Solutions for Defense and National Security

Discover curated Solutions that address varied defense and national security use cases

Transforming defense and national security with AWS

Unlock the full potential of the cloud and innovate faster. AWS offers the broadest set of services, Solutions, and Guidance coupled with pre-built industry AWS Partner Solutions to make it easier to select the right tools for your highest-priority workloads. Use Defense and National Security Solutions on AWS to enhance mission-critical operations, accelerate secure data analysis, and drive technological advancement across defense agencies.

blue circles

Browse Solutions for defense and national security

Explore AWS Services, ready-to-deploy AWS Solutions, specialized Partner Solutions, and architectural Guidance for your defense and national security use cases.

Filter solutions by use case:

Solution Type
Logical Infrastructure
Mission Accelerators
Productivity and Business Operations
Security and Compliance
1-8 (8)
Showing results: 1-8
Total results: 8
  • Last Update
  • Name (A->Z)
  • Name (Z->A)
No solutions found matching that criteria.
  • AWS Solution

    Landing Zone Accelerator on AWS

    Deploy the Landing Zone Accelerator on AWS solution to quickly deploy a secure, resilient, scalable, and fully automated cloud foundation.
  • Guidance

    Trusted Secure Enclaves on AWS

    This Guidance shows how you can build a comprehensive cloud architecture for sensitive workloads in national security, defense, and national law enforcement.
  • Partner Solution

    Antivirus for Amazon S3 by Cloud Storage Security

    Antivirus for Amazon S3 is an automated security solution that discovers and scans files uploaded to Amazon S3 for malware and other threats. It integrates natively, scales automatically, and does not interfere with DevOps. It's simple to set up, flexible enough to fit into any workflow, and starts protecting users in 15 minutes or less.
  • Partner Solution

    VM-Series on AWS

    The VM-Series on AWS complements AWS security groups and web application firewalls by controlling your AWS traffic based on the application identity and preventing known and unknown threats within the allowed application flows. Automation features enable security to be embedded into workflows.
  • Partner Solution

    Trusted Secure Enclaves - Sensitive Edition

    A secure AWS Landing Zone for Government, National Security, Defence, and Critical Infrastructure based on Trusted Secure Enclaves - Sensitive Edition
  • Partner Solution

    Trusted Secure Enclaves (TSE) by Cloudscaler

    Trusted Secure Enclaves (TSE) is a highly secure landing zone pattern assured by AWS that ensures the highest level of security and compliance in highly regulated sectors.
  • Partner Solution

    DispersiveCloud™ Optimized Gateway Provides Enhanced Security for AWS™

    The DispersiveCloud™ Optimized Gateway (DCOG) enables AWS™ customers to quickly and seamlessly enable edge-to-cloud security and privacy with the click of a button. The DispersiveCloud overcomes the limitations of traditional IPsec VPNs and provides military-grade security and award-winning cloud obfuscation technology protecting data in transit from all threat actors.
  • Partner Solution

    Jezero-TSE

    Jezero-TSE, the innovative solution from IdentityE2E, the UK's first TSE Vetted Partner, ensures secure, compliant cloud adoption. Seamlessly integrating AWS-TSE with Jezero, our secure platform accelerator, Jezero-TSE enhances your cloud journey with exceptional efficiency and speed. Seamlessly integrating AWS TSE with Jezero's leading practices, we leverage over a decade of LZA and TSE expertise to support critical workloads in sectors like National Security, Defence, and Law Enforcement. Built on Jezero's robust framework, this enterprise-ready, licence-free platform ensures strict adherence to rigorous security and compliance standards, enhanced by value-added services, a comprehensive operating model, and intuitive tooling. Jezero-TSE provides a structured framework for guardrails, compliance, and configuration, tailored to your requirements for sensitive and protected workloads. We enable secure, large-scale operations, freeing you to focus on core objectives.
1
Back to top