Best Application Performance Monitoring (APM) Software for Amazon Web Services (AWS) - Page 2

Compare the Top Application Performance Monitoring (APM) Software that integrates with Amazon Web Services (AWS) as of October 2025 - Page 2

This a list of Application Performance Monitoring (APM) software that integrates with Amazon Web Services (AWS). Use the filters on the left to add additional filters for products that have integrations with Amazon Web Services (AWS). View the products that work with Amazon Web Services (AWS) in the table below.

  • 1
    Cribl AppScope
    AppScope is a new approach to black-box instrumentation delivering ubiquitous, unified telemetry from any Linux executable by simply prepending scope to the command. Talk to any customer using Application Performance Management, and they’ll tell you how much they love their solution, but they wish they could extend it to more of their applications. Most have 10% or fewer of their apps instrumented for APM, and are supplementing what they can with basic metrics. Where does this leave the other 80%? Enter AppScope. No language-specific instrumentation. No application developers required. AppScope is language agnostic and completely userland; works with any application; scales from the CLI to production. Send AppScope data to any existing monitoring tool, time series database, or log tool. AppScope allows SREs and Ops teams to interrogate running applications to discover how they work and their behavior in any deployment context, from on-prem to cloud to containers.
  • 2
    Security Rangers

    Security Rangers

    Security Rangers

    Our security tools and integrations save you time while protecting you against vulnerabilities. When in doubt, our Security Rangers are here to help you do any heavy lifting. Quickly demonstrate an InfoSec program and close sales now, while one of our Security Rangers helps you work towards a completed certification. Take advantage of our industry experience and professional partnerships to get best-in-class policies and let us help you tailor them to your specific company and team. A dedicated Security Ranger will be assigned to your team. For each policy and control we will walk you thouogh implementing standards, collecting proof, and staying compliant. Detect vulnerabilities with our certifed penetration testers and automated scans. We believe that continuous vulnerability scanning is the only way to protect your data while not compromising deployment & go-to market speeds.