Sign in
Categories
Your Saved List Become a Channel Partner Sell in AWS Marketplace Amazon Web Services Home Help

IoT (933 results) showing 431 - 440



Cisco Umbrella offers flexible, cloud-delivered security when and how you need it. It combines multiple security functions into one solution, so you can extend protection to devices, remote users, and distributed locations anywhere. As part of the Jump Start Services, Aqueduct will perform all the...


Blended Connectivity (LEO/GEO, Cellular, Mesh) Resilient Communications for Critical Situations Connectivity in Areas currently without Connectivity Not limited by a single network’s coverage Enhanced Cyber Security and Encryption Support Fleet Connectivity Solutions + Mobile Command...


Iron Mountain’s Asset Lifecycle Management (ALM) delivers a strategic approach to IT asset management that ensures optimized use, maximum return on your investment, and minimum environmental impact with comprehensive and flexible end-to-end services. Whether you manage workplace technology,...


Rapidly build your own IoT platform with Cube Solutions 1.One-stop solution, from hardware integration to application development, connect both consumer-grade IoT to industrial-grade IoT, can significantly reduce R&D costs. 2.Rich hardware ecosystem fulfilling the demand of various smart product...


Safeguard your deployment with SLA-backed support and professional services from the world's greatest team of NATS experts, covering NATS, JetStream, Key/Value Store, Object Store, and the client for: Go, JavaScript, Java, Net, Python, Rust, C, and C++

Linux/Unix, Ubuntu 20.04 - 64-bit Amazon Machine Image (AMI)


DNS is a control plane of the Internet. No more ads, no more malware and more privacy if you own your DNS and enable DNS Security. ioc2rpz community portal provides OSINT based security and policy RPZ feeds for you DNS server such as ISC Bind, PowerDNS, Unbound, Infoblox. With this subscription...

  • Version ECSMID V 1.0.0 BYOL
  • By LokDon

ECSMID V 1.0.0 software development kit simply encrypts and decrypts information without moving encryption keys from point A to point B. It is arguably the first of many post-quantum cryptographies implemented with decentralization in mind. - Security module as a software service (SMAASS). As a...

Linux/Unix, Amazon Linux 2 - 64-bit Amazon Machine Image (AMI)


Axity's Cloud Security Assessment service goes beyond a simple evaluation. We partner with you to gain a comprehensive understanding of your cloud or hybrid environment's current cybersecurity posture. Our experts conduct in-depth interviews with your security personnel and leverage existing Cloud...


Whether you are starting your journey deploying your first AWS application or expanding your cloud application footprint, building cloud native applications with serverless technology results in shorter development lifecycles, simplified architecture, less infrastructure to provision, and more...


Initially, we will meet with you for one or more discovery sessions. From these meetings, we gather enough information to quickly present you with a proposal without the need for a drawn-out waterfall-style analysis phase. During discovery we’ll cover the following: What features does your...