Sign in
Categories
Your Saved List Become a Channel Partner Sell in AWS Marketplace Amazon Web Services Home Help

Cloud Operations (706 results) showing 561 - 570



Four-week data & AI economics assessment to quantify the financial value of data & AI. The assessment will cover the following topics: Configuration of up to 10 data & AI products with definition, owner, value, cost, ROI & hierarchy Configuration of up to 10 data & AI initiatives with value, cost...


Streamworks is a software solution from arvato Systems to help you define your IT based background processes and carry them out in a controlled and automated way. You can plan, maintain, control and monitor your entire IT Workload from a central location using Streamworks. This ‘IT Workload’ can...

Free Trial


Starting from $0.00/hr or from $0.00/yr (14% savings) for software + AWS usage fees

This is a repackaged open-source software product wherein additional charges apply for support and for providing it in a simple consumable AMI. Keycloak is the standalone tool for identity and access management. Keycloak is a separate server that is managed on a network, and applications are...

Linux/Unix, Ubuntu 24.04 - 64-bit Amazon Machine Image (AMI)


GDPR/CCPA Readiness Services for AWS Start Ups With the Rhymetec vCISO offering you can: Achieve compliance in months, not years Top-tier vCISO support tailored specifically for your business Dedicated security experts who act like part of your team US-based cybersecurity professionals who work...


Key Features of our AWS Networking and Content Delivery Services: ✓ Strategic Networking Architectures: Leverage our AWS-certified professionals to design and implement dynamic networking architectures that align perfectly with your business objectives, ensuring adaptability and scalability. ✓...


Intrusion detection in the cloud isn't where it needs to be. External and internal adversaries alike can dodge complex or difficult to interpret rules and anomaly models. Tracebit flips this problem on its head. Instead, the decoys we deploy are the anomalies. These are hard to avoid - producing...


Struggling to balance cyber-risk investment, organizational change friction and ability to demonstrate results ? After many years of helping clients with a wide range of governance, risk and compliance matters, we see very few clients doing well. Often, they: know they have a cyber-risk problem,...


Unlock the Full Potential of Your AWS Cloud Environment Enhance your AWS cloud infrastructure with our complimentary On-Demand Solutions Architect service. Benefit from the expertise of an AWS-Certified Solutions Architect who will provide strategic guidance to optimise your compute infrastructure...

  • Version Lookout Secure Private Access Connector 23.3.0-137.293
  • By Lookout, Inc.

The Lookout Secure Private Access Connector offers a secure means for users to connect to their private applications, whether they're housed on-site or in the cloud. By exclusively establishing outbound connections to the Lookout Cloud Security Platform, it eliminates the need for inbound open...

Linux/Unix, Ubuntu 22.04 - 64-bit Amazon Machine Image (AMI)