Sign in
Categories
Your Saved List Become a Channel Partner Sell in AWS Marketplace Amazon Web Services Home Help

Device Security (159 results) showing 71 - 80



AWS Well-Architected Reviews (WARs) help cloud architects build secure, high-performing, resilient, and efficient infrastructure for their applications and workloads. Based on five pillars — operational excellence, security, reliability, performance efficiency, and cost optimization — AWS...


WHY DIGITAL GUARDIAN MANAGED SECURITY PROGRAM? Instant On As soon as our experts have installed the Digital Guardian agents, you will immediately discover in full forensic detail where your sensitive data resides, who accesses it, and how it is transacted. As a managed customer, you have access to...


A report will be provided upon conclusion which will provide detailed findings and prioritized recommendations for remediation in the following categories: Security Policy, Storage, User Groups and Access Controls, Networking, and General Architecture. Towerwall can help you optimize your cloud...


IBM Security™ MaaS360® is a Unified Endpoint Management (UEM) solution that transforms the way that organizations support users, apps, content, and data across devices. Its open, cloud-based platform integrates with preferred security and productivity tools, allowing modern business leaders to...


Atlantic's team cyber of professionals realize that researching findings and validating vulnerabilities is the most time consuming part of any scan. We have trained and hired the industries top talent with the expertise and extensive practice to know what is relevant, prioritize the most critical...


Consumers want an alternative to legacy authentication methods that are plagued with fraud and characterized by a bad user experience. They are increasingly expecting Passwordless Authentication options. Passkeys have become the standard for Passwordless Authentication because they provide a more...


As more and more businesses turn to third-party vendors, suppliers, outsourced services and other channel partners, it is critical that organizations develop a vendor management program to routinely assess third-party risks as the consequences of data getting leaked or stolen can lead to a major...


Atlantic Data Security provides 24/7 monitoring of your Fortinet infrastructure ensuring that critical events do not go unnoticed. We perform system health, events, and alerts all will be logged and either escalated to your organization or resolved on your behalf. Support Aware is not Staff...

Free Trial


Starting from $1.04/hr or from $9,100.00/yr (up to 31% savings) for software + AWS usage fees

***This RA instance requires an EJBCA Certificate Authority Instance to fully function.*** EJBCA PKI for Enterprises - A powerful and flexible certificate issuance and management system to issue and enable full life-cycle control of digital certificates. This instance is an RA server that can be...

Linux/Unix, Amazon Linux Amazon Linux 2023 AMI (HVM) - 64-bit Amazon Machine Image (AMI)


Descope is a drag-and-drop authentication and user management platform designed for developers. With our no-code workflows, SDKs, and APIs, you can easily create secure and frictionless authentication flows for every interaction a user has with your B2B or B2C application. Built by security...