3D fingerprint baseline that combines unique data points from your computer with your mobile phone and requires 2FA only if there is a...

Windows, Windows Server 2012 R2 Windows Server 2012 R2 - 64-bit Amazon Machine Image (AMI)