Researchers need to ensure that the data they collect and analyze is handled in a secure manner. Protecting participant data, complying with regulations, and following best practices related to data security has to be enforced across the entire data pipeline. Research Data Security solutions on AWS can help researchers maintain and secure their data pipeline so they can securely achieve mission goals.
Partner Solutions
Software, SaaS, or managed services from AWS Partners
![](https://d1.awsstatic.com/Gradient-Divider-orange-blue.317b0a6e1db69aa03ede8c5fd6fad7ee117a626f.jpg)
Total results: 10
- Date
-
Arctic Wolf Security Operations Platform - Managed Detection…
Arctic Wolf® is a global leader in security operations, delivering the first cloud-native security operations platform to end cyber risk. Powered by threat telemetry spanning endpoint, network, and cloud sources, the Arctic Wolf® Security Operations Cloud ingests and analyzes more than 1.9 trillion security events a week across the globe, enabling critical outcomes for most security use cases and optimizing customers’ disparate security solutions. Now deployed to more than 3,000 customers worldwide, the Arctic Wolf® Platform delivers automated threat detection and response at scale, and empowers organizations of any size to establish world-class security operations with the push of a button. -
Dynatrace
Dynatrace provides software intelligence to simplify enterprise cloud complexity and accelerate digital transformation. With AI and complete automation, our all-in-one platform provides answers, not just data, about the performance of applications, the underlying infrastructure and user experience. -
Zscaler Zero Trust Exchange™
The Zscaler Zero Trust Exchange™ is a cloud native cybersecurity platform built on zero trust architecture. Following the principle of least-privileged access, the platform establishes trust based on user identity and context—including location, device, application, and content—and then creates secure, direct user-to-app, app-to-app, and machine-to-machine connections.