A web company is looking to implement an intrusion detection and prevention system into their deployed VPC. This platform should have the ability to scale to thousands of instances running inside of the VPC.
How should they architect their solution to achieve these goals?
ReggieR2
Highly Voted 3 years, 7 months agoJAWS1600
3 years, 6 months agoskywalker
Highly Voted 3 years, 7 months agonitinz
3 years, 6 months agoChinta
Most Recent 7 months, 1 week agoamministrazione
8 months, 3 weeks agoNarendragpt
9 months, 3 weeks agoBereket
10 months, 3 weeks agoAndy85
1 year, 8 months agoautobahn
1 year, 9 months agoTarila79
1 year, 11 months agozmfly
1 year, 12 months agoTigerInTheCloud
2 years, 5 months agoSnip
2 years, 6 months agoskywalker
2 years, 8 months agoaandc
2 years, 10 months ago[Removed]
2 years, 10 months agoHellGate
3 years agobkrish
3 years, 1 month agobkrish
3 years, 1 month agoorwolfstein
1 year, 8 months ago