Sign in
Categories
Your Saved List Become a Channel Partner Sell in AWS Marketplace Amazon Web Services Home Help

Infrastructure Software (Over 10,000 results) showing 7991 - 8000



Service Description CBI's application security testing evaluates your company's web and mobile applications for code-level and design-level vulnerabilities. Our dynamic approach combines the industry's most advanced technology with CBI's team of application testers (all former web developers) to...


SECURITY INFORMATION AND EVENT MANAGEMENT: Security Event Analysis on logs and security telemetry, price per Endpoint (Laptops, Workstations, Servers - physical or virtual) all sources included in price. PLEASE CONTACT BLUEVOYANT FOR CUSTOM PRIVATE OFFER:...


The Version 1 Data Ingestion & Integration (DII) features include: Support for SFTP & SMTPS3 as a data source out-of-the-box. An extendable architecture makes it straightforward to with ability to add additional data sources where needed Event based triggers, with new files ingested...


Entitle is a cloud permission management platform that automates how access to cloud resources is requested and granted. It eliminates provisioning-related bottlenecks and enables security teams to restrict unneeded access while maintaining a seamless experience for employees. An API-first SaaS...


Businesses rely on actionable insights to run their business. Sourcing data, ingesting data through ETL or ETL, building data warehouse structure and generating dashboard and reports based on key performance indicators (KPIs) with drill-down capabilities offer businesses mechanism to access...


Financial services organisations often find it challenging to maintain compliance with APRA's CPS 234 standard due to the complexity and breadth of information security risks. The extensive requirements for managing information security can be difficult to integrate into existing processes and...


Starting from $0.01/hr or from $80.00/yr (up to 91% savings) for software + AWS usage fees

This is a repackaged software that includes the charges of installation and configuration of rust which is a low-level programming language with direct access to hardware and memory, which makes it a great solution for embedded and bare-metal development. You can use Rust to write operation systems...

Linux/Unix, Other rocky linux 8 - 64-bit Amazon Machine Image (AMI)


Apexon’s RDMP provides a framework that aligns remote monitoring, management and data analysis in a single platform. Built to take advantage of AWS-managed components, the platform allows product engineering and operations teams to support their customers and, importantly, provide a more complete...


In this three day course, you will learn how to use basic FortiGate features, including security profiles. In interactive labs, you will explore firewall policies, user authentication, SSL VPN, dial up IPsec VPN, and how to protect your network using security profiles such as IPS, antivirus, web...