Best IT Security Software for Amazon CloudFront

Compare the Top IT Security Software that integrates with Amazon CloudFront as of September 2024

This a list of IT Security software that integrates with Amazon CloudFront. Use the filters on the left to add additional filters for products that have integrations with Amazon CloudFront. View the products that work with Amazon CloudFront in the table below.

What is IT Security Software for Amazon CloudFront?

IT security software helps protect networks, systems, and data from malicious attacks and other cyber threats. It can be used to monitor and detect suspicious activities, as well as to prevent unauthorized access to data and resources. IT security software can also be used to detect and respond to security incidents in a timely manner. Compare and read user reviews of the best IT Security software for Amazon CloudFront currently available using the table below. This list is updated regularly.

  • 1
    New Relic

    New Relic

    New Relic

    Strengthen IT Security with New Relic: Safeguard your enterprise with advanced threat detection and resilient protection. Elevate your IT security posture with New Relic’s robust observability platform, designed to provide software engineer practitioners with comprehensive visibility and control over your security landscape. Our solution offers real-time monitoring and advanced threat detection, empowering you to proactively identify and address vulnerabilities before they impact your business. Seamlessly integrate security insights with your broader IT operations to ensure compliance, minimize risks, and protect critical assets. Enhance your incident response capabilities, streamline security management, and align your security strategy with organizational objectives. With New Relic, fortify your enterprise against evolving threats and drive a culture of proactive security and resilience.
    Leader badge
    Starting Price: Free
    View Software
    Visit Website
  • 2
    Queue-it

    Queue-it

    Queue-it ApS

    Queue-it empowers organizations to deliver seamless user experiences and protect their brand reputation by controlling online traffic. Crashes and slowdowns threaten even the biggest of businesses. They impact sales, frustrate visitors, and damage reputation and trust. Traffic management solutions equip brands to protect themselves against the threat of downtime. Queue-it’s cloud-based virtual waiting room lets organizations control web traffic to deliver a fair and frictionless user experience, no matter the demand. It gives organizations peace of mind and confidence on their busiest days, so they can focus on delivering customers and citizens the experience they deserve. Since Queue-it’s first waiting room went live in 2010, over 50 billion users have passed through our system. Today, we have offices in Copenhagen, Minneapolis, and Sydney, and people joining our queues from 172 countries around the globe.
  • 3
    DataDome

    DataDome

    DataDome

    The #1 SaaS bot protection solution for e-commerce and classified ads businesses. Deploys in minutes on any web infrastructure. Unmatched bot detection speed and accuracy. Runs on autopilot, easy to customize. Full protection of your websites, mobile apps and APIs. DataDome takes care of all unwanted traffic so that your IT teams don’t have to. No more on-call incidents due to bot attacks! You still remain in full control, thanks to the bot detection software’s most comprehensive dashboard to monitor and optimize detection and response. DataDome runs anywhere, in any cloud. You install it in minutes with a simple piece of code, optimized for your architecture. Our bot detection software offers unified protection of complex architectures. It’s compatible with all major web technologies, including multi-cloud and multi-CDN setups.
    Starting Price: $1590 per month
  • 4
    ChaosSearch

    ChaosSearch

    ChaosSearch

    Log analytics should not break the bank. Because most logging solutions use one or both of these technologies - Elasticsearch database and/ or Lucene index - the cost of operation is unreasonably high. ChaosSearch takes a revolutionary approach. We reinvented indexing, which allows us to pass along substantial cost savings to our customers. See for yourself with this price comparison calculator. ChaosSearch is a fully managed SaaS platform that allows you to focus on search and analytics in AWS S3 rather than spend time managing and tuning databases. Leverage your existing AWS S3 infrastructure and let us do the rest. Watch this short video to learn how our unique approach and architecture allow ChaosSearch to address the challenges of today’s data & analytic requirements. ChaosSearch indexes your data as-is, for log, SQL and ML analytics, without transformation, while auto-detecting native schemas. ChaosSearch is an ideal replacement for the commonly deployed Elasticsearch solutions.
    Starting Price: $750 per month
  • 5
    Fingerprint

    Fingerprint

    Fingerprint

    Stop fraud, spam, and account takeovers with 99.5% accurate browser fingerprinting as a service. Access suspicious visitor activity and geolocation at lightspeed. Integrate our API into your server-side business rules or signup process. Receive instant notifications delivered securely to your backend systems, ideal for building scalable and asynchronous processes. Powerful account takeover protection for any web application. Keep your customers' accounts safe by accurately identifying threats before they cause damage. Users that re-use passwords across multiple services are at risk of having their accounts accessed by fraudsters who purchased or hacked their account information from elsewhere. Catch these attempts by associating multiple login attempts from bot networks. Social engineering is still one of the most reliable methods for fraudsters to access accounts. Require new visitors to provide additional authentication to stop phished accounts from being accessed easily.
    Starting Price: $80 per month
  • 6
    AWS Secrets Manager
    AWS Secrets Manager helps you protect secrets needed to access your applications, services, and IT resources. The service enables you to easily rotate, manage, and retrieve database credentials, API keys, and other secrets throughout their lifecycle. Users and applications retrieve secrets with a call to Secrets Manager APIs, eliminating the need to hardcode sensitive information in plain text. Secrets Manager offers secret rotation with built-in integration for Amazon RDS, Amazon Redshift, and Amazon DocumentDB. Also, the service is extensible to other types of secrets, including API keys and OAuth tokens. In addition, Secrets Manager enables you to control access to secrets using fine-grained permissions and audit secret rotation centrally for resources in the AWS Cloud, third-party services, and on-premises. AWS Secrets Manager helps you meet your security and compliance requirements by enabling you to rotate secrets safely without the need for code deployments.
    Starting Price: $0.40 per month
  • 7
    Netacea Bot Management
    At Netacea we understand bot behaviour better than anyone else, thanks to a pioneering server-side approach to detection and mitigation. Our approach guarantees quick and easy implementation of our technology and enables us to support a wide range of integrations. This ensures comprehensive coverage against malicious bots across your website, mobile apps and APIs, without detriment to your website infrastructure, reliance on hardware or disruptive code changes. We quickly distinguish automated bots from humans to prioritize genuine users, with our team of experts and revolutionary, machine learning powered Intent Analytics™ engine at the heart of the solution. Netacea works hand-in-hand with your in-house security functions from implementation, through to providing accurate detection and empowering you with actionable threat intelligence.
  • 8
    Centreon

    Centreon

    Centreon

    Centreon is a global provider of business-aware IT monitoring for always-on operations and performance excellence. The company’s holistic, AIOps-ready platform is designed for today’s complex, distributed hybrid cloud infrastructures. Centreon monitors the complete IT Infrastructure from Cloud-to-Edge for a clear and comprehensive view. Centreon removes blind spots, monitoring all equipment, middleware and applications that are part of modern IT workflows, from on-premise legacy assets to private and public cloud environments, all the way to the edge of the network, where smart devices and customers combine to create business value. Centreon is constantly current, able to support the most dynamic environments. With auto-discovery capabilities it can keep track of Software-Defined Network (SDN) elements, AWS or Azure cloud assets, Wi-Fi access points or any other component of today’s agile IT infrastructure.
  • 9
    Splunk User Behavior Analytics
    Securing against unknown threats through user and entity behavior analytics. Discover abnormalities and unknown threats that traditional security tools miss. Automate stitching of hundreds of anomalies into a single threat to simplify a security analyst’s life. Use deep investigative capabilities and powerful behavior baselines on any entity, anomaly or threat. Automate threat detection using machine learning so you can spend more time hunting with higher fidelity behavior-based alerts for quick review and resolution. Rapidly identify anomalous entities without human analysis. Rich set of anomaly types (65+) and threat classifications (25+) across users, accounts, devices and applications. Rapidly identify anomalous entities without human analysis. Rich set of anomaly types and threat classifications (25+) across users, accounts, devices and applications. Organizations gain maximum value to detect and resolve threats and anomalies via the power of human and machine-driven solutions.
  • 10
    Commvault Intelligent Data Services
    An integrated family of solutions for actionable insights, combining Commvault Data Governance, Commvault File Storage Optimization, and Commvault eDiscovery & Compliance. We’re creating more data than ever before — we should know all about it. Drive proactive and automated actions to respond faster, prevent data theft or breach, eliminate data sprawl, and make data-driven decisions for your org. Increase storage efficiency, enable faster responses to compliance requests, and reduce your data risks with analytics, reporting, and search across production and backup data sources. Advanced “4D” technology delivering a centralized and dynamic multi-dimensional index of metadata, content, classifications, and AI applied insights. Gain visibility into production and backup data with a single unified index across on-premises, remote, cloud, and backup data sources. Customizable dashboards enable you to search, filter, and drill down to the relevant details.
  • 11
    Kasada

    Kasada

    Kasada

    Kasada has developed a radical approach to defeating automated cyberthreats based on its unmatched understanding of the human minds behind them. The Kasada platform overcomes the shortcomings of traditional bot management to provide immediate and enduring protection for web, mobile, and API channels. Its invisible, dynamic defenses provide a seamless user experience and eliminate the need for ineffective, annoying CAPTCHAs. Our team handles the bots so clients have freedom to focus on growing their businesses, not defending it. Kasada is based in New York and Sydney, with offices in Melbourne, Boston, San Francisco, and London.
  • 12
    AWS WAF

    AWS WAF

    Amazon

    AWS WAF is a web application firewall that helps protect your web applications or APIs against common web exploits that may affect availability, compromise security, or consume excessive resources. AWS WAF gives you control over how traffic reaches your applications by enabling you to create security rules that block common attack patterns, such as SQL injection or cross-site scripting, and rules that filter out specific traffic patterns you define. You can get started quickly using Managed Rules for AWS WAF, a pre-configured set of rules managed by AWS or AWS Marketplace Sellers. The Managed Rules for WAF address issues like the OWASP Top 10 security risks. These rules are regularly updated as new issues emerge. AWS WAF includes a full-featured API that you can use to automate the creation, deployment, and maintenance of security rules. With AWS WAF, you pay only for what you use. The pricing is based on how many rules you deploy and how many web requests your application receives.
  • 13
    AWS Shield
    AWS Shield is a managed Distributed Denial of Service (DDoS) protection service that safeguards applications running on AWS. AWS Shield provides always-on detection and automatic inline mitigations that minimize application downtime and latency, so there is no need to engage AWS Support to benefit from DDoS protection. There are two tiers of AWS Shield - Standard and Advanced. All AWS customers benefit from the automatic protections of AWS Shield Standard, at no additional charge. AWS Shield Standard defends against most common, frequently occurring network and transport layer DDoS attacks that target your web site or applications. When you use AWS Shield Standard with Amazon CloudFront and Amazon Route 53, you receive comprehensive availability protection against all known infrastructure (Layer 3 and 4) attacks.
  • 14
    Cyware

    Cyware

    Cyware

    Cyware is the only company building Virtual Cyber Fusion Centers enabling end-to-end threat intelligence automation, sharing, and unprecedented threat response for organizations globally. Cyware offers a full-stack of innovative cyber fusion solutions for all-source strategic, tactical, technical and operational threat intelligence sharing & threat response automation. Cyware’s Enterprise Solutions are designed to promote secure collaboration, inculcate cyber resilience, enhance threat visibility and deliver needed control by providing organizations with automated context-rich analysis of threats for proactive response without losing the element of human judgment. Cyware solutions are pushing the boundaries of current security paradigms by utilizing advances in Machine Learning, Artificial Intelligence, Security Automation & Orchestration technologies to empower enterprises in adapting to the evolving threat landscape.
  • 15
    RdpGuard

    RdpGuard

    RdpGuard

    It monitors the logs on your server and detects failed logon attempts. If the number of failed logon attempts from a single IP address reaches a set limit, the attacker's IP address will be blocked for a specified period of time. Many Windows Server machines are under constant attack. Network scanners and RDP brute-force tools work 24/7. Eventually they may find a password to access your server! Moreover, RDP brute-force attacks abuse server resources (CPU, RAM, Disk Space and Network Bandwidth). Take a look at your server's Security EventLog. How many failed login attempts do you see? The log may note thousands of failed login attempts from a single IP address. This means that someone is trying to find a password to access your server.
  • 16
    GeoGuard

    GeoGuard

    GeoComply

    Ensure users accessing geo-restricted content are in the licensed location. Ensure ads are only served to genuine users. Filter out potentially bad traffic, including VPNs, data centers, proxies and Tor. Provides a dynamic, continuously updated list of IP addresses identified as fraudulent. Detects advanced location spoofing techniques such as proxy over VPN and residential IP hijacking. Recognizes methods of deception used to mask the true nature of fraudulent IP addresses. Leverages GeoGuard’s machine learning and human intelligence to predict and counter emerging threats. A customizable, spoof-proof geolocation solution that works with a wide range of devices and user interfaces. Approved and recommended by major rights owners for film, TV and sports.
  • Previous
  • You're on page 1
  • Next