Which AWS service or feature can the ISV use to securely provide access to its application?

Skip to Main Content

Show

Cloud security software

Strengthen your portfolio, predict risk, accelerate fraud detection, and augment advisory services all from a single destination, AWS Marketplace

Learn how SOAR helps you streamline security while improving your defenses against cyber attacks

Watch this webinar to explore the Security orchestration, automation, and response (SOAR) paradigm, its relationship with organization IT practices, and its role in your security strategy

Which AWS service or feature can the ISV use to securely provide access to its application?

Deploy a comprehensive security architecture

From initial migration through ongoing day-to-day security platform management, leverage independent software vendors (ISVs) with proven success securing cloud adoption.

Which AWS service or feature can the ISV use to securely provide access to its application?

Reduce risk without losing speed

Minimize business disruptions by quickly procuring and deploying enterprise security software solutions that can manage identity and access, detect intrusions, and enable faster response times.

Which AWS service or feature can the ISV use to securely provide access to its application?

Integrate easily with AWS

Leverage security tools that are designed for AWS interoperability to follow security best practices.

Browse the use cases below and discover popular products that others like you are also using to enhance security in the cloud.

Displaying 3 of 9

Displaying 5 of 9

Displaying 6 of 9

Displaying 7 of 9

  • Which AWS service or feature can the ISV use to securely provide access to its application?

    Application security

  • Which AWS service or feature can the ISV use to securely provide access to its application?

    Cloud security

  • Which AWS service or feature can the ISV use to securely provide access to its application?

    Identity and access control

  • Which AWS service or feature can the ISV use to securely provide access to its application?

    Endpoint security

  • Which AWS service or feature can the ISV use to securely provide access to its application?

    Governance, risk, & compliance

  • Which AWS service or feature can the ISV use to securely provide access to its application?

    Network security

  • Which AWS service or feature can the ISV use to securely provide access to its application?

    Security information and event management

  • Which AWS service or feature can the ISV use to securely provide access to its application?

    Web application firewall and edge security

  • Which AWS service or feature can the ISV use to securely provide access to its application?

    Managed security services

  • Application security

    Assess code, logic, and application inputs to identify vulnerabilities and security risks in your applications.

    Listed alphabetically

    Which AWS service or feature can the ISV use to securely provide access to its application?

    Which AWS service or feature can the ISV use to securely provide access to its application?

    Codebashing

    Codebashing by Checkmarx teaches developers the principles of secure coding and helps them sharpen application security skills in a very efficient way. 

    Learn more 

    Which AWS service or feature can the ISV use to securely provide access to its application?

    SecureSphere WAF for AWS

    Protect applications, APIs, and data on AWS. SecureSphere WAF combines an enterprise-class web application firewall with cloud-based DDoS protection and visibility and control for your AWS Management Console. 

    Learn more 

    See how it works
    Video

    Which AWS service or feature can the ISV use to securely provide access to its application?

    Application Security Platform

    Mend, formerly known as WhiteSource, secures and integrates with your software development lifecycle and automates your entire open source components management process. 

    Learn more 

    Which AWS service or feature can the ISV use to securely provide access to its application?

    Developer Security Platform

    Snyk is a developer-first security solution that helps organizations use open source and stay secure. Snyk seamlessly and proactively finds and fixes vulnerabilities and license violations in open source dependencies and containers. 

    Learn more 

    Which AWS service or feature can the ISV use to securely provide access to its application?

    Secure DevOps Platform - Enterprise Tier

    Confidently secure containers, Kubernetes, and cloud with the Sysdig Secure DevOps Platform. Scan images, flag misconfigurations, detect and respond to threats, validate compliance, monitor and troubleshoot issues.

    Learn more 

    See how it works
    Video

    Which AWS service or feature can the ISV use to securely provide access to its application?

    Security labs

    Veracode’s solutions enable developers to identify, prioritize and fix vulnerabilities within the development workflow, adopting DevSecOps best practices. 

    Learn more 

    Top resources for application security

    Which AWS service or feature can the ISV use to securely provide access to its application?

    WHITEPAPER

    How to fuel your DevSecOps in AWS

    Building a security automation strategy for the DevOps pipeline can help meet the goal of “shifting left” without slowing down the development process.

    Which AWS service or feature can the ISV use to securely provide access to its application?

    Which AWS service or feature can the ISV use to securely provide access to its application?

  • Cloud security

    Secure your cloud assets and maintain compliance with continuous infrastructure monitoring designed to detect misconfigurations and gaps in your organization's security policy.

    Listed alphabetically

    Which AWS service or feature can the ISV use to securely provide access to its application?

    MDR Professional

    SaaS Contract (US)
    Aqua Enterprise Platform provides insights and security automation that secures workloads on any cloud or platform, across containers, VMs, and serverless. 

    Learn more 

    Which AWS service or feature can the ISV use to securely provide access to its application?

    Enterprise platform (PAYG)

    Aqua's Cloud Native Security Platform provides full visibility into container activity, allowing organizations to detect and prevent suspicious activity and attacks, providing transparent, automated security.

    Learn more 

    Which AWS service or feature can the ISV use to securely provide access to its application?

    Security Management

    BYOL
    A single security management console delivers consistent visibility, policy management, logging, reporting and control across all cloud environments and networks. 

    Learn more 

    See how it works
    Video

    Which AWS service or feature can the ISV use to securely provide access to its application?

    Antivirus for Amazon S3

    Antivirus for Amazon S3 is an automated security solution that discovers and scans files uploaded to Amazon S3 for malware and other threats. It integrates natively, scales automatically, and does not interfere with DevOps. 

    Learn more 

    Which AWS service or feature can the ISV use to securely provide access to its application?

    Cloud security

    CrowdStrike Cloud Security unifies cloud security posture management together with breach protection for cloud workloads and containers for any cloud, in a single platform. 

    Learn more 

    See how it works
    Video

    Which AWS service or feature can the ISV use to securely provide access to its application?

    Which AWS service or feature can the ISV use to securely provide access to its application?

    Which AWS service or feature can the ISV use to securely provide access to its application?

    Public Cloud Security

    The Netskope security cloud provides unrivaled visibility and real-time data and threat protection when accessing cloud services, websites, and private apps from anywhere, on any device. 

    Learn more 

    Which AWS service or feature can the ISV use to securely provide access to its application?

    Which AWS service or feature can the ISV use to securely provide access to its application?

    Developer Security Platform

    Business and Enterprise Tiers
    Develop fast, stay secure. Snyk enables more than 2.2 million developers to find and fix vulnerabilities in their code, open source libraries, containers and configuration files. 

    Learn more 

    Which AWS service or feature can the ISV use to securely provide access to its application?

    Central Cybersecurity

    Sophos Central Cybersecurity secures workloads, data, apps, and access. Sophos protects against ransomware, advanced threats, and more across endpoints, cloud workloads, servers, mobile devices, networks, and email. 

    Learn more 

    See how it works
    Video

    Which AWS service or feature can the ISV use to securely provide access to its application?

    Sumo Logic Cloud SIEM

    Stay ahead of your changing attack surface by surfacing deep security insights. Built in the cloud for the cloud, Sumo Logic alleviates the challenges of security monitoring for your cloud and multi-cloud infrastructure.

    Learn more 

    Which AWS service or feature can the ISV use to securely provide access to its application?

    Secure DevOps Platform

    Sysdig secures containers, Kubernetes, and cloud, making it easy to run and scale. It can scan images, flag misconfigurations, detect and respond to threats, validate compliance, monitor, and troubleshoot issues. 

    Learn more 

    Which AWS service or feature can the ISV use to securely provide access to its application?

    Tenable Core + Tenable.sc

    Tenable.sc gathers and evaluates vulnerability data across multiple Nessus® scanners distributed across your enterprise. Utilizing advanced analytics, customizable dashboards/reports and workflows to identify weaknesses on your network. 

    Learn more 

    Which AWS service or feature can the ISV use to securely provide access to its application?

    Deep Security

    Trend Micro Deep Security provides visibility and threat protection services to help prevent unwanted and unknown apps from executing on your endpoints.

    Learn more 

    See how it works
    Video

    Top resources for cloud security

    Which AWS service or feature can the ISV use to securely provide access to its application?

    Which AWS service or feature can the ISV use to securely provide access to its application?

  • Identity and access management

    Define and manage identity and access policies while enforcing governance through a variety of approaches including authentication, identity access management (IAM), and single sign-on (SSO).

    Listed alphabetically

    Which AWS service or feature can the ISV use to securely provide access to its application?

    Identity Platform

    Auth0 Identity Platform provides universal authentication and authorization for web, mobile, IoT, and legacy apps, protecting the identities of all users. 

    Try now 

    See how it works
    Video

    Which AWS service or feature can the ISV use to securely provide access to its application?

    Workforce Identity

    CyberArk Identity helps overcome user authentication, authorization, and auditing challenges accompanying digital transformation. It streamlines operations and gives workers simple and secure access to all their resources.

    Learn more 

    See how it works
    Video

    Which AWS service or feature can the ISV use to securely provide access to its application?

    Identity Platform

    With the Okta Identity Cloud, organizations can securely connect their workforces, partners and customers to the right technology at the right time. 

    Try now 

    See how it works
    Video

    Which AWS service or feature can the ISV use to securely provide access to its application?

    Customer Identity & Access Management

    Confidently secure containers, Kubernetes, and cloud with the Sysdig Secure DevOps Platform. Scan images, flag misconfigurations, detect and respond to threats, validate compliance, monitor and troubleshoot issues.

    Learn more 

    See how it works
    Video

    Which AWS service or feature can the ISV use to securely provide access to its application?

    Customer Identity Solutions

    With the cloud-delivered Ping Customer Identity Platform, you deliver the convenience and usability your customers expect while meeting the security, interoperability and performance requirements of your enterprise IT team. 

    Learn more 

    See how it works
    Video

    Which AWS service or feature can the ISV use to securely provide access to its application?

    Identity Security

    SailPoint is the leader in identity security for the cloud enterprise, ensuring workers have the right access to do their job - no more, no less. 

    Learn more 

    See how it works
    Video

    Top resources for identity and access control

    Which AWS service or feature can the ISV use to securely provide access to its application?

    ON-DEMAND WEBINAR

    How to design a least privilege architecture in AWS

    Review examples of how to set up a least privilege stack, covering such key issues as where to start and what to prioritize. You'll also review real-world use cases of least privilege stacks and effective micro-segmentation methods that have been deployed in AWS.

    Which AWS service or feature can the ISV use to securely provide access to its application?

    ON-DEMAND WEBINAR

    How to Implement a Software-Defined Network Security Fabric in AWS

    Review examples of how to set up a least privilege stack, covering such key issues as where to start and what to prioritize. You'll also review real-world use cases of least privilege stacks and effective micro-segmentation methods that have been deployed in AWS.

  • Endpoint security

    Protect and enhance the security of endpoints against malware, unpatched vulnerabilities, data leaks, and other potential cybersecurity risks.

    Listed alphabetically

    Which AWS service or feature can the ISV use to securely provide access to its application?

    Endpoint Protection

    CrowdStrike Falcon Endpoint Protection delivers comprehensive and easy-to-use endpoint and workload protection, backed 24/7 by CrowdStrike’s elite team of experts. 

    Learn more 

    See how it works
    Video

    Which AWS service or feature can the ISV use to securely provide access to its application?

    Antivirus for Amazon S3

    Antivirus for Amazon S3 is an automated security solution that discovers and scans files uploaded to Amazon S3 for malware and other threats. It integrates natively, scales automatically, and does not interfere with DevOps. 

    Learn more 

    Which AWS service or feature can the ISV use to securely provide access to its application?

    Reveal(x) 360

    SaaS-Based Network Detection and Response. Reveal(x) 360 combines the breadth of VPC Flow Logs with the depth of packets in a single tool. Gain visibility across workloads, detect threats in real-time, investigate, identify, and respond with confidence. 

    Learn more 

    See how it works
    Video

    Which AWS service or feature can the ISV use to securely provide access to its application?

    Security Implementation Services

    GuidePoint Security provides expertise and hands-on assistance with the evaluation and selection, implementation, optimization and management of best-fit security solutions for your environment. 

    Learn more 

    Which AWS service or feature can the ISV use to securely provide access to its application?

    Managed Detect & Respond

    Confidently secure containers, Kubernetes, and cloud with the Sysdig Secure DevOps Platform. Scan images, flag misconfigurations, detect and respond to threats, validate compliance, monitor and troubleshoot issues.

    Learn more 

    Which AWS service or feature can the ISV use to securely provide access to its application?

    Which AWS service or feature can the ISV use to securely provide access to its application?

    Central Cybersecurity

    Sophos Central Cybersecurity secures workloads, data, apps, and access. Sophos protects against ransomware, advanced threats, and more across endpoints, cloud workloads, servers, mobile devices, networks, and email. 

    Learn more 

    Which AWS service or feature can the ISV use to securely provide access to its application?

    Tanium as a Service

    Tanium as a Service (TaaS) is an endpoint management and security platform providing visibility, control and rapid response. 

    Try for free 

    Which AWS service or feature can the ISV use to securely provide access to its application?

    Cloud One

    Trend Micro Cloud One provides visibility and threat protection services to help prevent unwanted and unknown apps from executing on your endpoints. 

    Try for free 

    Top resources for endpoint security

  • Governance, risk, and compliance

    Helps provide analysis to assess controls or AWS policies (IAM, Amazon S3) as well as regulatory frameworks such as PCI, GDPR, CCPA, and HIPAA to name a few.

    Listed alphabetically

    Which AWS service or feature can the ISV use to securely provide access to its application?

    Which AWS service or feature can the ISV use to securely provide access to its application?

    The Devo Platform

    The Devo Platform and integrated apps provide cloud-native logging and security analytics that security teams need to better detect and respond to threats. 

    Learn more 

    See how it works
    Video

    Which AWS service or feature can the ISV use to securely provide access to its application?

    Which AWS service or feature can the ISV use to securely provide access to its application?

    Vulnerability Management

    Rapid7 InsightVM identifies vulnerabilities in your IT environment and provides the reporting, automation, and integrations to prioritize and fix them. 

    Learn more 

    Which AWS service or feature can the ISV use to securely provide access to its application?

    Which AWS service or feature can the ISV use to securely provide access to its application?

    Security Intelligence

    Recorded Future offers a complete threat intelligence solution powered by patented machine learning to lower risk. 

    Try now 

    See how it works
    Video

    Which AWS service or feature can the ISV use to securely provide access to its application?

    Which AWS service or feature can the ISV use to securely provide access to its application?

    Deep Security

    Trend Micro Deep Security provides visibility and threat protection services to help prevent unwanted and unknown apps from executing on your endpoints. 

    Learn more 

    See how it works
    Video

    Top resources for governance, risk, and compliance

    Which AWS service or feature can the ISV use to securely provide access to its application?

    Which AWS service or feature can the ISV use to securely provide access to its application?

  • Network security

    Protect your workloads from malicious or unauthorized traffic with next generation firewalls, intrusion prevention and detection systems, and virtual private network (VPN) gateways.

    Listed alphabetically

    Which AWS service or feature can the ISV use to securely provide access to its application?

    CloudGen Firewall for AWS

    The Barracuda CloudGen WAF for AWS provides enterprise-grade advanced threat application security and data loss prevention for your web applications. 

    Try now 

    See how it works
    Video

    Which AWS service or feature can the ISV use to securely provide access to its application?

    Security Management

    This single security management console delivers consistent visibility, policy management, logging, reporting and control across all cloud environments and networks. 

    Learn more 

    See how it works
    Video

    Which AWS service or feature can the ISV use to securely provide access to its application?

    Which AWS service or feature can the ISV use to securely provide access to its application?

    Which AWS service or feature can the ISV use to securely provide access to its application?

    vSRX Next Generation Firewall

    Juniper vSRX secures data and applications in cloud environments by applying consistent security policies that follow the user, device, and application. 

    Try now 

    Which AWS service or feature can the ISV use to securely provide access to its application?

    Which AWS service or feature can the ISV use to securely provide access to its application?

    UTM9

    Sophos Firewall protects AWS VPCs and web facing apps from advanced threats, with centralized management from Sophos complete SaaS security platform. 

    Learn more 

    Which AWS service or feature can the ISV use to securely provide access to its application?

    Top resources for network security

    Which AWS service or feature can the ISV use to securely provide access to its application?

    ON-DEMAND WEBINAR

    How to Protect Enterprise Systems with Cloud-Based Firewalls

    Explore key features of cloud-based firewalls and how they differ from more traditional firewalls, the ease with which organizations can manage firewalls in AWS, and advanced features of firewalls that are of significant value to users’ organizations.

    Which AWS service or feature can the ISV use to securely provide access to its application?

    ON-DEMAND WEBINAR

    JumpStart guide for cloud-based firewalls on AWS

    Review guidance on the key issues to consider when choosing cloud-based firewall/threat prevention solutions for integration on the AWS platform and suggests a process for making that important decision.

  • Security Information and Event Management (SIEM)

    Centralized logging, reporting, and analysis of logs to provide visibility and security insights.

    Listed alphabetically

    Which AWS service or feature can the ISV use to securely provide access to its application?

    The Devo Platform

    The Devo Platform and integrated apps provide cloud-native logging and security analytics that security teams need to better detect and respond to threats. 

    Learn more 

    Which AWS service or feature can the ISV use to securely provide access to its application?

    QRadar SIEM

    IBM Security QRadar SIEM provides centralized visibility and insights to quickly detect and prioritize threats across networks, users, and cloud. 

    Learn more 

    See how it works
    Demo

    Which AWS service or feature can the ISV use to securely provide access to its application?

    Logz.io Cloud SIEM

    Cloud SIEM provides a unified platform for SOC teams, integrates with dozens of security services, including firewalls, endpoint security, network security, identity management security, and container security.

    Learn more 

    Which AWS service or feature can the ISV use to securely provide access to its application?

    Panorama

    Central management system for Palo Alto Networks Firewalls, WildFire Appliances and Log Collectors. 

    Learn more 

    Which AWS service or feature can the ISV use to securely provide access to its application?

    Next-Gen SIEM

    Confidently secure containers, Kubernetes, and cloud with the Sysdig Secure DevOps Platform. Scan images, flag misconfigurations, detect and respond to threats, validate compliance, monitor and troubleshoot issues.

    Learn more 

    Which AWS service or feature can the ISV use to securely provide access to its application?

    Enterprise AMI

    Splunk Enterprise enables you to take decisive actions on insights from your data without the need to purchase, manage, and deploy additional infrastructure. 

    Try now 

    Which AWS service or feature can the ISV use to securely provide access to its application?

    Cloud SIEM powered by AWS

    Sumo Logic Cloud SIEM Enterprise automatically analyzes and correlates security data to help SOC analysts discover and resolve critical threats faster. 

    Try now 

    Which AWS service or feature can the ISV use to securely provide access to its application?

    Cloud One

    Trend Micro Cloud One provides connection security of existing environments and DevOps tools by integrating with security information and event management (SIEM), orchestration, monitoring, pipelines, and IT tools.  

    Learn more 

    Which AWS service or feature can the ISV use to securely provide access to its application?

    Top resources for SIEM

    Which AWS service or feature can the ISV use to securely provide access to its application?

    Which AWS service or feature can the ISV use to securely provide access to its application?

  • Web application firewall (WAF) and edge security

    Shield web applications and edge devices from risks that can compromise security, affect application availability, or result in the consumption of excessive resources.

    Listed alphabetically

    Which AWS service or feature can the ISV use to securely provide access to its application?

    Secure Networking Platform

    WhiteSource secures and integrates with your software development lifecycle and automates your entire open source components management process. 

    Try now 

    Which AWS service or feature can the ISV use to securely provide access to its application?

    CloudGen WAF

    The Barracuda CloudGen WAF for AWS provides enterprise-grade advanced threat application security and data loss prevention for your web applications. 

    Try now 

    See how it works
    Video

    Which AWS service or feature can the ISV use to securely provide access to its application?

    CloudGuard Network Security

    CloudGuard Network Security NGFW delivers advanced, multi-layered threat prevention for AWS and hybrid clouds, and protects cloud assets from threats. 

    Try now 

    See how it works
    Video

    Which AWS service or feature can the ISV use to securely provide access to its application?

    Which AWS service or feature can the ISV use to securely provide access to its application?

    Silverline Shape Defense

    F5 Silverline Shape Defense (SSD) protects web applications from automated bot attacks to prevent large-scale fraud and friction for your end-users. 

    Learn more 

    Which AWS service or feature can the ISV use to securely provide access to its application?

    FortiWeb Cloud

    Fortinet FortiWeb Cloud deploys in minutes, protecting your applications using Machine Learning to block threats and reduce administrative overhead. 

    Learn more 

    Which AWS service or feature can the ISV use to securely provide access to its application?

    Which AWS service or feature can the ISV use to securely provide access to its application?

    vSRX Next Generation Firewall

    Juniper vSRX secures data and applications in cloud environments by applying consistent security policies that follow the user, device, and application. 

    Try now 

    Which AWS service or feature can the ISV use to securely provide access to its application?

    Which AWS service or feature can the ISV use to securely provide access to its application?

    Which AWS service or feature can the ISV use to securely provide access to its application?

    Zscaler Private Access

    Zscaler Private Access (ZPA) is a cloud service that provides zero trust access to private applications running on public cloud or within the data center. 

    Learn more 

    Top resources for WAF

    Which AWS service or feature can the ISV use to securely provide access to its application?

    Which AWS service or feature can the ISV use to securely provide access to its application?

  • Managed security services

    Leverage tailored security solutions to help improve your security posture and protect your IT infrastructure.

    Listed alphabetically

    Which AWS service or feature can the ISV use to securely provide access to its application?

    Alert Logic MDR Essentials

    Alert Logic MDR provides a purpose-built security solution utilizing many threat and security analysis techniques backed by security experts and 24/7 SOCs. 

    Learn more 

    Which AWS service or feature can the ISV use to securely provide access to its application?

    Armor Anywhere

    Armor Anywhere delivers managed security and compliance for AWS. Built for Amazon EC2, Amazon CloudWatch and AWS CloudTrail, Armor Anywhere helps IT and security teams by consolidating security tools for unified visibility and control.

    Learn more 

    Which AWS service or feature can the ISV use to securely provide access to its application?

    CrowdStrike Services

    CrowdStrike offers an array of strategic advisory services and technical advisory services to help customers better understand the depth and maturity of their existing cybersecurity practices. 

    Learn more 

    Which AWS service or feature can the ISV use to securely provide access to its application?

    Cyvatar Platform

    Cyvatar Platform drives cybersecurity confidence for your business by managing your security tools, issue management, and risk mitigation solutions in a single pain of glass. 

    Learn more 

    Which AWS service or feature can the ISV use to securely provide access to its application?

    Managed Security Services

    deepwatch provides 24/7/365 threat monitoring, alerting, validation, and proactive threat hunting. It delivers results-driven managed security services (MSS) that extend customers’ cybersecurity teams and advance their SecOps maturity. 

    Learn more 

    Which AWS service or feature can the ISV use to securely provide access to its application?

    Which AWS service or feature can the ISV use to securely provide access to its application?

    Managed Detection & Response

    Proficio provides managed detection and response (MDR) services to help you reduce risk, meet your security and compliance goals, and maximize your investments in security technology. 

    Learn more 

    See how it works
    Video

    Which AWS service or feature can the ISV use to securely provide access to its application?

    Taegis ManagedXDR

    Secureworks' 24x7 managed detection and response service helps enterprises detect advanced threats and take the right action. Included threat hunting and incident response capabilities help scale security operations and improve security posture. 

    Learn more 

    Which AWS service or feature can the ISV use to securely provide access to its application?

    Central Cybersecurity

    Sophos Central Cybersecurity secures workloads, data, apps, and access. Sophos protects against ransomware, advanced threats, and more across endpoints, cloud workloads, servers, mobile devices, networks, and email. 

    Learn more 

    See how it works
    Video

    Top resources for managed security

    Which AWS service or feature can the ISV use to securely provide access to its application?

Have questions?

Speak with an AWS Marketplace expert who can help you find and integrate Security software that fits your requirements

Maintain a secure environment with security tools and cloud security software in AWS Marketplace

Whether you are securing endpoints, identifying vulnerabilities, or safeguarding sensitive data, you can find the security software and security tools you need on AWS Marketplace to enhance protection for your entire Amazon Web Services (AWS) environment with compatible security solutions.

Read what customers are saying about AWS Marketplace Security Solutions 

Security software solutions in AWS Marketplace overview    |  (1:35 min)

What companies say about security solutions in AWS Marketplace

Which AWS service or feature can the ISV use to securely provide access to its application?

Emedgene benefits from easy deployment

“AWS Marketplace was easy to interact with. It was a simple path forward to select CIS and Illumina products, and an easy deployment to our VPC offered us the shortest time to market.” 

Niv Mizrahi

Co-founder and CTO

Which AWS service or feature can the ISV use to securely provide access to its application?

Roper Technologies benefits from a speedy integration

“AWS Marketplace has been the easiest way to purchase what we needed. The speed at which we procured CrowdStrike meant that we were able to start using it in three days, much faster than it would have happened otherwise.” 

Karine Thibault

Cybersecurity Director

Which AWS service or feature can the ISV use to securely provide access to its application?

Pokemon benefits from risk mitigation with Sumo Logic Partnership

“AWS and Sumo Logic have both been wonderful partners for us. We’re able to mitigate risks and solve problems that have an impact across the business.” 

John Visneski

Director of Information Security and Data Protection Officer

Which AWS service or feature can the ISV use to securely provide access to its application?

Emedgene benefits from easy deployment

“AWS Marketplace was easy to interact with. It was a simple path forward to select CIS and Illumina products, and an easy deployment to our VPC offered us the shortest time to market.” 

Niv Mizrahi

Co-founder and CTO


Which AWS service or feature can the ISV use to securely provide access to its application?

Roper Technologies benefits from a speedy integration

“AWS Marketplace has been the easiest way to purchase what we needed. The speed at which we procured CrowdStrike meant that we were able to start using it in three days, much faster than it would have happened otherwise.” 

Karine Thibault

Cybersecurity Director


Which AWS service or feature can the ISV use to securely provide access to its application?

Pokemon benefits from risk mitigation with Sumo Logic Partnership

“AWS and Sumo Logic have both been wonderful partners for us. We’re able to mitigate risks and solve problems that have an impact across the business.” 

John Visneski

Director of Information Security and Data Protection Officer

See what other companies say about AWS Marketplace 

The Total Economic Impact of AWS Marketplace Study 

Read the commissioned Forrester Total Economic Impact™ study to learn how customers benefited from including AWS Marketplace in their software and data procurement strategy

The Total Economic Impact of AWS Marketplace Study 

Read the commissioned Forrester Total Economic Impact™ study to learn how customers benefited from including AWS Marketplace in their software and data procurement strategy

Learning and training resources to become a Security Expert in the Cloud

E-BOOK

The value and impact of threat detection and response tools

Learn how organizations are using threat detection and response tools to quickly find and remediate risks while allowing them to proactively hunt for threats and rapidly mitigate vulnerabilities. 

Which AWS service or feature can the ISV use to securely provide access to its application?

Which AWS service or feature can the ISV use to securely provide access to its application?

ON-DEMAND WEBINAR

How to build a secure access service edge (SASE) model in AWS

Learn how organizations can move to a SASE model to enhance security for modern infrastructures and why doing so plays a vital role in maintaining a secure environment.

Watch the webinar 

Which AWS service or feature can the ISV use to securely provide access to its application?

WHITEPAPER

Building a Threat Detection Strategy in AWS

Learn how to improve your threat detection and remediation capabilities by leveraging Amazon Web Services (AWS) services and solutions in AWS Marketplace.

Read the whitepaper 

Which AWS service or feature can the ISV use to securely provide access to its application?

EBOOK

The Value of Cloud security posture management tools

Learn how organizations are using cloud posture management tools to proactively resolve vulnerabilities in their infrastructure, applications, and workloads.

Download the eBook 

Which AWS service or feature can the ISV use to securely provide access to its application?

Find, subscribe to, and use third-party data with AWS Data Exchange

Securely streamline the way your teams utilize third-party data sets and APIs in the cloud.

Get started with AWS Marketplace

AWS Marketplace is a curated digital catalog that makes it easy to find, test, buy, and deploy the third-party software you want, with the simplified procurement and controls you need.

AWS support for Internet Explorer ends on 07/31/2022. Supported browsers are Chrome, Firefox, Edge, and Safari. Learn more »

Which AWS services would you use to secure an AWS account?

Top 6 AWS Account Security Tools.
AWS Identity and Access Management (IAM) AWS IAM is essential for controlling access to your AWS resources. ... .
Amazon GuardDuty. ... .
Amazon Macie. ... .
AWS Config. ... .
AWS CloudTrail. ... .
Security Hub. ... .
Amazon Inspector. ... .
AWS Shield..

Which AWS service provides access to security and compliance documents?

AWS Artifact is your go-to, central resource for compliance-related information that matters to you. It provides on-demand access to AWS security and compliance reports and select online agreements.

How do I secure my AWS application?

AWS Security in 10 Steps.
Understand the Shared Responsibility Model. ... .
Follow IAM Best Practices. ... .
Manage OS-level Access and Keep Ec2 Instances Secure. ... .
Encryption. ... .
Follow Security Best Practices for AWS Database and Storage Services. ... .
Network Security. ... .
Web Application Security. ... .
Enable Configuration Management..

What is ISV for AWS?

The AWS ISV Accelerate Program is a co-sell program for organizations that provide software solutions that run on or integrate with AWS. The program helps you drive new business and accelerate sales cycles by connecting participating independent software vendors (ISVs) with the AWS Sales organization.