Sign in
Categories
Your Saved List Become a Channel Partner Sell in AWS Marketplace Amazon Web Services Home Help

Device Security (167 results) showing 71 - 80



Starting from $1,900.00/hr or from $1,900.00/yr (100% savings) for software + AWS usage fees

Protect against mobile threats In todays Everywhere Workplace, mobile devices are essential enterprise resources. Employees use them to access virtually everything. And because most users have subpar, if any, mobile security measures in place, hackers are taking advantage. Ivanti Mobile Threat...

Linux/Unix, Red Hat Enterprise Linux 7.x - 64-bit Amazon Machine Image (AMI)

  • Version Splunk Enterprise 9.0
  • By BYNET

Starting from $1,760.00/hr or from $1,760.00/yr (100% savings) for software + AWS usage fees

Ivanti Application Control offers IT unprecedented control over endpoints, reducing security risk while providing a great user experience in the latest Windows environments. In addition to contextual application control, the solution delivers secure Windows privilege management that lets you remove...

Linux/Unix, Red Hat Enterprise Linux 8.x - 64-bit Amazon Machine Image (AMI)


OVERVIEW Firewalls are fundamental to protecting network traffic including the flow of sensitive data. They are required for compliance to mandates like PCI DSS, HIPAA, GDPR & LGPD. Comprehensive firewall management requires a high degree of expertise and constant vigilance to make sure technology...


AWS Well-Architected Reviews (WARs) help cloud architects build secure, high-performing, resilient, and efficient infrastructure for their applications and workloads. Based on five pillars — operational excellence, security, reliability, performance efficiency, and cost optimization — AWS...


WHY DIGITAL GUARDIAN MANAGED SECURITY PROGRAM? Instant On As soon as our experts have installed the Digital Guardian agents, you will immediately discover in full forensic detail where your sensitive data resides, who accesses it, and how it is transacted. As a managed customer, you have access to...


A report will be provided upon conclusion which will provide detailed findings and prioritized recommendations for remediation in the following categories: Security Policy, Storage, User Groups and Access Controls, Networking, and General Architecture. Towerwall can help you optimize your cloud...


IBM Security™ MaaS360® is a Unified Endpoint Management (UEM) solution that transforms the way that organizations support users, apps, content, and data across devices. Its open, cloud-based platform integrates with preferred security and productivity tools, allowing modern business leaders to...


runZero delivers the most complete security visibility possible, providing organizations the ultimate foundation for successfully managing risk and exposure. Rated number one on Gartner Peer Insights, their leading cyber asset attack surface management (CAASM) platform starts delivering insights in...


Atlantic's team cyber of professionals realize that researching findings and validating vulnerabilities is the most time consuming part of any scan. We have trained and hired the industries top talent with the expertise and extensive practice to know what is relevant, prioritize the most critical...


In an era where data breaches and privacy concerns loom large, safeguarding sensitive information is paramount. Enter Zero Trust Data API, a cutting-edge solution designed to redefine data security paradigms. With a comprehensive suite of features including Split Knowledge External Key Controls,...