Products

AWS

Discover software listings available in AWS Marketplace from MaxTechnologies. Request a private offer for custom pricing, and make your purchases in AWS Marketplace using your AWS account.

CrowdStrike Falcon Integration for AWS, EKS, and ECS logo

CrowdStrike Falcon Integration for AWS, EKS, and ECS

Deploy end-to-end CrowdStrike Falcon Cloud Security across AWS accounts, EKS clusters, and ECS workloads. Includes runtime protection, admission control, image assessment, and full cloud visibility.

SoftNAS - High Performance NFS/CIFS/iSCSI Cloud NAS logo

SoftNAS - High Performance NFS/CIFS/iSCSI Cloud NAS

Buurst SoftNAS provides cloud storage performance, security, high availability, and support for the most extensive set of storage protocols in the industry: NFS, CIFS/SMB-AD, iSCSI. Your data is our number one priority.

Cloud Security Posture Management - Consulting and Implementation logo

Cloud Security Posture Management - Consulting and Implementation

Bedroc provides consulting, and co-implements with a PasS provider. We collaborate with our select software vendor by vetting the client solution required given the environment constraints. Bedroc provides cloud security analysis, posture management, remediation a full implementation and an option for continuous implementation service. This aligns with an adaptive security strategy to provide ongoing threat and posture management (CSPM) services. We utilize Amazon cloud-native build, terraform and a selected 3rd party SaaS vendor partner for ongoing software management and monitoring on the client's environment.

Cloud Security Assessment Review – FORTBRIDGE logo

Cloud Security Assessment Review – FORTBRIDGE

FORTBRIDGE offers comprehensive cloud security assessment services to identify potential risks and misconfigurations in your cloud infrastructure. Our expert consultants provide tailored solutions for AWS, Azure, and GCP, helping you enhance your cloud security posture and protect critical data.

CrowdStrike Implementation Services by Abira Security logo

CrowdStrike Implementation Services by Abira Security

CrowdStrike Implementation Services: Installation, Configuration, Integration, and Migration, all of which are designed to ensure a seamless and effective deployment of CrowdStrike's innovative endpoint protection platform (Falcon), LogScale, Identity Protection, Vulnerability Management (Spotlight), and Cloud Security Posture Management (Horizon)

CrowdStrike Falcon Endpoint Protection – by NTT Ltd Brazil logo

CrowdStrike Falcon Endpoint Protection – by NTT Ltd Brazil

NTT Ltd Brazil can offer the CrowdStrike Falcon Endpoint Protection solution at a lower cost based on a special program created by CrowdStrike and AWS together for the clients.

Netskope Optimisation Service logo

Netskope Optimisation Service

The Netskope optimisation service is designed to enhance the performance, security, and management of internet access across an organisation. It involves configuring and tuning Netskope features to meet specific business needs, ensuring that the security policies are effectively protecting against threats while minimising impact on user experience. This service helps in optimising the use of Netskope’s cloud platform for secure internet access, improving overall internet performance and security posture.

CrowdStrike Falcon Identity Protection logo

CrowdStrike Falcon Identity Protection

Falcon Identity Protection protects workforce identities everywhere - for any user, location, application and deployment. Secure Active Directory (AD), enable secure, frictionless remote access, and extend MFA security everywhere.

View offer on AWS
Okta Identity Security Implementation logo

Okta Identity Security Implementation

Protect user identities and secure endpoints with the combined power of Okta’s Identity Access Management and CrowdStrike’s Endpoint Detection and Response. This integrated solution enables adaptive, risk-aware security decisions, ensuring Zero Trust access across users, devices, and applications.

Zscaler Optimisation Service logo

Zscaler Optimisation Service

The Sekuro Zscaler Internet Access (ZIA) optimisation service is designed to enhance the performance, security, and management of internet access across an organisation. It involves configuring and tuning ZIA features to meet specific business needs, ensuring that the security policies are effectively protecting against threats while minimising impact on user experience. This service helps in optimising the use of Zscaler's cloud platform for secure internet access, improving overall internet performance and security posture.

CrowdStrike Falcon Sensor - Linux logo

CrowdStrike Falcon Sensor - Linux

Automate CrowdStrike Falcon sensor installation and configuration in your EC2 Image Builder AMI creation pipeline.

CIS Hardened Image Level 1 on Rocky Linux 9 logo

CIS Hardened Image Level 1 on Rocky Linux 9

This product has charges associated with the pre-built hardening to the CIS Benchmarks™ and recurring maintenance. The CIS Hardened Images® are hardened in accordance with the associated CIS Benchmarks, an industry best practice for secure configuration. Reduce cost, time, and risk by building your AWS solution with CIS AMIs.