Sign in
Categories
Your Saved List Become a Channel Partner Sell in AWS Marketplace Amazon Web Services Home Help

Cloud Governance (305 results) showing 91 - 100



Starting from $0.03 to $0.03/hr for software + AWS usage fees

This is a repackaged open source software product wherein a fee is applied for the deployment of the application and AMI support and compliance. Infisical is a platform designed to manage and secure secrets and sensitive information for applications and services. It aims to simplify the handling of...

Linux/Unix, Ubuntu 24.04 - 64-bit Amazon Machine Image (AMI)


Cadre's PCI DSS Assessment provides validation of compliance of the client's cardholder environment with the requirements of the DSS. The key components of the validation assessment will be to evaluate the current scope of the environment, the current network architecture, the current payment...


Our managed cybersecurity services provide comprehensive protection for your AWS environment. We leverage the AWS Well-Architected Framework to ensure that your infrastructure is secure, efficient, and resilient against cyber threats. Our services include continuous monitoring, threat detection,...


Why Choose a Rhymetec vCISO? We’ve built and continue to manage hundreds of InfoSec programs and have decades of experience working with the most complex compliance regulations. Here are some reasons over 600 clients have improved their cybersecurity posture with Rhymetec. Achieve compliance in...


Block attacks with our AI-powered CNAPP. Visibility and security from build time to runtime. All findings are natively integrated directly into the Singularity Data Lake for investigation and custom detection purposes Our Comprehensive AI-Powered CNAPP is comprised of three products: *Cloud...


CipherStash Proxy is a high-performance secure proxy for PostgreSQL databases to provide real-time data access visibility, monitoring and encryption, with no loss of database performance. HOW IT WORKS Built in memory-safe Rust, and implemented as a proxy sitting between your API and your...


Compute Solutions Our team of experts can help you navigate the complexities of AWS Cloud Infrastructure. Whether you need to launch large compute clusters or manage containerized applications, we can guide you through the process, ensuring you get the most out of these powerful compute solutions....


Traditional security assessments are valuable, but can they keep pace with the evolving tactics of cybercriminals? Complex workloads, lambdas, Kubernetes clusters, and meshed cloud environments introduce new attack surfaces that most of the traditional security assessments or pentests miss. Syn...