Business Software for AWS Security Hub

Top Software that integrates with AWS Security Hub as of July 2025

Compare business software, products, and services to find the best solution for your business or organization. Use the filters on the left to drill down by category, pricing, features, organization size, organization type, region, user reviews, integrations, and more. View and sort the products and solutions that match your needs in the results below.

  • 1
    Amazon Web Services (AWS)
    Whether you're looking for compute power, database storage, content delivery, or other functionality, AWS has the services to help you build sophisticated applications with increased flexibility, scalability and reliability. Amazon Web Services (AWS) is the world’s most comprehensive and broadly adopted cloud platform, offering over 175 fully featured services from data centers globally. Millions of customers—including the fastest-growing startups, largest enterprises, and leading government agencies—are using AWS to lower costs, become more agile, and innovate faster. AWS has significantly more services, and more features within those services, than any other cloud provider–from infrastructure technologies like compute, storage, and databases–to emerging technologies, such as machine learning and artificial intelligence, data lakes and analytics, and Internet of Things. This makes it faster, easier, and more cost effective to move your existing applications to the cloud.
  • 2
    Amazon CloudWatch
    Amazon CloudWatch is a monitoring and observability service built for DevOps engineers, developers, site reliability engineers (SREs), and IT managers. CloudWatch provides you with data and actionable insights to monitor your applications, respond to system-wide performance changes, optimize resource utilization, and get a unified view of operational health. CloudWatch collects monitoring and operational data in the form of logs, metrics, and events, providing you with a unified view of AWS resources, applications, and services that run on AWS and on-premises servers. You can use CloudWatch to detect anomalous behavior in your environments, set alarms, visualize logs and metrics side by side, take automated actions, troubleshoot issues, and discover insights to keep your applications. CloudWatch alarms watch your metric values against thresholds that you specify or that it creates using ML models to detect anomalous behavior.
  • 3
    configure8

    configure8

    configure8

    configure8 is an internal developer portal that helps helps your developers move faster and build better software with self-serve access to the knowledge and functionality they need. Our solution features a universal catalog that easily organizes all of the sociotechnical knowledge about your team and applications, services, environments, and resources. Customize the data model to integrate any tool and present custom views and calculations. Easy to set-up and maintain, and delivers value. configure8 uses knowledge in the universal catalog to power Scorecards and Self-Serve Actions. Scorecards by configure8 feature the largest library of pre-built checks and the ability to scorecard any custom data as well as create standards tripwires. Self-Serve Actions feature dynamic forms that are contextually aware to minimize developer cognitive load for day 2 operations. We even offer starter templates + custom actions. Deploy on-prem or use our SaaS hosted version. White glove support
    Starting Price: $19/month per user
  • 4
    AWS App Mesh

    AWS App Mesh

    Amazon Web Services

    AWS App Mesh is a service mesh that provides application-level networking to facilitate communication between your services across various types of computing infrastructure. App Mesh offers comprehensive visibility and high availability for your applications. Modern applications are generally made up of multiple services. Each service can be developed using various types of compute infrastructure, such as Amazon EC2, Amazon ECS, Amazon EKS, and AWS Fargate. As the number of services within an application grows, it becomes difficult to pinpoint the exact location of errors, redirect traffic after errors, and safely implement code changes. Previously, this required creating monitoring and control logic directly in your code and redeploying your services every time there were changes.
    Starting Price: Free
  • 5
    Phoenix Security

    Phoenix Security

    Phoenix Security

    Phoenix Security enables security, developers, and businesses to all talk the same language. We help security professionals focus on the vulnerabilities that matter most across cloud, infrastructure, and application security. Laser focuses on the 10% of vulnerabilities that matter today, and reduces risk faster with prioritized contextualized vulnerabilities. Threat intelligence automatically in the risk improves efficiency enabling fast reaction. Threat intelligence automatically in the risk improves efficiency enabling fast reaction. Aggregate, correlate and contextualize multiple security tools and data sources, providing your business with unprecedented visibility. Break down the silos between application security, operational security, and the business.
    Starting Price: $3,782.98 per month
  • 6
    Zenduty

    Zenduty

    Zenduty

    Zenduty’s end-to-end incident alerting, on-call management and response orchestration platform helps you institutionalize reliability into your production operations. Get a single pane of glass view of the health of all your production operations. Respond to incidents 90% faster and resolve them 60% faster. Deploy customized and data-driven on-call rotations to ensure 24/7 operational coverage for major incidents. Deploy industry-leading incident response procedures and resolve incidents faster through effective task delegation and collaborative triaging. Bring your playbooks automatically into your incidents. Log incident tasks and action items for productive postmortems and future incidents. Suppress noisy alerts so that your engineers and support staff are focused on the alerts that matter. Over 100+ integrations with all your APMs, log monitoring, error monitoring, server monitoring, ITSM, Support, and security services.
    Starting Price: $5 per month
  • 7
    Parny

    Parny

    Parny

    Get AI recommendations for your alerts. It can generate recommendations for your alert based on the persona selected. Ask Parny AI has three personas, DevOps engineer, senior developer and database administrator. Our personas are trained to provide the best recommendations for your alerts. You can easily add your team members to the on-call team member list. Always alert the right person at the right time. Share on-call responsibility across your team with on-call schedules and automatic escalations. We support engineering teams to be more proactive, resolve incidents faster and deliver a seamless operations experience. Get custom analytics for your organization, teams, services and users. Always be up to date with your performance and improve your organization's efficiency.
    Starting Price: $7 per month
  • 8
    Amazon GuardDuty
    Amazon GuardDuty is a threat detection service that continuously monitors for malicious activity and unauthorized behavior to protect your AWS accounts, workloads, and data stored in Amazon S3. With the cloud, the collection and aggregation of account and network activities is simplified, but it can be time consuming for security teams to continuously analyze event log data for potential threats. With GuardDuty, you now have an intelligent and cost-effective option for continuous threat detection in AWS. The service uses machine learning, anomaly detection, and integrated threat intelligence to identify and prioritize potential threats. GuardDuty analyzes tens of billions of events across multiple AWS data sources, such as AWS CloudTrail event logs, Amazon VPC Flow Logs, and DNS logs. With a few clicks in the AWS Management Console, GuardDuty can be enabled with no software or hardware to deploy or maintain.
  • 9
    Amazon Inspector
    Amazon Inspector is an automated security assessment service that helps improve the security and compliance of applications deployed on AWS. Amazon Inspector automatically assesses applications for exposure, vulnerabilities, and deviations from best practices. After performing an assessment, Amazon Inspector produces a detailed list of security findings prioritized by level of severity. These findings can be reviewed directly or as part of detailed assessment reports which are available via the Amazon Inspector console or API. Amazon Inspector security assessments help you check for unintended network accessibility of your Amazon EC2 instances and for vulnerabilities on those EC2 instances. Amazon Inspector assessments are offered to you as pre-defined rules packages mapped to common security best practices and vulnerability definitions. Accelerate MTTR by using over 50 sources for vulnerability intelligence to help identify zero-day vulnerabilities quickly.
  • 10
    Amazon Macie
    Amazon Macie is a fully managed data security and data privacy service that uses machine learning and pattern matching to discover and protect your sensitive data in AWS. As organizations manage growing volumes of data, identifying and protecting their sensitive data at scale can become increasingly complex, expensive, and time-consuming. Amazon Macie automates the discovery of sensitive data at scale and lowers the cost of protecting your data. Macie automatically provides an inventory of Amazon S3 buckets including a list of unencrypted buckets, publicly accessible buckets, and buckets shared with AWS accounts outside those you have defined in AWS Organizations. Then, Macie applies machine learning and pattern matching techniques to the buckets you select to identify and alert you to sensitive data, such as personally identifiable information (PII).
  • 11
    Amazon Detective
    Analyze and visualize security data to rapidly get to the root cause of potential security issues. Amazon Detective makes it easy to analyze, investigate, and quickly identify the root cause of potential security issues or suspicious activities. Amazon Detective automatically collects log data from your AWS resources and uses machine learning, statistical analysis, and graph theory to build a linked set of data that enables you to easily conduct faster and more efficient security investigations. AWS security services like Amazon GuardDuty, Amazon Macie, and AWS Security Hub as well as partner security products can be used to identify potential security issues, or findings. These services are really helpful in alerting you when something is wrong and pointing out where to go to fix it. But sometimes there might be a security finding where you need to dig a lot deeper and analyze more information to isolate the root cause and take action.
  • 12
    The GlobalSolutions

    The GlobalSolutions

    The GlobalSolutions

    Lower your cloud spend, secure your cloud, & improve developer productivity. Why give free money to cloud providers? Use our solution to track your spend and take simple/ML based actions to reduce cost. Subscribe to our 60+ applications in AWS Marketplace. Simple to launch with the cheapest price. Secure your cloud infrastructure and patch your EC2 instance across regions from a single pane of window. A simple dashboard to slice and dice your AWS Cloud spend. Sweeps your unused AWS resources to reduce cost. Action based jobs to reduce cost. Continuous Machine learning analysis to reduce cloud cost. Subscribe to our range of applications on AWS Marketplace. Don’t spend time in building application stacks. Hardened/Secured images out of the shelves. You get to code more than spending time in operations. Scan your AWS infrastructure for any security gaps, helps to address vulnerabilities in your environment. Patch your servers across all regions from one simple dashboard.
    Starting Price: $200 per month
  • 13
    cloudtamer.io

    cloudtamer.io

    cloudtamer.io

    Control your cloud with the top software for automated cloud governance. Apply cloud rules (like, "deny creation of public objects") just once, and they'll apply automatically on new accounts. Plus, see all your policies right on your org chart. Comprehensive Cloud Boundaries. Self-Service Account Provision. Detailed Org Chart View. Get alerts or cut off spending when you hit your limit. Trim 30% off your total cloud bill. And create spend plans that match your real-life plan, across ALL your cloud providers. Use our compliance checks to auto-align with established standards like NIST and CIS or build your own from scratch. Then, fix issues automatically or on-demand in the dashboard. Start provisioning auto-governed accounts, running compliance checks, and getting financial control in the cloud today. If you aren't impressed, we'll eat our hat. We automate the provisioning of cloud accounts and dramatically reduce your set-up time.
  • 14
    DisruptOps

    DisruptOps

    FireMon

    DisruptOps is a cloud security operations platform that monitors, alerts and responds to security risk in real-time across your public cloud infrastructure. DisruptOps breaks down barriers between development, security & operations teams, enabling everyone to become an active defender of your cloud infrastructure, working from your existing tools. DisruptOps delivers critical issues directly to the right responders inside the tools you already use, like Slack, Teams & Jira, enabling everyone to be an active defender, even when it’s not their full-time job. DisruptOps brings security operations into your DevOps workflow, empowering your teams to find & fix issues before they become incidents. Immediate visibility into your risks and threats, critical issues routed to the right responders, security context and expert guidance to remediate issues. Insights to plan & track your risk reduction and playbooks with pre-built response actions that save time.
  • 15
    FortiCNP

    FortiCNP

    Fortinet

    FortiCNP, Fortinet’s Cloud-Native Protection product, helps security teams prioritize risk management activities based on a broad set of security findings from their cloud environments. Beyond the built-in CSPM and data scanning capabilities, FortiCNP collects information from cloud-native security services that provide vulnerability scanning, permissions analysis, and threat detection. Based on the information it collects, FortiCNP calculates an aggregate risk score for cloud resources, so customers can then manage risk management work based on the insights that this solution produces. Unlike traditional CSPM and CWPP products, FortiCNP provides deep security visibility with zero permissions across cloud infrastructures and helps prioritize security workflows for effective risk management.
    Starting Price: $360 per month
  • 16
    Klera

    Klera

    Klera

    Klera is a software products and services company focused on creating solutions that deliver intelligence from data, unlike ever before. We enable transparent, collaborative, and connected enterprises, without data silos. Our rapid, no code, intelligent application development platform simplifies how you gather, analyze, and synchronize data.
    Starting Price: $900 per month
  • 17
    Kion

    Kion

    Kion

    The only single-platform solution for setup and provisioning, financial management, and compliance. Kion offers the only single-platform approach to cloud enablement for AWS, Azure, and Google Cloud, transcending cloud management and cloud governance by offering all three pillars necessary for total cloud control. Provision accounts, get enterprise-wide visibility, and fully integrate the cloud with your tech stack to automate the full cloud lifecycle. Kion helps you start correctly from day 1 in the cloud by automating the provisioning of accounts with the proper controls around allowed services and budget. Prevent, detect, report, and remediate issues to comply with industry standards and business policies. Allocate and track spending, get real-time and forecasted data, identify savings opportunities, and enforce budgets. We deliver more than just the features to manage and govern your cloud.
  • 18
    Qualiti.ai

    Qualiti.ai

    Qualiti.ai

    Never write, maintain, or triage another automated test. Qualiti is the dedicated AI tester every engineer needs, offering real-time automated testing for near-instant feedback. Qualiti's AI-powered platform can test software products with no human input. This means faster testing and more comprehensive results. Integrate with your SCM/VCS or CI/CD tools and your project management system for seamless results. There is no need to manage yet another tool. Qualiti can replace up to 34% of a company’s engineering budget with hands-off automation, all while enabling engineers to release more reliable code, faster. Developers can push code and have results in a few minutes. This leads to faster bug detection and fixes, which means quicker time-to-market. Don't rely on a number that doesn't tell you if what you really care about is being tested. View tests and coverage by clicking through your own application to see what is really being tested.
  • 19
    Cron To Go

    Cron To Go

    Crazy Ant Labs

    Cron To Go simplifies the monitoring, alerting, and management of your cron jobs' performance, uptime, and status, ensuring seamless operation. Cron To Go's intuitive dashboard empowers your team to effortlessly monitor and diagnose issues in your background jobs, regardless of their execution location, while ensuring you receive notifications for any job failures. Monitor and get notifications on your job statuses, regardless of where they execute. Cron To Go is a distributed, scalable, and dependable cloud scheduling solution. Cron is no longer a single point of failure. With its guaranteed at-least-once delivery, your jobs are guaranteed to run even in the event of failures, as schedules are retriggered to ensure consistent delivery. You can set schedules with 60-second precision across different time zones, using either the well-known Unix cron format or simple rate expressions. This flexibility allows your jobs to execute several times a day, on chosen days.
    Starting Price: $0.012 per hour
  • 20
    AWS Firewall Manager
    AWS Firewall Manager is a security management service which allows you to centrally configure and manage firewall rules across your accounts and applications in AWS Organization. As new applications are created, Firewall Manager makes it easy to bring new applications and resources into compliance by enforcing a common set of security rules. Now you have a single service to build firewall rules, create security policies, and enforce them in a consistent, hierarchical manner across your entire infrastructure. Using AWS Firewall Manager, you can easily roll out AWS WAF rules for your Application Load Balancers, API Gateways, and Amazon CloudFront distributions. Similarly, you can create AWS Shield Advanced protections for your Application Load Balancers, ELB Classic Load Balancers, Elastic IP Addresses and CloudFront distributions. Finally, with AWS Firewall Manager, you can enable security groups for your Amazon EC2 and ENI resource types in Amazon VPCs.
  • 21
    Stacklet

    Stacklet

    Stacklet

    Stacklet builds on the Cloud Custodian project to offer an out-of-the-box solution with powerful management capabilities and advanced features to help businesses realize value. Stacklet is built by the original developer and maintainer of Cloud Custodian. Cloud Custodian is used by thousands of well-known global brands today. The project’s community has hundreds of active contributors including Amazon, Microsoft and Capital One and is growing rapidly. Stacklet provides a best-of-breed solution for cloud governance addressing needs around Security, Cost Optimization and Regulatory Compliance. Tooling to manage Cloud Custodian at scale across thousands of cloud accounts, policies and regions. Access to best practice policy sets which solve business problems out-of-the-box. Data and visualizations to understand policy health, resource auditing, trends and anomalies. Real-time inventory, historical revisions and change management of cloud assets.
  • 22
    Omnis Cyber Investigator
    Omnis™ Cyber Investigator is an enterprise-wide network threat and risk investigation platform that helps security teams easily detect, validate, investigate and respond to threats. Reduce the impact of cyberthreats with an analytics system that also integrates with popular Security Information and Event Management (SIEM) platforms. Omnis Cyber Investigator's cloud-first approach helps companies manage threats across increasingly complex digital infrastructures marked by application cloud migration to environments such as Amazon AWS. By combining Omnis Cyber Investigator’s agentless packet access with AWS-resident virtual instrumentation, enterprise users can seamlessly extend their cyber visibility to AWS. Improve the productivity of your cyber security team with guided contextual or ad hoc unguided investigations. Meet the foundational requirement for cyber threat security with visibility across physical and hybrid-cloud infrastructure.
  • 23
    Seemplicity

    Seemplicity

    Seemplicity

    The fundamentals of workplace productivity have been redefined with automated workflows in nearly all domains. But what about security? When it comes to driving risk down, security teams are forced to play air traffic controller, deduplicating, sorting, and prioritizing every security finding that comes in, then routing and following up with developers all across the organization to make sure problems get fixed. The result, is a massive administrative burden on an already resource-constrained team, stubbornly long time-to-remediation, friction between security and development, and an inability to scale. Seemplicity revolutionizes the way security teams work by automating, optimizing, and scaling all risk reduction workflows in one workspace. Aggregated findings with the same solution on the same resource. Exceptions, such as rejected tickets or tickets with a fixed status but an open finding, are automatically redirected to the security team for review.
  • 24
    Silk Security

    Silk Security

    Silk Security

    Cut through the findings flood, holistically understand risk, automate prioritization, and collaborate on fix remediation — all in one platform. Adoption of cloud, hybrid, and cloud-native applications generates more complexity and scale issues that legacy approaches can't begin to address. Without enough environmental context, security teams struggle to measure and prioritize the risk associated with findings. Duplicate alerts from multiple tools mean compounds the challenge for security teams to prioritize and assign remediation ownership. 60% of the breaches that occur are due to a security alert that the organization knew about, but struggled to map stakeholder responsibility for the fix. Map stakeholder responsibility, enable self-service remediation with actionable recommendations, and facilitate bidirectional collaboration through integration into existing tools and workflows.
  • 25
    Opus Security

    Opus Security

    Opus Security

    Prioritize what really matters based on risk, contextual analysis, and event de-duplication. Manage the full remediation lifecycle and eliminate manual effort from the remediation process by introducing automation throughout. Drive cross-organizational initiatives with ease. Consolidate all your issues across posture management and vulnerability tools. Drastically reduce the number of issues by identifying common root causes, and get clear visibility and in-depth reporting. Effectively collaborate with distributed teams within their own tools. Deliver a personalized, relevant experience for every engineer. Provide actionable remediation guidance and practical code suggestions. Easily adapt to your own organizational structure. A centralized, unified platform designed to drive effective remediation across any attack surface, any tool, and any stakeholder. Easily integrating with existing posture management and vulnerability tools, Opus provides much-needed visibility.
  • 26
    Cribl Lake
    Storage that doesn’t lock data in. Get up and running fast with a managed data lake. Easily store, access, and retrieve data, without being a data expert. Cribl Lake keeps you from drowning in data. Easily store, manage, enforce policy on, and access data when you need. Dive into the future with open formats and unified retention, security, and access control policies. Let Cribl handle the heavy lifting so data can be usable and valuable to the teams and tools that need it. Minutes, not months to get up and running with Cribl Lake. Zero configuration with automated provisioning and out-of-the-box integrations. Streamline workflows with Stream and Edge for powerful data ingestion and routing. Cribl Search unifies queries no matter where data is stored, so you can get value from data without delays. Take an easy path to collect and store data for long-term retention. Comply with legal and business requirements for data retention by defining specific retention periods.
  • 27
    Cribl Search
    Cribl Search delivers next-generation search-in-place technology, empowering users to explore, discover, and analyze data that was previously impossible – directly at its source, across any cloud, even data locked behind APIs. Effortlessly search your Cribl Lake or sift through data in major object stores like AWS S3, Amazon Security Lake, Azure Blob, and Google Cloud Storage, and enrich your insights by querying dozens of live API endpoints from various SaaS providers. The power of Cribl Search lies in its strategic approach: forward only the critical data to your systems of analysis, thus avoiding the cost of expensive storage. With native support for platforms such as Amazon Security Lake, AWS S3, Azure Blob, and Google Cloud Storage, Cribl Search delivers a first-of-its-kind ability to seamlessly analyze all data right at its source. Cribl Search allows users to search and analyze data wherever it is located, from debug logs at the edge to archived data in cold storage.
  • 28
    Cobalt

    Cobalt

    Cobalt

    Cobalt offers an advanced embedded integration platform that empowers product and engineering teams to quickly build, deploy, and monetize native integrations using AI-powered agents. With over 1,000 ready-to-use connectors for popular enterprise applications, Cobalt allows businesses to bypass traditional integration hassles like authentication, data mapping, and infrastructure maintenance. Its low-code workflow builder simplifies the creation of complex integrations, while robust features like auto-scaling, real-time monitoring, and API management ensure seamless, scalable performance. Cobalt's plug-and-play architecture and continuous support enable businesses to expand market reach, reduce engineering backlogs, and launch integrations in days instead of months.
  • 29
    Balance Theory

    Balance Theory

    Balance Theory

    Knowledge sharing and collaboration approach result in onboarding new talent faster. Reduce time spent on knowledge management and asking & answering questions leveraging integrated cyber knowledge. Collaborate and align from day 0. An aligned and transparent delivery process to accelerate readiness. Identify and remediate single points of failure prior to employee attrition issues. Highly-available backup of your organization's cyber defense configurations and decisions. Share insights and align internal teams. Move faster with your own organizational collaboration network. Discover community-shared cyber content to reuse and enhance your own cyber programs. Collaborate live with content contributors within stories, through chat or live sessions. Stay in the know on content status, tasking and team commentary to keep your team informed.
  • 30
    Chronicle SOAR
    Employ playbooks for fast time-to-value and ease of scaling as you grow. Address common day-to-day challenges (phishing or ransomware) with ready to run use cases, complete with playbooks, simulated alerts and tutorials. Create playbooks that orchestrate hundreds of the tools you rely on with simple drag and drop. Plus, automate repetitive tasks to respond faster and free up time for higher value work. Maintain, optimize, troubleshoot, and iterate playbooks with lifecycle management capabilities including run analytics, reusable playbook blocks, version control, and rollback. Integrate threat intelligence at every step and visualize the most important contextual data for each threat – who did what, and when – and the relationships between all involved entities attached to an event, product, or source. Patented technology automatically groups contextually related alerts into a single threat-centric case, enabling a single analyst to efficiently investigate and respond to a threat.
  • Previous
  • You're on page 1
  • 2
  • Next