Set up AWS Client VPN end point Provide VPN Configuration Demontate that Client VPN endpoint or VPN appliance set up and working Provide documentation
Set up AWS Client VPN end point Provide VPN Configuration Demontate that Client VPN endpoint or VPN appliance set up and working Provide documentation
Thanks to the excellence of its expertise and customer orientation, S2E is the ideal partner to support companies in their adoption process of the Amazon Web Services (AWS) cloud, of which we are an Advanced partner. Just as S2E has firmly chosen AWS for its vocation to innovation and reliability,...
As a partner for the DACH region, we offer professional services for the entire NGINX portfolio on AWS. Together with NGINX we develop intelligent solutions and would like to offer our customers the possibility to use the comprehensive offer of NGINX optimally. For this purpose we offer targeted...
Panoptic Scans allows you to schedule automated vulnerability scans to meet the following compliance requirements: - SOC2 - Health Insurance Portability and Accountability Act (HIPAA) - Federal Information Security Management Act (FISMA) - ISO 27001 - Cybersecurity Maturity Model...
Trellix [Private Offer Only] combines the benefits of the Private Offer feature along with Carahsoft's contract vehicles in providing customers a seamless acquisition process for their cloud-based products and solutions from AWS Marketplace. Trellix Detection as a Service secures S3 buckets (and...
AWS' Private 5G promises to be a game-changer for enterprises, enabling everything from augmented reality experiences to automated manufacturing floors. But for enterprises to play in that game, many will first need to deploy a private cellular network that can support the low latencies, high...
AWS is a powerful, versatile platform that allows you to build a secure, efficient network tailored to your needs, all within a few clicks. Let me walk you through the highlights. We start by setting up your very own Virtual Private Cloud (VPC), think of it as your personal space in the vast AWS...
This comprehensive course covers advanced networking concepts, AWS services, and best practices required to design, implement, and manage complex networking solutions on the AWS platform.
Starting from $100.00/mo for software + AWS usage fees
OpenCanary creates a network honeypot allowing you to catch hackers before they fully compromise your systems. As a technical definition, OpenCanary is a daemon that runs several canary versions of services that alerts when a service is (ab)used.
Linux/Unix, Ubuntu 22.04 LTS - 64-bit Amazon Machine Image (AMI)
Infoblox BloxOne® Threat Defense provides hybrid protective DNS services to secure networks, devices and users from cyberthreats on- and off-premises, including remote locations and home offices. It maximizes brand protection by securing your existing networks and digital imperatives like SD-WAN,...
showing 1291 - 1300