Best IT Security Software for Amazon Web Services (AWS) - Page 19

Compare the Top IT Security Software that integrates with Amazon Web Services (AWS) as of October 2025 - Page 19

This a list of IT Security software that integrates with Amazon Web Services (AWS). Use the filters on the left to add additional filters for products that have integrations with Amazon Web Services (AWS). View the products that work with Amazon Web Services (AWS) in the table below.

  • 1
    Polar Security

    Polar Security

    Polar Security

    Automate data discovery, protection & governance in your cloud workload and SaaS applications. Automatically pinpoint all your exposed sensitive data in cloud workloads and SaaS applications, allowing you to shrink the data attack surface. Identify and classify sensitive data such as PII, PHI, PCI, and custom company IP to prevent sensitive data exposure. Get actionable insights on how to protect your cloud data and ensure compliance, in real-time. Enforce data access policies to achieve least privileged access, maintain a strong security posture, and remain resilient to cyber-threats.
  • 2
    Stack Identity

    Stack Identity

    Stack Identity

    We identify, eliminate and govern shadow access - unauthorized, unmonitored and invisible access to cloud data, applications and infrastructure before an attacker can exploit it. We transform cloud IAM operations with an automated and risk-driven approach to securing and governing cloud data. This empowers cloud and security teams to quickly identify every data access pattern; who, what, when, where and why there is data access and its impact on cloud data security. Stack Identity protects cloud data by prioritizing both the risk and impact of identity, access and data vulnerabilities, visualized via our live data attack map. We help you remediate all types of access risks – human and API-based, guiding identity practitioners, governance and compliance teams and data owners to take definitive action and provide SecOps and DevOps teams with an honest view of cloud security risks.
  • 3
    Tromzo

    Tromzo

    Tromzo

    Tromzo builds deep environmental and organizational context from code to cloud so you can accelerate the remediation of critical risks across the software supply chain. Tromzo accelerates the remediation of risks at every layer from code to cloud. We do this by building a prioritized risk view of the entire software supply chain with context from code to cloud. This context helps our users understand which few assets are critical to the business, prevent risks from being introduced to those critical assets, and automate the remediation lifecycle of the few issues that truly matter. Contextual software asset inventory (code repos, software dependencies, SBOMs, containers, microservices, etc.), so you know what you have, who owns them, and which ones are important to the business. Understand the security posture for every team with SLA compliance, MTTR, and other custom KPIs, so you can drive risk remediation and accountability across the organization.
  • 4
    Kivera

    Kivera

    Kivera

    Enforce preventive controls and secure every interaction with your cloud at build and run time — regardless of how you use it. Detecting cloud misconfigurations puts a heavy burden on the teams responding to and remediating alerts. We know prevention is the strongest control type, but there’s never been a solution that enabled simple, preventive cloud security, until now. The strongest control type is preventive — but there has never been a solution to enforce granular preventive controls across every cloud service, until now. Kivera gives you the power to implement the right cloud guardrails for your organization. Get baseline-level protection across your organization. With a single click, enable out-of-the-box non-negotiables that target the most common causes of cloud breaches - simple misconfigurations.
  • 5
    Cypago

    Cypago

    Cypago

    Reduce manual efforts, lower costs and strengthen trust with customers with no-code automation workflows. Elevate your security Governance, Risk, and Compliance (GRC) maturity through simplified and automated cross-functional processes. Everything you need to know about achieving and maintaining compliance across all security frameworks and IT environments. Get in-depth ongoing insight into your compliance and risk posture. Save thousands of hours of manual work by leveraging the power of true automation. Put security policies and procedures into action to maintain accountability. At last, a complete audit automation experience, including audit scope generation and customization, 3600 evidence collection across data silos, in-context gap analysis, and auditor-trusted reports. Because audits can be easier and way more efficient than they are today. Transform chaos into compliance and enjoy instant insights on your employee and user base access privileges and permissions.
  • 6
    Josys

    Josys

    Josys

    Discover and visualize SaaS apps, streamline all provisioning operations, and conquer shadow IT while gaining valuable insights into SaaS expenditure and optimizing where it counts. Simplify, optimize, and secure your SaaS and device management, all on a unified console with just a few clicks. Visualize devices, monitor statuses, and manage lifecycle. Choose the right equipment and configurations for your team with ease, and streamline delivery logistics with utmost efficiency. Select from a large catalog of popular SaaS integrations to drastically simplify your workflows and eliminate the burden of bouncing around various SaaS consoles. Josys integrates with popular SaaS apps to enable operational efficiencies like never before, streamlining your workflows via effortless integrations with a wide range of SaaS apps. This leads to streamlined processes, eliminated redundant tasks, reduced manual errors, and enhanced workflow fluidity across apps.
  • 7
    HarfangLab

    HarfangLab

    HarfangLab

    Detect files considered malicious based on specific signatures discovered by researchers, publishers and our CTI team. Set up detection alerts on IOCs corresponding to known threats and enrich them with your own IOCs to adapt EDR to your environment. Our R&D team is constantly training its algorithms to enable you to detect binaries that are reputed to be undetectable. Take advantage of 1,200+ detection rules and identify potential new threats not listed by IOCs or in signature databases. An engine developed specifically to counter ransomware. Safeguards your EDR system against unauthorized tampering, ensuring it remains operational. Prevents the download and installation of malicious or vulnerable drivers using our continuously updated list. Receive alerts in case any malicious driver attempts to modify your EDR's monitoring and protection capabilities.
  • 8
    Google Digital Risk Protection
    Learn what a digital risk protection solution is and how it can help you be better prepared by understanding who is targeting you, what they’re after, and how they plan to compromise you. Google Digital Risk Protection delivers a broad digital risk protection solution either via stand-alone self-managed SaaS products or a comprehensive service. Both options give security professionals visibility outside their organization, the ability to identify high-risk attack vectors, malicious orchestration from the deep and dark web, and attack campaigns on the open web.  The Google Digital Risk Protection solution also provides contextual information on threat actors and their tactics, techniques, and procedures to provide a more secure cyber threat profile. Gain visibility into risk factors impacting the extended enterprise and supply chain by mapping your attack surface and monitoring deep and dark web activity.
  • 9
    Dazz

    Dazz

    Dazz

    Unified remediation for code, clouds, applications, and infrastructure. We help security and dev teams accelerate remediation and reduce exposure with one remediation solution for everything developed and run in their environments. Dazz connects security tools and pipelines, correlates insights from code to cloud, and shrinks alert backlog into root causes, so your team can remediate smarter and faster. Shrink your risk window from weeks to hours. Prioritize the vulnerabilities that matter most. Say goodbye to chasing and triaging alerts manually, and hello to automation that reduces exposure. We help security teams triage and prioritize critical fixes with context. Developers get insight into root causes and backlog relief. With less friction, your teams truly could become BFFs.
  • 10
    Opus Security

    Opus Security

    Opus Security

    Prioritize what really matters based on risk, contextual analysis, and event de-duplication. Manage the full remediation lifecycle and eliminate manual effort from the remediation process by introducing automation throughout. Drive cross-organizational initiatives with ease. Consolidate all your issues across posture management and vulnerability tools. Drastically reduce the number of issues by identifying common root causes, and get clear visibility and in-depth reporting. Effectively collaborate with distributed teams within their own tools. Deliver a personalized, relevant experience for every engineer. Provide actionable remediation guidance and practical code suggestions. Easily adapt to your own organizational structure. A centralized, unified platform designed to drive effective remediation across any attack surface, any tool, and any stakeholder. Easily integrating with existing posture management and vulnerability tools, Opus provides much-needed visibility.
  • 11
    SecuPi

    SecuPi

    SecuPi

    SecuPi provides an overarching data-centric security platform, delivering fine-grained access control (ABAC), Database Activity Monitoring (DAM) and de-identification using FPE encryption, physical and dynamic masking and deletion (RTBF). SecuPi offers wide coverage across packaged and home-grown applications, direct access tools, big data, and cloud environments. One data security platform for monitoring, controlling, encrypting, and classifying data across all cloud & on-prem platforms seamlessly with no code changes. Agile and efficient configurable platform to meet current & future regulatory and audit requirements. No source-code changes with fast & cost-efficient implementation. SecuPi’s fine-grain data access controls protect sensitive data so users get access only to data they are entitled to view, and no more. Seamlessly integrate with Starburst/Trino for automated enforcement of data access policies and data protection operations.
  • 12
    Prompt Security

    Prompt Security

    Prompt Security

    Prompt Security enables enterprises to benefit from the adoption of Generative AI while protecting from the full range of risks to their applications, employees and customers. At every touchpoint of Generative AI in an organization — from AI tools used by employees to GenAI integrations in customer-facing products — Prompt inspects each prompt and model response to prevent the exposure of sensitive data, block harmful content, and secure against GenAI-specific attacks. The solution also provides leadership of enterprises with complete visibility and governance over the AI tools used within their organization.
  • 13
    LightBeam.ai

    LightBeam.ai

    LightBeam.ai

    Discover within minutes if sensitive information lurks in places you never expected (screenshots, logs, tickets, messages, tables). With one click, LightBeam can easily generate executive or delta reports to gain valuable insights into your sensitive data. Automate DSRs leveraging LightBeam's unique PII/PHI graphs comprehensively created from your data infrastructure. Build trust with your users by empowering them to exercise control over their data collection. Continuously monitor how sensitive data is collected, used, shared, and maintained with appropriate safeguards within your organization.
  • 14
    Blink

    Blink

    Blink Ops

    Blink is an ROI force multiplier for security teams and business leaders looking to quickly and easily secure a wide variety of use cases. Get full visibility and coverage of alerts across your organization and security stack. Utilize automated flows to reduce noise and false positives in alerts. Scan for attacks and proactively identify insider threats and vulnerabilities. Create automated workflows that add relevant context, streamline communications, and reduce MTTR. Take action on alerts and improve your cloud security posture with no-code automation and generative AI. Shift-left access requests, streamline approvals flows, and unblock developers while keeping your applications secure. Continuously monitor your application for SOC2, ISO, GDPR, or other compliance checks and enforce controls.
  • 15
    SURF Security

    SURF Security

    SURF Security

    Create a security air gap, reduce your attack surface and isolate your business from internal and external exploits, while streamlining SaaS apps and accessing your data. Grants access based on the identity of the users and their devices to any SaaS or on-prem apps. Isolated work environment from device and web threats locally on the endpoint, by encrypting, sandboxing and rendering content. Enforcing enterprise browser security policies like DLP, web filtering, phishing protection, extension management and more. SURF brings Zero-Trust principles to the user via the browser, protecting everyone and everything in the enterprise regardless of role. By configuring only a few policies, IT and security teams can significantly reduce the attack surface. Discover the benefits of utilizing SURF from an Information technology perspective.
  • 16
    Mindflow

    Mindflow

    Mindflow

    Embrace hyper-automation at scale with intuitive no-code & AI-generated flows. Access every tool you need through the most extensive integration library ever provided. Pick the service you want from the Integrations library and automate your way. Onboard and build your first workflows in minutes. Use pre-built templates if you need them, help yourself with the AI assistant, or benefit from the Mindflow excellence center. Type your input in plain-language text and let Mindflow do the rest. Generate workflows adapted to your tech stack from any input. Create AI-generated workflows to help you address any use case and reduce the building time to the minimum. Mindflow redefines enterprise automation, offering an extensive catalog of integrations. Add any new tool to our platform within minutes, breaking the barriers of traditional integration. Connect and orchestrate your tech stack, no matter the tools you use.
  • 17
    AppSOC

    AppSOC

    AppSOC

    Coverage for a wide variety of security scanners - infrastructure, platforms, and applications. Create a single policy to apply across all the scanners in the pipeline - any microservice or application. Enriched software bill of material with information from your SCA platform and multiple scanners. With unified application and vulnerability correlation information reporting, business executives and product owners can accelerate the time to market. With automated triaging, deduping and 95% noise reduction, you know exactly the vulnerabilities to focus on. With workflow automation, risk-based triaging and prioritization, you can now scale instead of manually chasing every issue. With machine learning based correlation and application level risk scoring you have an exact understanding of impact of every vulnerability on your compliance.
  • 18
    Zafran Security

    Zafran Security

    Zafran Security

    Zafran is the first solution to consider your existing security tools' configurations to determine if vulnerabilities are truly exploitable or already mitigated by your compensating controls. Effective mitigation involves continuously validating and mobilizing your security tools to efficiently defuse threat exploitation Zafran enables the automation of mitigations in your existing security tools to proactively protect you from emerging threats. Our analysis of your security stack and compensating controls offers holistic insights into where your organization is sufficiently protected and highlights which tools fall short in addressing your current risks over time. Zafran provides evidence to better prioritize exploitable vulnerabilities considering your existing mitigative factors, and help organizations patch what matters first.
  • 19
    Bedrock Security

    Bedrock Security

    Bedrock Security

    At Bedrock Security, frictionless data security means freedom to embrace cloud and AI data growth safely, without slowing your business down. Start your data security journey, and confidently move beyond just visibility. Understand your material data with AI reasoning and ensure cloud and GenAI compliance controls are enforced with out-of-the-box compliance frameworks. Your data isn’t static, it’s growing, changing, and moving, making it critical for you to perform security assessments continuously. Efficiently manage remediation and response, integrating behavior-based anomaly detection, SIEM/SOAR integration, policy enforcement, and prioritization based on data context. Mature security programs can frictionlessly enable business operations while effectively managing risk to the brand, revenue, and reputation of the organization. Bedrock’s AIR helps organizations with data minimization, identity and access minimization, and data hardening.
  • 20
    StrikeReady

    StrikeReady

    StrikeReady

    StrikeReady delivers the industry's first unified, vendor-agnostic, AI-powered security command center, purpose-built to optimize, centralize, and accelerate a company’s threat response. StrikeReady’s platform levels the entire security team by centralizing, analyzing, and operationalizing security data across a company’s entire security tech stack. StrikeReady empowers smarter, faster decision-making with actionable insights by providing security teams with real-time, holistic, end-to-end visibility across an ever-changing security ecosystem. This transforms SOC teams into proactive defense teams by allowing them to stay ahead of constantly evolving threats. StrikeReady delivers a revolutionary, AI-powered security command center that is changing the way SOC teams work and defend. The platform is the first to be truly vendor-neutral and seamless, providing a unified, end-to-end view of your entire security operation.
  • 21
    Vorlon

    Vorlon

    Vorlon

    Continuous near real-time detection and identification of your data in motion between third-party apps with remediation capabilities. By not continuously monitoring third-party APIs, you inadvertently grant attackers an average of seven months to act before you detect and remediate an issue. Vorlon continuously monitors your third-party applications and detects abnormal behavior in near real-time, processing your data every hour. Understand your risks in the third-party apps your Enterprise uses with clear insights and recommendations. Report progress to your stakeholders and board with confidence. Gain visibility into your third-party apps. Detect, investigate, and respond to abnormal third-party app activity, data breaches, and security incidents in near real-time. Determine whether the third-party apps your Enterprise uses are compliant with regulations. Provide proof of compliance to stakeholders with confidence.
  • 22
    Seconize DeRisk Center
    Businesses are prone to increased attacks as the security teams are buried under tons of assessment reports and lack tools to manage the vulnerabilities that are key to their business. For companies ranging from SMBs, and start-ups to enterprises, Seconize makes discovering, identifying, prioritizing, and mitigating cyber risks and vulnerabilities easier. Identify potential losses as a result of cyber threats. Helps to evaluate the defenses constantly and mitigate the evolving threats. Factors multiple business facets to make it relevant to the organization. Compliance reports against standards like ISO 27001, NIST-CSF, PCI-DSS, RBI/SEBI/IRDAI guidelines. Loved by businesses, and individuals across the globe. Creating products that combine simplicity, flexibility, and security. Organizations of all types and sizes, from small businesses to very large enterprises are relying on Seconize to manage their risks and improve security posture.
  • 23
    Lucidum

    Lucidum

    Lucidum

    Your attack surface is not just what’s connected to the internet, it’s not just your IOT or endpoints, it’s everything. Other CAASM providers want to replace your SIEM or upgrade your spreadsheet. We don’t disrupt your workflow, we serve it, we don’t fight your SIEM, we fit it. Lucidum opens your eyes to the main sources of data loss, security incidents, and mismanagement. You’ll get amazing value out of 4-6 connections. But we don’t charge for connectors or ingestion, hook them all up. Directly inject our CAASM into your SIEM. Cut costs through significantly reduced ingestion and streamlined computing. We empower cybersecurity professionals with CAASM-driven insights to map, manage, and monitor every cyber asset, enhancing their ability to uncover hidden threats and mitigate risks. By leveraging the combined strength of CAASM for comprehensive asset visibility and AI for predictive analytics and automation, we offer unprecedented control over the technology landscape.
  • 24
    SecHard

    SecHard

    SecHard

    SecHard is a multi-module software for implementing zero-trust architecture. SecHard provides automated security hardening auditing, scoring, and remediation for servers, clients, network devices, applications, databases, and more. A powerful identity and access management software to get compliant with zero trust and to prevent attacks like privilege abuse, ransomware, and more. SecHard solves the risk awareness problem in asset management. Automated discovery, access, identification, and remediation features provide ultra-wide visibility for all regulations. With the passive scanning method, SecHard operates the vulnerability detection and management processes for all IT assets without creating any risks. SecHard auto-discovers the certificates in the company’s environment report the expiration dates of these certificates, and it can automatically renew some of these certificates through well-known certificate authorities.
  • 25
    appNovi

    appNovi

    appNovi

    Connect your existing tools and consolidate your asset inventory. Gain an authoritative data source to empower your analyst and decrease escalations. Prioritize vulnerable assets based on network exposure and business impact. Understand the threat exposure of assets and alert on compliance drifts. Gain an authoritative source of data to understand your environment. Gain complete asset inventories, identify missing security agents, understand exposure, and prioritize vulnerabilities effectively. Maintain complete asset inventories using your existing tools. Prioritize risk based on network exposure and business impact. Gain total visibility of your environment and threat exposure. Streamline operations and reach outcomes faster by eliminating IT data uncertainty. Understand cardholder data protection, enhance vulnerability management processes, and identity where compensating controls are needed.
  • 26
    Blackwell Security

    Blackwell Security

    Blackwell Security

    Blackwell’s hyper-specialized security operations are tailor-made to deliver the most complete protection and rapid response aligned to the unique needs of healthcare organizations. Secure your entire environment with full MDR signals, customized healthcare intelligence, and advanced security tooling that ensures 24/7 protection against complex cyber threats. Blackwell Security provides managed security operations designed exclusively for healthcare organizations, so you can reduce risk, maintain compliance, and build a secure continuum of care. Optimize existing tooling, expand your SOC team, and partner with expert healthcare threat hunters for continuous visibility, incident prevention, and compliance alignment using your current tools. Elevate your organization’s cybersecurity maturity with specialized guidance to streamline and strengthen your security practices, mitigate gaps in your cyber compliance posture, and proactively drive improvements across your program.
  • 27
    Averlon

    Averlon

    Averlon

    Among millions of vulnerabilities in the cloud, only a small subset paves the way for real-world attacks. Identifying this select subset is key to securing the cloud. Even the most dedicated teams reach their limit. The presence of a vulnerability on an externally exposed asset or in the KEV database does not automatically make it critical. Seamlessly onboard your cloud environment, and within moments, get a clear picture of your security landscape. Thanks to our attack chain analysis, you'll instantly know where to direct your attention. Averlon makes a deep graph analysis of your cloud across assets, network connections, access policies, and issues. Focus on assets and issues that present the most amount of risk. Averlon continuously monitors your cloud and identifies potential real-world attacks. Averlon accelerates the mean-time-to-remediate by reducing alerts into root causes and suggesting precise fixes.
  • 28
    SecureFlag

    SecureFlag

    SecureFlag

    SecureFlag’s hands-on training in real development environments offers a tailored approach to enterprise training needs. 45+ technologies supported and over 150 vulnerability types covered. Each comprises a fully configured development environment. With more than 70% of vulnerabilities introduced during development, writing secure software is more critical than ever. SecureFlag has revolutionized the approach to secure coding training. With SecureFlag’s hands-on labs, participants learn in virtualized environments using the tools they know and love. SecureFlag’s Labs teaches participants how to identify and remediate the most prevalent security issues by doing instead of simply just seeing. Labs run in real, virtualized development environments, and participants learn using the same tools they use at work. Engage with your organization’s developer community and promote learning through enjoyable competition.
  • 29
    Tracebit

    Tracebit

    Tracebit

    Tracebit generates and maintains tailored canary resources in your cloud environments, closing gaps in stock protection without time and cost intensive detection engineering. Tracebit generates and maintains dynamic cloud canaries. Tracebit alerts have inherent context that can be understood and actioned by the whole team. We cover a full and growing range of cloud resources, and continue to evolve and refresh your canaries instep with your environment to constantly keep your adversaries guessing. Leverage our infrastructure as code integration and automated canary recommendations to scale our cloud canaries across your estate rapidly.
  • 30
    Velotix

    Velotix

    Velotix

    Velotix empowers organizations to maximize the value of their data while ensuring security and compliance in a rapidly evolving regulatory landscape. The Velotix Data Security Platform offers automated policy management, dynamic access controls, and comprehensive data discovery, all driven by advanced AI. With seamless integration across multi-cloud environments, Velotix enables secure, self-service data access, optimizing data utilization without compromising on governance. Trusted by leading enterprises across financial services, healthcare, telecommunications, and more, Velotix is reshaping data governance for the ‘need to share’ era.