Sign in
Categories
Your Saved List Become a Channel Partner Sell in AWS Marketplace Amazon Web Services Home Help

Device Management (104 results) showing 61 - 70



Claroty xDome spans the entire cybersecurity journey, from empowering organizations with comprehensive asset visibility, identifying, measuring, and prioritizing risk, to deploying Zero Trust-based protective controls, to optimizing threat detection through a vast network of integrations. xDome is...


Sensor library converts more than 500 sensor binary data to json readable messages. As a software vendor, you can use sensor library to make your software compatible with all our supported sensors very quickly. As a telco, you can use sensor library on top of your connectivity to bring more value...


Eviden ASGS helps forward-thinking utility companies implement effective smart grid and smart metering strategies, improving existing systems whenever possible and without the need for major capital investment or mega IT projects. ASGS is the new smart grid nerve center. The suite collects and...


When it comes to IoT device management tools, you’ve got three choices. The first option is building your own IoT device management tools, an expensive and time consuming process that’s especially difficult for first-time builders. The second option is buying vendor tools, a narrow solution that...


Apexon’s RDMP provides a framework that aligns remote monitoring, management and data analysis in a single platform. Built to take advantage of AWS-managed components, the platform allows product engineering and operations teams to support their customers and, importantly, provide a more complete...


As an AWS partner, we leverage several AWS services, such as KVS and Amazon FreeRTOS, to connect MCU devices to the cloud. We are leveraging AWS services such as Rekognition and SageMaker to quickly build AI applications, while enabling easy to deploy and secure device interactions with cloud...


Organizations are increasingly facing stealthy targeted attacks, designed to bypass existing security defenses. These attacks can monetize stolen intellectual property, encrypt essential data for ransom, or damage the flow of information in the case of nation state attacks. Advanced threat...


Typically, companies involved in managing large portfolios of generation plants have to collect measures to calculate production KPIs and to enable asset monitoring, with the goal of improving energy production and asset management. These tasks require dealing with the great variety of...


Qualys Cloud Platform. The revolutionary architecture that powers Qualys’ IT security and compliance cloud apps. Sensors that provide you continuous visibility - Whether on premises, at endpoints, on mobile, in containers or in the cloud, OT and IoT, Qualys Cloud Platform sensors are always on,...