Sign in
Categories
Your Saved List Become a Channel Partner Sell in AWS Marketplace Amazon Web Services Home Help

Device Security (174 results) showing 81 - 90



Atlantic's team cyber of professionals realize that researching findings and validating vulnerabilities is the most time consuming part of any scan. We have trained and hired the industries top talent with the expertise and extensive practice to know what is relevant, prioritize the most critical...


Experience a revolution in device management with Jamf Pro's cutting-edge Mobile Device Management (MDM) solutions, crafted specifically for Apple-based enterprises. Centralised control allows you to manage your entire device fleet effortlessly, ensuring enhanced security and seamless compliance....


In an era where data breaches and privacy concerns loom large, safeguarding sensitive information is paramount. Enter Zero Trust Data API, a cutting-edge solution designed to redefine data security paradigms. With a comprehensive suite of features including Split Knowledge External Key Controls,...


Consumers want an alternative to legacy authentication methods that are plagued with fraud and characterized by a bad user experience. They are increasingly expecting Passwordless Authentication options. Passkeys have become the standard for Passwordless Authentication because they provide a more...


As more and more businesses turn to third-party vendors, suppliers, outsourced services and other channel partners, it is critical that organizations develop a vendor management program to routinely assess third-party risks as the consequences of data getting leaked or stolen can lead to a major...


Atlantic Data Security provides 24/7 monitoring of your Fortinet infrastructure ensuring that critical events do not go unnoticed. We perform system health, events, and alerts all will be logged and either escalated to your organization or resolved on your behalf. Support Aware is not Staff...


Descope is a drag-and-drop authentication and user management platform designed for developers. With our no-code workflows, SDKs, and APIs, you can easily create secure and frictionless authentication flows for every interaction a user has with your B2B or B2C application. Built by security...


Our Internal Penetration Tests are designed to make your company the safest and most secure it has ever been. We achieve this by emulating attackers attempting to breach your infrastructure. Our trained professionals then use these attack results to identify vulnerabilities to your internal...


Many enterprises that process large amounts of data are now mandated by international and local regulations to appoint a Data Protection Officer (DPO). Even if your business is not required to appoint a DPO, certain regulations may require you to meet data protection obligations. Towerwall’s...