Related Products
|
||||||
About
AWS WAF is a web application firewall that helps protect your web applications or APIs against common web exploits that may affect availability, compromise security, or consume excessive resources. AWS WAF gives you control over how traffic reaches your applications by enabling you to create security rules that block common attack patterns, such as SQL injection or cross-site scripting, and rules that filter out specific traffic patterns you define. You can get started quickly using Managed Rules for AWS WAF, a pre-configured set of rules managed by AWS or AWS Marketplace Sellers. The Managed Rules for WAF address issues like the OWASP Top 10 security risks. These rules are regularly updated as new issues emerge. AWS WAF includes a full-featured API that you can use to automate the creation, deployment, and maintenance of security rules.
With AWS WAF, you pay only for what you use. The pricing is based on how many rules you deploy and how many web requests your application receives.
|
About
Amazon GuardDuty is a threat detection service that continuously monitors for malicious activity and unauthorized behavior to protect your AWS accounts, workloads, and data stored in Amazon S3. With the cloud, the collection and aggregation of account and network activities is simplified, but it can be time consuming for security teams to continuously analyze event log data for potential threats. With GuardDuty, you now have an intelligent and cost-effective option for continuous threat detection in AWS. The service uses machine learning, anomaly detection, and integrated threat intelligence to identify and prioritize potential threats. GuardDuty analyzes tens of billions of events across multiple AWS data sources, such as AWS CloudTrail event logs, Amazon VPC Flow Logs, and DNS logs. With a few clicks in the AWS Management Console, GuardDuty can be enabled with no software or hardware to deploy or maintain.
|
About
Amazon Inspector is an automated security assessment service that helps improve the security and compliance of applications deployed on AWS. Amazon Inspector automatically assesses applications for exposure, vulnerabilities, and deviations from best practices. After performing an assessment, Amazon Inspector produces a detailed list of security findings prioritized by level of severity. These findings can be reviewed directly or as part of detailed assessment reports which are available via the Amazon Inspector console or API. Amazon Inspector security assessments help you check for unintended network accessibility of your Amazon EC2 instances and for vulnerabilities on those EC2 instances. Amazon Inspector assessments are offered to you as pre-defined rules packages mapped to common security best practices and vulnerability definitions. Accelerate MTTR by using over 50 sources for vulnerability intelligence to help identify zero-day vulnerabilities quickly.
|
||||
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
||||
Audience
Anyone looking to protect their web applications from common web exploits
|
Audience
Anyone looking to protect their AWS accounts, workloads, and data stored
|
Audience
Anyone looking for a solution providing automated security assessment services
|
||||
Support
Phone Support
24/7 Live Support
Online
|
Support
Phone Support
24/7 Live Support
Online
|
Support
Phone Support
24/7 Live Support
Online
|
||||
API
Offers API
|
API
Offers API
|
API
Offers API
|
||||
Screenshots and Videos |
Screenshots and Videos |
Screenshots and Videos |
||||
Pricing
No information available.
Free Version
Free Trial
|
Pricing
No information available.
Free Version
Free Trial
|
Pricing
No information available.
Free Version
Free Trial
|
||||
Reviews/
|
Reviews/
|
Reviews/
|
||||
Training
Documentation
Webinars
Live Online
In Person
|
Training
Documentation
Webinars
Live Online
In Person
|
Training
Documentation
Webinars
Live Online
In Person
|
||||
Company InformationAmazon
Founded: 1994
United States
aws.amazon.com/waf/
|
Company InformationAmazon
Founded: 1994
United States
aws.amazon.com/guardduty/
|
Company InformationAmazon
Founded: 1994
United States
aws.amazon.com/inspector/
|
||||
Alternatives |
Alternatives |
Alternatives |
||||
|
|
|
|
||||
|
|
|
|||||
|
|
|
|
||||
|
|
|
|
||||
Categories |
Categories |
Categories |
||||
Firewall Features
Alerts / Notifications
Application Visibility / Control
Automated Testing
Intrusion Prevention
LDAP Integration
Physical / Virtual Environment
Sandbox / Threat Simulation
Threat Identification
Web Application Firewalls (WAF) Features
Access Control / Permissions
Alerts / Notifications
Automate and Orchestrate Security
Automated Attack Detection
Dashboard
DDoS Protection
IP Reputation Checking
Managed Rules
OWASP Protection
Reporting / Analytics
Secure App Delivery
Server Cloaking
Virtual Patching
Zero-Day Attack Prevention
|
Cloud Security Features
Antivirus
Application Security
Behavioral Analytics
Encryption
Endpoint Management
Incident Management
Intrusion Detection System
Threat Intelligence
Two-Factor Authentication
Vulnerability Management
|
Vulnerability Management Features
Asset Discovery
Asset Tagging
Network Scanning
Patch Management
Policy Management
Prioritization
Risk Management
Vulnerability Assessment
Web Scanning
|
||||
Integrations
AWS App Mesh
AWS CloudTrail
AWS GovCloud
AWS Lambda
AWS Shield
Amazon EC2
Certa
Devtron
Google Digital Risk Protection
HUMAN Bot Defender
|
Integrations
AWS App Mesh
AWS CloudTrail
AWS GovCloud
AWS Lambda
AWS Shield
Amazon EC2
Certa
Devtron
Google Digital Risk Protection
HUMAN Bot Defender
|
Integrations
AWS App Mesh
AWS CloudTrail
AWS GovCloud
AWS Lambda
AWS Shield
Amazon EC2
Certa
Devtron
Google Digital Risk Protection
HUMAN Bot Defender
|
||||
|
|
|
|