Sign in
Categories
Your Saved List Become a Channel Partner Sell in AWS Marketplace Amazon Web Services Home Help

Cloud Governance (275 results) showing 41 - 50



No matter what your specific cloud question may be, our team of AWS Certified Solutions Architects are here to help, at no charge and with no strings attached. We can help you clarify your priorities, sort through technical challenges, AWS how to's and get you pointed in the right...


IBM Security Verify Governance is based on mature product for Identity Governance and Administration (IGA) solutions that are focused on automation of identity lifecycle management with the flexible provisioning policies and workflows to support identity joiner, mover and leaver change control...


Adversaries have long counted on IT and cloud complexity to hide their entry, movement, and exfiltration of data. Successfully detecting and exposing adversaries requires discovering + classifying high-impact data and monitoring its usage quickly and accurately across all data...


We are a cyber security company that safeguards organisations from the threat of bot attacks. We enable organisations to gain visibility and control over human, good bot, and bad bot traffic without imposing friction on legitimate users. Our deep-tech machine learning solution protects any website...


BlueArch's Update Engine automates cloud resource cleanup and expiration tagging, helping organizations save costs and maintain tidy cloud infrastructures. Customizable policies and automated deletion of resources, such as those resulting from broken CI runs or failed IaC deployments, reduce the...


Acutis Cloud Enclave (ACE) is a fortified defense perimeter compliant with CMMC 2.0 110 practice controls. It safeguards assets with a NextGen AI-driven firewall, secure productivity suite, encrypted storage, and cybersecurity training. ACE defends against threats, ransomware, and breaches,...

Free Trial


Resourcely is your paved road to secure, efficient, and easy-to-manage cloud infrastructure. We take a proactive approach to preventing security breaches caused by misconfiguration and enhancing developer productivity. In modern software development, developers have to focus not only on developing...


Juvare Unified Command Platform (UCP) is a whole-of-government solution created exclusively for U.S. federal and defense agencies. Hosted on the Juvare Federal Cloud (JFC), which has been granted a FedRAMP® High impact level authorization, Juvare UCP combines unparalleled data and metadata security...


Comprehensive PCI Reporting Our solution comes with pre-configured scan templates, empowering you to scan, remediate, and dispute failures at your convenience. With ESOF PCI ASV, you maintain control over your compliance journey. All-in-One PCI Dashboard Stay updated on your PCI compliance...