PassLogic Enterprise Edition for AWS is a comprehensive multi-factor authentication solution designed to enhance organizational security by providing a variety of authentication methods. It offers 16 types of MFA by combining 8 different authentication methods, including the matrix-based "PassLogic Authentication," which delivers one-time passwords without the need for dedicated devices. This approach ensures both high security and user convenience, reducing management costs. Key Features and
Dive deeper into "aws" on G2 AI
FatPipe's Cloud Solution for AWS - MPVPN is a virtual SD-WAN appliance designed to enhance the performance, reliability, and security of cloud-based applications hosted on Amazon Web Services (AWS). By aggregating multiple data lines, it ensures seamless connectivity and mitigates session disruptions, providing a superior user experience for organizations relying on AWS-hosted services. Key Features and Functionality: - Improved User Experience: Offers faster and more reliable access to AWS ap
This product has charges associated with it, which includes AWS support. Debian 10 "buster" Server is suitable for many different use cases. Secure, Scalable & Faster.
Allows you to integrate popular Amazon Web Services (AWS) like SQS, Lambda, Kinesis, SNS and S3 out of the box with SAP PO. The adapter solutes nicely typical challenges like authentication, multiple api calls, polling and provides SAP PO developers with a simple configuration to integrate AWS
Amazon is a global e-commerce and cloud computing company founded in 1994 and headquartered in Seattle, Washington. The company operates through three main segments: North America, International, and Amazon Web Services (AWS). Amazon's retail platform offers millions of products across numerous categories through websites including amazon.com, amazon.ca, amazon.fr, amazon.de, and many others worldwide. The company manufactures electronic devices such as Kindle e-readers, Fire tablets, Fire TVs,
D55 is an AWS Advanced Consulting Partner helping SMEs and mid-market organizations unlock the full value of the cloud. Since 2018, we’ve specialized in AWS migration, modernization, and cost optimization, delivering scalable, secure, and future-ready solutions tailored to each client’s business goals. Our certified AWS specialists work closely with leadership and IT teams to design, migrate, and optimize workloads — ensuring agility, resilience, and long-term cost efficiency. Whether it’s movi
Qubitz AI is a customer-deployed, AWS-native Generative AI platform designed to enable businesses to rapidly build, deploy, and scale intelligent applications across various industries. By eliminating the complexities associated with AI development, Qubitz AI allows organizations to transition from prototype to production in minutes, ensuring enterprise-grade security and compliance throughout the process. Key Features and Functionality: - Speed to Value: Deploy production-ready AI workloads s
(Elastic Search, Kibana, Filebeat) stack helps analyze logs with advanced search, visualization, and alerting. Adopting cloud services results in increased log data that needs monitoring and analysis. AWS CloudWatch is a service for aggregating log data with limited analytics capabilities. Yet, setting up an ELK stack requires time and expertise. A pre-built ELK Stack saves resources by providing an optimized ELK environment tuned for AWS Observability.
To protect their services from various web threats, Cloud Service Providers (CSPs) such as AWS provide a Web Application Firewall (WAF), allowing the users to create and manage security rules that fit their needs. These user-centered self-service WAFs can block web attacks such as SQL Injections and Cross Site Scripting (XSS) and filter specific IP addresses or regions. However, as AWS WAF requires the users to create, configure, and manage the rules for AWS WAF on their own, the users are burd
CloudMover™ Head Node for AWS S3 is a robust solution designed to accelerate and simplify data transfers within the Amazon Web Services ecosystem. It addresses the challenges organizations face when moving large datasets across AWS regions or delivering data to clients, offering transfer speeds up to 30 times faster than traditional methods. With an intuitive graphical user interface , CloudMover™ enables users to manage data transfers efficiently without requiring extensive IT expertise. Key
This product has charges associated with it, which includes AWS support for this AMI image. CentOS Server pre-installed with AWS CLI - optimized for speed & performance for AWS. Made for cloud ready production servers.
CloudRobo AWS Task Scheduler, developed by Cognosys, is a robust solution designed to automate the scheduling of AWS EC2 instances, enabling users to manage their cloud resources more efficiently. By automating the start and stop times of EC2 instances, CloudRobo helps organizations optimize resource utilization and significantly reduce monthly AWS expenses. Key Features and Functionality: - Automated Scheduling: Set specific start and stop times for EC2 instances, ensuring they run only when
Cloudbric Managed Rules for AWS WAF-Bot Protection Rule Set mitigates the repetitive behaviors of bots such as scraper, scanner, and crawlers intended to damage the web application. The security experts of Penta Security collect and analyze the behavioral patterns of the bots to manage and update the rule set which proactively protect the web applications against malicious bots. Created based on the security technology and experience of WAPPLES, a web security product that has protected the we
AWS Managed Cloud Services deliver comprehensive cloud management and optimisation for startups and SMEs. Our certified experts handle deployment, monitoring, security, and cost optimisation to ensure peak performance and reliability. With proactive management, enhanced data protection, and continuous performance tuning, we help businesses reduce costs, improve scalability, and maximise ROI on their AWS investments.
Our famous CoreThreats is built by aggregating and analyzing over 800 quality threat intelligence feeds, applying human and machine intelligence, then rapidly updating the managed rules to block threats and attacker infrastructure. CoreThreats stops a broad range of attacks with very high accuracy.
Use the ThreatSTOP WAFXtender Managed ITAR and OFAC managed rules to remove risk, confusion and effort from meeting compliance and security challenges involving network communications with sanctioned countries. These continuously managed rules identify and block inbound connections from countries sanctioned by the following bodies: US State Department - International Traffic in Arms Regulations (ITAR), and the US Treasury Department - Office of Foreign Asset Control (OFAC).
Cloudbric Managed Rules for AWS WAF-OWASP Top 10 Rule Set detects abnormal traffic patterns and behaviors by utilizing the logic-based detection engine of Cloudbric WAF+ to protect the websites and web applications from the threats of OWASP Top 10 Web Application Security Risks such as SQL Injections and Cross-Site Scription (XSS). The logic-based detection engine, which was acknowledged by top research firms such as Gartner, Forrester, and Frost & Sullivan is automatically updated to ens
Cloudbric Managed Rules for AWS WAF-Malicious Reputation Rule Set detects and blocks IPs with high threat index using the Malicious IP Reputation list which is based on Penta Security's own Cyber Threat Intelligence (CTI), Cloudbric Labs. Founded on its data encryption technology in 1997, Penta Security is a leading provider of web and data security products, solutions, and services. The Threat DB of Cloudbric Labs, which has gained international recognition by also sharing its intelligence wi
Cloudbric Managed Rules for AWS WAF-Tor IP Detection Rule Set detects and blocks IPs that originate from Tor network. The origin of traffic when using the Tor Browser becomes anonymous as the traffic comes through 3 random servers (relays) within the Tor network, making it more difficult to block the traffic, as the IPs of Tor Browsers are difficult to detect using ordinary IP Risk Index. Tor IP Detection Rule Set utilizes a list of malicious Tor IPs, managed and updated regularly by the e
Vandis will work with your network and security teams to integrate Palo Alto Next-Generation Firewalls as a highly available VPN endpoint in a single region of AWS.