Sign in
Categories
Your Saved List Become a Channel Partner Sell in AWS Marketplace Amazon Web Services Home Help

Cloud Operations (834 results) showing 721 - 730



Cybersecurity plays a critical role in safeguarding our digital world, protecting critical infrastructure, and ensuring secure access to network resources for authorized users. NTT’s comprehensive security measurement brings the business outcomes of compliance, competencies, cost, consolidation,...


There are two stages of a WAR, both conducted by Nub8’s senior-level AWS-Certified DevOps Engineers: Review your AWS infrastructure for gaps and improvements. Kick-off meeting, where we define expectations and get to know your needs. Assessment call with your technical team and go through the...


C8 Secure's VAPT services address various security challenges faced by organizations, such as: IDENTIFYING VULNERABILITIES: C8 Secure's Vulnerability Scans and Penetration Testing services help uncover hidden vulnerabilities in your AWS workloads including EC2, RDS, EKS, ECS, CloudFront, and...


With Rego Apptio Managed Support, you will get: Best Practice Guidance: Our team of senior Apptio experts all have 5 to 10 years of Apptio experience before joining our team. They have the knowledge and expertise to meet your organizations unique needs and guide you using best...

Free Trial


Starting from $0.00 to $0.12/hr for software + AWS usage fees


Rancher_1.6.30 on Ubuntu 22.04 with maintenance support by ATH.


This is a repackaged open source software product wherein additional charges apply for support. Rancher is a robust container management platform designed to streamline the deployment, orchestration, and...

Linux/Unix, Ubuntu 22.04 - 64-bit Amazon Machine Image (AMI)


It offers setting up Landing Zone, Hybrid Connectivity for enterprise moving to cloud. It also helps to setup AWS Root Account, AWS Organization, Automated Account Factory, AWS Services Catalog by using Terraform Scripts and AWS Control Tower using Well Architected practices. Enterprise governance...


The Six Pillars of Zero Trust are Identity, Devices, Applications, Data, Networks and Infrastructure. The primary aim of implementing a Zero Trust framework is to significantly reduce security risks. By assuming that no entity, whether inside or outside the network, can be trusted by default,...


Gain visibility into your cloud security posture with a free assessment powered by the Lacework platform. Migrating to the cloud enables businesses to move faster and be more agile. However, the shared responsibility model of cloud means you retain security obligations over your data,...


CONSOLE INTEGRATION There are no new UIs to learn - the config is stored in Security Groups directly, and the flow & audit logs go to CloudWatch. Because only AWS APIs are used for interfacing, you will never have to leave the AWS console or introduce new tooling. TRANSPARENT OPERATION No need...

Linux/Unix, Ubuntu 20.04 - 64-bit Amazon Machine Image (AMI)