Discover software listings available in AWS Marketplace from MaxTechnologies. Request a private offer for custom pricing, and make your purchases in AWS Marketplace using your AWS account.
Deploy end-to-end CrowdStrike Falcon Cloud Security across AWS accounts, EKS clusters, and ECS workloads. Includes runtime protection, admission control, image assessment, and full cloud visibility.
Buurst SoftNAS provides cloud storage performance, security, high availability, and support for the most extensive set of storage protocols in the industry: NFS, CIFS/SMB-AD, iSCSI. Your data is our number one priority.
Bedroc provides consulting, and co-implements with a PasS provider. We collaborate with our select software vendor by vetting the client solution required given the environment constraints. Bedroc provides cloud security analysis, posture management, remediation a full implementation and an option for continuous implementation service. This aligns with an adaptive security strategy to provide ongoing threat and posture management (CSPM) services. We utilize Amazon cloud-native build, terraform and a selected 3rd party SaaS vendor partner for ongoing software management and monitoring on the client's environment.
FORTBRIDGE offers comprehensive cloud security assessment services to identify potential risks and misconfigurations in your cloud infrastructure. Our expert consultants provide tailored solutions for AWS, Azure, and GCP, helping you enhance your cloud security posture and protect critical data.
CrowdStrike Implementation Services: Installation, Configuration, Integration, and Migration, all of which are designed to ensure a seamless and effective deployment of CrowdStrike's innovative endpoint protection platform (Falcon), LogScale, Identity Protection, Vulnerability Management (Spotlight), and Cloud Security Posture Management (Horizon)
NTT Ltd Brazil can offer the CrowdStrike Falcon Endpoint Protection solution at a lower cost based on a special program created by CrowdStrike and AWS together for the clients.
The Netskope optimisation service is designed to enhance the performance, security, and management of internet access across an organisation. It involves configuring and tuning Netskope features to meet specific business needs, ensuring that the security policies are effectively protecting against threats while minimising impact on user experience. This service helps in optimising the use of Netskope’s cloud platform for secure internet access, improving overall internet performance and security posture.
Falcon Identity Protection protects workforce identities everywhere - for any user, location, application and deployment. Secure Active Directory (AD), enable secure, frictionless remote access, and extend MFA security everywhere.
Protect user identities and secure endpoints with the combined power of Okta’s Identity Access Management and CrowdStrike’s Endpoint Detection and Response. This integrated solution enables adaptive, risk-aware security decisions, ensuring Zero Trust access across users, devices, and applications.
The Sekuro Zscaler Internet Access (ZIA) optimisation service is designed to enhance the performance, security, and management of internet access across an organisation. It involves configuring and tuning ZIA features to meet specific business needs, ensuring that the security policies are effectively protecting against threats while minimising impact on user experience. This service helps in optimising the use of Zscaler's cloud platform for secure internet access, improving overall internet performance and security posture.
Automate CrowdStrike Falcon sensor installation and configuration in your EC2 Image Builder AMI creation pipeline.
This product has charges associated with the pre-built hardening to the CIS Benchmarks™ and recurring maintenance. The CIS Hardened Images® are hardened in accordance with the associated CIS Benchmarks, an industry best practice for secure configuration. Reduce cost, time, and risk by building your AWS solution with CIS AMIs.