Vectra Threat Detection and Response for Partner Provided Consulting Engagements
An AWS Security Review is an opportunity to ensure that your cloud infrastructure is optimized for performance, security, reliability, and cost-effectiveness. Our certified AWS architects will identify any potential issues or areas for improvement in your AWS environment and make recommendations to get your back on track.
EJBCA PKI for Enterprises - A powerful and flexible certificate issuance and management system to issue and enable full life-cycle control of digital certificate and Certificate (CA), Registration (RA) and Validation Authorities (VA); enabling multiple use cases and standards compliance.
Fortinet FortiGate allows mitigation of blind spots to improve policy compliance by implementing critical security controls within your AWS environment. FortiGate firewall includes all of the security and networking services common to FortiGate physical appliances.
Escrow London's SaaS Escrow solutions for AWS provide continuity in the event of a situation in which the developer/software vendor are no longer able to support or provide their SaaS hosted applications. Escrow London assists their clients by creating these solutions assessing, migrating, supporting and managing services within the AWS Marketplace including Terraform, GitLab, Jenkins and others.
Watch my SSL ensures your website's security never lapses by diligently monitoring SSL certificates. Receive timely alerts before expiration, ensuring uninterrupted trust and safety for your visitors. A simple, yet essential tool for website administrators and businesses that value online security.
Collaborate with expert incident response practitioners from ScaleSec to develop and launch a tailored incident response program for your AWS environment. Developing an effective disaster recovery program is a critical step in reducing the impact from ransomware, malicious activity, and operational failures.
This product has charges associated with it for the build, maintenance and support of the Amazon Machine Image (AMI).
Get a quick, affordable assessment of your AWS environment with DuploCloud’s Well-Architected Review. Using Amazon’s Well-Architected Framework, we’ll evaluate your setup for security, performance, cost efficiency, and more. Our review highlights how your infrastructure aligns with best practices and pinpoints where to focus for immediate improvements. You’ll receive actionable insights across the five pillars of the framework, from essential fixes to long-term optimization strategies. DuploCloud’s review helps you prioritize resources for critical updates and prepares you for future cloud projects with a clear path forward.
High-performance VPN server on Linux with user management control web panel. It is designed to provide secure internet access for computers, mobile devices, and routers. Easy to use, this VPN server is fully operational immediately after launching, without requiring any server setup. It features a user-friendly web-based control panel for managing user entries - you can add, delete, or edit them. Remote user management via MySQL (port 3306) is allowed. Suitable for both individuals and companies offering VPN services.
Okta- Workforce Identity Cloud – Quick Start Implementation Services (WIC-QSIS) packaged services are provided for new Okta WIC customers , to accelerate the design and deployment of your chosen product subscriptions and provide a secure scalable foundation for your business needs
This service, provided by amdocs, provides comprehensive cloud infrastructure setup including a Landing Zone and security controls. This product ensures the secure and efficient deployment of cloud resources, while providing complete visibility and control of the underlying cloud infrastructure. This allows customers to quickly deploy their applications and services in a cost-effective and secure manner. Additionally, the product is designed to ensure that all essential security controls are in place to protect customers' data, resources, and applications.
The Enveil ZeroReveal solution allows entities to securely derive insights, cross-match, and search third-party data assets at scale without ever revealing the contents of the search itself, compromising the security or ownership of the underlying data, or exposing the requesting party's interests or intent.
Clave Security's Cloud Readiness Assessment helps organizations evaluate their preparedness for migrating to the AWS Cloud, identifying gaps, risks, and opportunities for optimization.
The CyberCX Secure Control Tower helps you meet your security and compliance goals, whether you are a Public Sector organisation that needs to comply with New Zealand or Australian information security controls (such as NZISM or IRAP assessments) or a Private Sector organisation complying with NIST CSF, CIS Critical Controls, PCI-DSS or other industry specific controls.
Bespoke security assessment and penetration testing services to ensure secure implementation of your applications and cloud resources.
Zendata offers comprehensive data protection, providing data usage context, identifying third-party risks, and ensuring policy alignment. Using AI, it unifies data sources for deeper insights while maintaining security and compliance. Zendata delivers preventive, detective, and corrective controls, and deploys privacy controls on LLM models to prevent data breaches.
Passbolt is the password manager your team was waiting for. Open source, self-hosted, extensible, OpenPGP based.
Innocom is a value-added distributor (VAD) of Aman Group that provides virtual desktops for R&D, DevOps teams, and data science. Powered by Citrix DAAS Platform. Also helps DevOps with deploying network infrastructure with Citrix ADC on the Kubernetes platform.
Skyrocket your cloud security posture management and align it with your Cloud Security strategy based on NIST CSF with NTT Data closely partnering with Wiz in order to ensure efficiency and quality. We provide specialized cloud security consulting and solutions tailored for platforms such as AWS leveraging decades of expertise in CNAPP technologies to deliver proven results. NTT Data guides clients through industry best practices and deploying the Wiz.io Cloud Security Posture Management achieving a single-pane of glass for cybersecurity risk thus driving mitigation focusing on the high priority issues. Our services include customized programs for aligning cybersecurity strategy based on NIST CSF, secure configurations, compliance frameworks, advanced automation, aiming to skyrocket cloud security posture and operational efficiency. This offering is based on the WIZ Market Place Offering: https://aws.amazon.com/marketplace/pp/prodview-ibgbkrqusncsm
This is a repackaged open source software product wherein additional charges apply for patching the operating system and the maintenance provided by Kurian. This AMI has Keycloak installed as a service with PostgreSQL as the backend database.
Gitpod Flex provides on-demand, secure cloud development environments or CDEs. These environments include everything a developer needs, including tools, code and dependencies, and can seamlessly be shared and cloned across the team.
In today's dynamic and complex cloud environments, security vulnerabilities and misconfigurations can inadvertently expose organizations to significant risks. Oasis Technologies with Palo-Alto Networks Prisma Cloud solution enable organizations a clear understanding of their current cloud security status and offer recommendations for improving their security posture. Together with a Cloud Security Posture Assessment (CSPA) service, it is possible to gain a comprehensive understanding of organizations cloud security landscape and ensuring that the digital assets are adequately protected.
Complete IT management. From anywhere. Modernize your IT operations with the ability to monitor, manage, and support all your devices and users.
In the transition to the cloud, a clear understanding of cloud networking is critical to the security and reliability of your application. Book an AWS Networking immersion day with Pelotech to ensure your organization is prepared.
NZTA is a cloud-based SaaS (Software as a Service) application that provides fully-managed zero-trust authentication and access control for an organization's application infrastructure.3 Nic M5 supported version.
Atlantic Data Security provides 24/7 monitoring of your Netskope infrastructure ensuring that critical events do not go unnoticed. We perform system health, events, and alerts all will be logged and either escalated to your organization or resolved on your behalf.
Best in class solution to protect your cloud workloads and gain the complete visibility across your cloud infrastructure.
Our automated Anti-virus and Anti-malware scanning implementation services provide enhanced security with real-time protection for your critical data stored in AWS Storage solutions, including Amazon S3, Amazon WorkDocs, Amazon EFS, Amazon FSx ONTAP, and Amazon EBS.
A Well-Architected Review (WAR) is a special methodology developed by AWS to evaluate how well your architecture aligns with AWS best practices. The AWS Well-Architected Partner Program enables Nub8 to design and operate secure, reliable, efficient, cost-effective, and sustainable workloads in the AWS Cloud. Nub8 will help identify risks in the actual production architecture against best practices and improve your business and customer needs.