Sign in
Categories
Your Saved List Become a Channel Partner Sell in AWS Marketplace Amazon Web Services Home Help

Cloud Governance (305 results) showing 41 - 50



Test drive QRadar SIEM for 3 days, no setup needed! https://ibm.biz/QRadarTestDrive QRadar Suite - SIEM (Cloud-Native) helps organizations detect and address potential security threats to prevent disruptions to business operations. Designed for hybrid cloud, the cloud-native SIEM provides...

Free Trial


elba security suite is revolutionizing how security teams collaborate and operate, offering a modernized approach to workforce security. This all-in-one platform merges key security elements like awareness programs, spear phishing simulations, data protection, and SaaS inventory, into a cohesive...


Adaptive provides a data protection platform that integrates across the entire organization's infrastructure and enables them to seamlessly secure data, infrastructure, identities, and privileges in a single platform. Adaptive's platform provides - Data Discovery and Classification: Discover...

Free Trial


Frontegg empowers modern SaaS companies to elevate customer identity management as a strategic business driver, enhancing both security and user experience. As one of the top-ranked CIAM platforms, recognized by G2 Crowd, Frontegg offers a comprehensive suite of identity management functionalities....


Lasso for Code Assistants is an intelligent IDE plugin designed to integrate seamlessly into modern development environments. It ensures secure, private, and compliant interactions with AI code assistants. By dynamically masking sensitive data and scrutinizing incoming code, Lasso protects...


Truora's solution ensures the authenticity of user identities through comprehensive validation processes. Leveraging advanced document authentication techniques, including OCR (Optical Character Recognition) technology and fraud detection models driven by artificial intelligence, Truora...


No matter what your specific cloud question may be, our team of AWS Certified Solutions Architects are here to help, at no charge and with no strings attached. We can help you clarify your priorities, sort through technical challenges, AWS how to's and get you pointed in the right...


IBM Security Verify Governance is based on mature product for Identity Governance and Administration (IGA) solutions that are focused on automation of identity lifecycle management with the flexible provisioning policies and workflows to support identity joiner, mover and leaver change control...


Adversaries have long counted on IT and cloud complexity to hide their entry, movement, and exfiltration of data. Successfully detecting and exposing adversaries requires discovering + classifying high-impact data and monitoring its usage quickly and accurately across all data...