Sign in
Categories
Your Saved List Become a Channel Partner Sell in AWS Marketplace Amazon Web Services Home Help

Device Security (160 results) showing 151 - 160



Cyber-intelligence platform with attack surface discovery, vulnerability intelligence, brand intelligence, situational awareness and digital risk protection on a single pane of glass. The platform provides risk and hackability scores to help clients prioritize security actions. Clients also receive...


5G and LTE Access Security is a Cellular Internet of Things (CIOT) offering that protect the endpoints from Fake Base Station attacks. The software makes use of AI + ML to detect Fake Base Station presence in near real time. We aid the endpoint to securely authenticate, securely perform Handovers...


Identity credentials are vulnerable. With Verviam, private data is encrypted in the browser, over the network, in process as well as at rest. End users, applications and devices can securely access services even over the public internet. The identity credential is a JSON web token (JWT)...

Free Trial


Starting from $0.06/hr or from $386.00/yr (30% savings) for software + AWS usage fees

IKEv2-MSCHAPv2 Routing VPN Server based on StrongSwan® technology with RADIUS authentication and User Management Web Panel. This server allows multiple computers to see each other when they are connected to this server. It can be useful for employees who work remotely or when the company has...

Linux/Unix, Debian 9.0 - 64-bit Amazon Machine Image (AMI)


The CyberMDX Healthcare Security Suite focuses on IoT, medical devices, and assets connected to clinical networks, providing complete visibility and network protection by leveraging our expertise with Artificial Intelligence (AI) technology, medical device vulnerability research, and a wide range...


Spriv's machine learning capabilities allow you to eliminate the need for repeated Two Factor Authentications. With Risk-Based Authentication, Spriv creates a 3D fingerprint baseline that combines unique data points from your computer with your mobile phone and requires 2FA only if there is a...

Windows, Windows Server 2012 R2 Windows Server 2012 R2 - 64-bit Amazon Machine Image (AMI)


Cloud PAM (Privileged Access Management) Saviynt offers the next-gen, cloud-architected and cloud-delivered PAM solution, to secure privileged and sensitive access to multi-cloud workloads and business critical hybrid applications. Introducing a proxy-less and browser-based interface to secure your...


Security Flow is a hybrid Security, Orchestration, Automation and Response (SOAR)/IT solution that defies the trend of rigid automation. With unique broadcast capabilities and included professional services support, Security Flow provides a fast ROI. Designed to keep analysts in control, Security...


IronDefense for AWS is the industry's only Network Detection and Response (NDR) and collective defense solution for hybrid cloud networks. It applies proven behavioral analysis techniques and industry-leading packet-level cyber hunt interface to detect threats capable of evading traditional cyber...