Sign in
Categories
Your Saved List Become a Channel Partner Sell in AWS Marketplace Amazon Web Services Home Help

Security (4368 results) showing 4201 - 4210



Starting from $0.00/hr or from $0.00/yr (up to 70% savings) for software + AWS usage fees

This is a repackaged open source software wherein additional charges apply for extended support with a 24 hour response time. This image comes with Fedora 32 installed and includes support. This Minimal Fedora 32 server is designed to be light-weight and up to date on deployment for ease of use,...

Linux/Unix, Fedora 32 - 64-bit Amazon Machine Image (AMI)


With the increase in phishing and other identity attacks in our day and age, authentication that requires a username and password (e.g. RADIUS) can be potentially at risk. Sophisticated social engineering schemes and clever tactics can fool even the savviest of users. In order to combat this and...


Starting from $0.05 to $0.05/hr for software + AWS usage fees

Proxy Server using Squid Proxy Cache on Windows Server 2016 This AWS Squid proxy caching server has been optimised for speed and high performance running on Windows Server 2016 Squid offers a rich set of traffic optimization options, most of which are enabled by default. Squid is a caching proxy...

Windows, Windows Server 2016 Base Windows Server 2016 - 64-bit Amazon Machine Image (AMI)


Cloud Data Security (CDS) simplifies the security of your data in AWS databases, enabling your security team to catch up and keep up with the speed of DevOps. CDS is a SaaS solution that automatically identifies the most critical security problems in your DBaaS, helps you fix them, and detects...


The Securityhub Heatmap is a lightweight container creating a 3D environment from all of your security hub findings across all regions. The compelling visualization allows you to quickly cut to the chase and mitigate risks across your entire environment With high level overviews and drill downs...


: Operate over any network. SpiderOak offers tools which enable the creation of secure virtual enclaves designed to offer strict need-to-know assurances. We believe you deserve the easy, efficient deployment of SaaS solutions without compromising the security of the mission, sensitive...

Linux/Unix, Red Hat Enterprise Linux 8 - 64-bit Amazon Machine Image (AMI)


Auspex Observatory™ processes network telemetry to provide real-time threat analysis and visualization. Internal and external attackers can be rapidly identified and mitigated. This tool uses behavioral anomaly detection for finding aberrant activities on your network. Our analytics can start...


The CyberMDX Healthcare Security Suite focuses on IoT, medical devices, and assets connected to clinical networks, providing complete visibility and network protection by leveraging our expertise with Artificial Intelligence (AI) technology, medical device vulnerability research, and a wide range...


Bridgecrew is changing the way teams secure their cloud infrastructure. By leveraging automation, Bridgecrew's developer-first platform identifies and fixes cloud violations and infrastructure-as-code misconfigurations. With integrations with source control and CI/CD pipelines, Bridgecrew...


Password-based security has become less secure in recent times due to more sophisticated phishing attacks and challenges faced by users to create and manage numerous passwords. Also, the centralized storage of millions of user credentials (including passwords) in a cloud or a website server can...