Best IT Security Software for Amazon Web Services (AWS) - Page 21

Compare the Top IT Security Software that integrates with Amazon Web Services (AWS) as of October 2025 - Page 21

This a list of IT Security software that integrates with Amazon Web Services (AWS). Use the filters on the left to add additional filters for products that have integrations with Amazon Web Services (AWS). View the products that work with Amazon Web Services (AWS) in the table below.

  • 1
    AWS Elastic Disaster Recovery
    ​AWS Elastic Disaster Recovery (AWS DRS) minimizes downtime and data loss by enabling rapid, reliable recovery of on-premises and cloud-based applications. It allows you to use AWS as a disaster recovery site for applications comprising physical and virtual servers, including databases. AWS DRS continuously replicates your source servers to a staging area subnet in your AWS account, utilizing cost-effective storage and minimal computing resources. In the event of a disaster, you can launch recovery instances on AWS within minutes, restoring applications to their most recent state or a previous point in time. The service also supports non-disruptive testing and failback to your primary site when needed. ​
  • 2
    DataBahn

    DataBahn

    DataBahn

    DataBahn.ai is redefining how enterprises manage the explosion of security and operational data in the AI era. Our AI-powered data pipeline and fabric platform helps organizations securely collect, enrich, orchestrate, and optimize enterprise data—including security, application, observability, and IoT/OT telemetry—for analytics, automation, and AI. With native support for over 400 integrations and built-in enrichment capabilities, DataBahn streamlines fragmented data workflows and reduces SIEM and infrastructure costs from day one. The platform requires no specialist training, enabling security and IT teams to extract insights in real time and adapt quickly to new demands. We've helped Fortune 500 and Global 2000 companies reduce data processing costs by over 50% and automate more than 80% of their data engineering workloads.
  • 3
    PQShield

    PQShield

    PQShield

    PQShield offers a comprehensive suite of post-quantum cryptography solutions designed to future-proof digital infrastructures against the emerging threats posed by quantum computing. Their UltraPQ-Suite encompasses a range of hardware and software products optimized for various use cases, including ultra-fast, ultra-small, and ultra-secure implementations. PQShield's offerings include PQPlatform-Lattice, a compact, FIPS 140-3 CAVP-compliant cryptographic engine supporting lattice-based algorithms like ML-KEM and ML-DSA; PQPlatform-CoPro, which combines hash-based and lattice-based cryptography engines for seamless integration into existing security subsystems; and PQPlatform-TrustSys, a fully autonomous, PQC-focused root-of-trust subsystem designed for minimal integration effort and robust side-channel protection. PQCryptoLib provides a general-purpose cryptographic library supporting both post-quantum and classical algorithms, facilitating smooth transitions to quantum systems.
  • 4
    AWS IAM Identity Center
    AWS IAM Identity Center simplifies centralized access management across multiple AWS accounts and business applications. It enables users to access assigned accounts and applications from a unified portal. Administrators can manage user permissions centrally, assigning them based on job functions and customizing as needed. IAM Identity Center integrates with various identity sources, including Microsoft Active Directory, Okta, Ping Identity, JumpCloud, and Microsoft Entra ID, and supports standards like SAML 2.0 and SCIM for user provisioning. It facilitates attribute-based access control by allowing selection of user attributes such as cost center, title, or locale from the identity source. It supports multi-factor authentication (MFA) using methods like FIDO-enabled security keys, biometric authenticators, and time-based one-time passwords.
  • 5
    Libelle DataMasking
    Libelle DataMasking (LDM) is a robust, enterprise-grade data masking solution that automates the anonymization of sensitive or personal data—such as names, addresses, dates, emails, IBANs, credit cards—and transforms them into realistic, logically consistent substitutes that maintain referential integrity across SAP and non‑SAP systems, including Oracle, SQL Server, IBM DB2, MySQL, PostgreSQL, SAP HANA, flat files, and cloud databases. Capable of processing up to 200,000 entries per second and supporting parallelized masking for massive datasets, LDM uses a multithreaded architecture to efficiently read, anonymize, and write data back with high performance. It features over 40 built‑in anonymization algorithms—such as number, alphanumeric, date shifting, name, email, IBAN masking, credit card obfuscation, and mapping algorithms—as well as templates for SAP modules (CRM, ERP, FI/CO, HCM, SD, SRM).
  • 6
    Cosmian

    Cosmian

    Cosmian

    Cosmian’s Data Protection Suite delivers a comprehensive, next-generation cryptography platform to secure sensitive data and applications in use, at rest, and in motion across cloud and edge environments. It includes Cosmian Covercrypt, a high-performance hybrid classical and post-quantum encryption library with traceable, fine-grained access control; Cosmian KMS, an open-source, centralized key management system that enables massive client-side encryption on the fly; and Cosmian VM, a plug-and-play, verifiable confidential virtual machine that continuously cryptographically verifies its own integrity without disrupting existing workflows. An AI Runner (“Cosmian AI”) operates within the confidential VM to enable secure model training, querying, and fine-tuning, no coding required. All components integrate via simple APIs and deploy rapidly through AWS, Azure, or Google Cloud marketplaces, empowering organizations to build zero-trust architectures.
  • 7
    Cogent Security

    Cogent Security

    Cogent Security

    Cogent Security delivers an AI‑powered vulnerability management platform that autonomously orchestrates the entire VM lifecycle, providing 24/7 coverage at machine speed with 50 % less manual intervention. The system begins by ingesting real‑time context from your infrastructure, assets, configurations, threat intelligence, and business criticality, to dynamically prioritize risks based on exploit likelihood and potential impact. Through ROI‑based action planning, it surfaces the highest‑value remediation tasks and then automates orchestration workflows to deploy patches, configuration changes, or compensating controls. Built‑in AI agents continuously monitor progress and adapt plans as new vulnerabilities emerge, while program‑level reporting generates executive‑ready dashboards and compliance evidence on demand. Customers achieve a 2× reduction in mean time to remediate critical flaws and resolve findings 4× faster, all without expanding headcount.
  • 8
    CloudCover CyberSafety Platform (CC/B1)
    CloudCover CyberSafety B1 Platform (CCB1) is an advanced AI‑based SOAR security threat management solution that operates at sub‑second speed, ingesting real‑time context from an organization’s assets, configurations, threat intelligence, and business criticality to dynamically prioritize risks and deflect attacks with 99.9999999% accuracy and zero false positives. Leveraging patented deep‑learning risk orchestration, it has recorded and halted over 41 billion breach attempts in microseconds without compromise, continuously detecting, capturing, and preventing kompromat across cloud and on‑premises environments. CCB1 integrates seamlessly with existing security stacks to form a predictive CyberSafety layer that automates remediation workflows, deploying patches, configuration changes, or compensating controls, while built‑in AI agents adapt in real time to emerging threats.
  • 9
    Palo Alto Networks Cloud NGFW
    Palo Alto Networks Cloud NGFW for AWS delivers advanced network security designed specifically for cloud environments. It offers easy deployment with no infrastructure to manage, allowing users to protect AWS VPCs quickly through a managed service available on AWS Marketplace. The firewall provides consistent policy management, supports automation through APIs and Terraform, and integrates with Panorama for unified management. Cloud NGFW blocks intrusions, data exfiltration, and command-and-control traffic while enforcing Zero Trust principles. Its deep learning capabilities detect and prevent zero-day attacks in real time, offering full Layer 7 protection against web-based threats and evasions. This service streamlines cloud security by eliminating complex legacy appliances and securing traffic crossing trust boundaries.
  • 10
    Sola Security

    Sola Security

    Sola Security

    Sola Security is an AI-first security studio that empowers users to build tailored cybersecurity applications in minutes through a no-code, AI-driven interface. You simply pose a security question, like identifying misconfigured S3 buckets or compromised user accounts, and Sola AI instantly generates a working app complete with data queries, dashboards, alerts, and visual summaries, all adaptable to your existing infrastructure. It offers ready-made templates for common use cases across AWS, GitHub, Google Workspace, Okta, MongoDB, Wiz, and more, which users can customize further or use as-is. Sola bridges across diverse tech stacks with deep integrations, from cloud platforms and identity providers to CRM and monitoring tools, so you can synthesize cross-domain insights quickly. Built by infosec experts, Sola is secure by design, featuring SOC 2 and ISO 27001 certification, active security oversight, and strict data privacy principles.
  • 11
    Intruder

    Intruder

    Intruder

    Intruder is an international cyber security company that helps organisations reduce their cyber exposure by providing an effortless vulnerability scanning solution. Intruder’s cloud-based vulnerability scanner discovers security weaknesses across your digital estate. Offering industry-leading security checks, continuous monitoring and an easy-to-use platform, Intruder keeps businesses of all sizes safe from hackers. Receive actionable results prioritised by context. Intruder interprets raw data received from leading scanning engines, so you can focus on the issues which truly matter, such as exposed databases.‍ Intruder's high-quality reports help you sail through customer security questionnaires, and make compliance audits like SOC2, ISO27001, and Cyber Essentials a breeze.
  • 12
    Aviatrix

    Aviatrix

    Aviatrix

    For enterprises struggling to secure cloud workloads, Aviatrix® offers a single solution for pervasive cloud security. Where current cybersecurity approaches focus on securing entry points to a trusted space, Aviatrix Cloud Native Security Fabric (CNSF) delivers runtime security and enforcement within the cloud application infrastructure itself – closing gaps between existing solutions and helping organizations regain visibility and control. Aviatrix ensures security, cloud, and networking teams are empowering developer velocity, AI, serverless, and what’s next.
  • 13
    Splunk Infrastructure Monitoring
    The only real-time, analytics-driven multicloud monitoring solution for all environments (formerly SignalFx). Monitor any environment on a massively scalable streaming architecture. Open, flexible data collection and rapid visualizations of services in seconds. Purpose built for ephemeral and dynamic cloud-native environments at any scale (e.g., Kubernetes, container, serverless). Detect, visualize and resolve issues as soon as they arise. Monitor infrastructure performance in real-time at cloud scale through predictive streaming analytics. Over 200 pre-built integrations for cloud services and out-of-the-box dashboards for rapid visualization of your entire stack. Autodiscover, breakdown, group, and explore clouds, services and systems. Quickly and easily understand how your infrastructure behaves across different services, availability zones, Kubernetes clusters and more.
  • 14
    ForgeRock

    ForgeRock

    ForgeRock

    Radically improve and scale all things identity, governance, and access management with the industry's only full-suite, AI-driven platform. Today we rely on digital access for our work, learning, and personal lives more than at any other time in history. To meet demand and keep up with competitors, it’s imperative to speed digital transformation and provide superior experiences while ensuring the utmost security. At ForgeRock, we help people safely and simply access the connected world by helping organizations significantly improve and scale all things identity, governance, and access management. ForgeRock offers the industry's only full-suite, AI-driven platform purpose-built for all identities and use cases (consumers, workforce, and things). ForgeRock’s comprehensive, yet simple-to-use solutions allow you to grow revenue, manage risks, increase workforce productivity, and reduce costs.
  • 15
    HyTrust

    HyTrust

    HyTrust

    In a multi-cloud world where technology moves at lightning speed and security often plays catchup, organizations face the daunting challenge of eliminating the gaps and resolving the inconsistencies in policy enforcement and adherence to compliance mandates. HyTrust CloudControl provides advanced privileged user access control, policy enforcement, forensic and automated compliance for private clouds. HyTrust DataControl provides powerful data-at-rest encryption and integrated key management for workloads running in any cloud environment. Encrypting workloads helps enterprises to ensure their data is protected. One of the challenges of workload encryption is scaling the management of encryption keys. HyTrust’s mission is to make private, public and hybrid cloud infrastructure more trustworthy for enterprises, service providers and government agencies. HyTrust provides solutions that automate security controls for software-defined computing, networking and storage workloads.
  • 16
    SafeStor

    SafeStor

    UbiStor

    An all-in-one solution for backup and disaster recovery, SafeStor ensures that your files and systems are always safe during an incident and recoverable in minutes, not days or even weeks. The combined power of our BaaS and DRaaS services give you peace of mind that your business is protected across complex and varied environments. Our technology monitors your systems in real-time, distinguishing normal activities from suspicious ones like unauthorized encryption. Shrink recovery times significantly by spinning up a protected system locally, directly from the backup storage on to your existing Hyper-V or VMware host. Protect virtual and physical servers, AWS and Azure workloads, workstations, and O365 data all from the same platform. Eliminate expensive equipment and backup software purchases. With SafeStor, you can protect your systems and data at an affordable, predictable, monthly rate based on your usage.
  • 17
    Qualys TruRisk Platform
    Qualys TruRisk Platform (formerly Qualys Cloud Platform). The revolutionary architecture that powers Qualys’ IT, security, and compliance cloud apps. Qualys TruRisk Platform gives you a continuous, always-on assessment of your global IT, security, and compliance posture, with 2-second visibility across all your IT assets, wherever they reside. And with automated, built-in threat prioritization, patching and other response capabilities, it’s a complete, end-to-end security solution. On premises, at endpoints, on mobile, in containers or in the cloud, Qualys TruRisk Platform sensors are always on, giving you continuous 2-second visibility of all your IT assets. Remotely deployable, centrally managed and self-updating, the sensors come as physical or virtual appliances, or lightweight agents. Qualys TruRisk Platform provides an end-to-end solution, allowing you to avoid the cost and complexities that come with managing multiple security vendors.
    Starting Price: $500.00/month
  • 18
    Contrast Assess

    Contrast Assess

    Contrast Security

    A new kind of security designed for the way software is created. Resolve security issues minutes after installation by integrating security into your toolchain. Because Contrast agents monitor code and report from inside the application, developers can finally find and fix vulnerabilities without requiring security experts. That frees up security teams to focus on providing governance. Contrast Assess deploys an intelligent agent that instruments the application with smart sensors. The code is analyzed in real time from within the application. Instrumentation minimizes the false positives that slow down developers and security teams. Resolve security issues minutes after installation by integrating security into your toolchain. Contrast Assess integrates seamlessly into the software life cycle and into the tool sets that development and operations teams are already using, including native integration with ChatOps, ticketing systems and CI/CD tools, and a RESTful API.
  • 19
    Proficio

    Proficio

    Proficio

    Proficio’s Managed, Detection and Response (MDR) solution surpasses the capabilities of traditional Managed Security Services Providers (MSSPs). Our MDR service is powered by next-generation cybersecurity technology and our security experts partner with you to become an extension of your team, continuously monitoring and investigating threats from our global networks of security operations centers. Proficio’s advanced approach to threat detection leverages an extensive library of security use cases, MITRE ATT&CK® framework, AI-based threat hunting models, business context modeling, and a threat intelligence platform. Through our global network of Security Operations Centers (SOCs), Proficio experts monitor, investigate and triage suspicious events. We significantly reduce the number of false positives and provide actionable alerts with remediation recommendations. Proficio is a leader in Security Orchestration Automation and Response (SOAR).
  • 20
    A10 Defend DDoS Mitigator
    A10 Defend DDoS Mitigator (formerly Thunder TPS) is a scalable and automated DDoS protection solution powered by advanced machine learning, leading the industry in precision, scalability, and performance. The solution minimizes downtime with multi-vector DDoS mitigation, leveraging FPGA-based acceleration and various clustering techniques to provide protection at scale. Auto policy escalation, intelligent zero-day mitigation, and streamlined SecOps elevates efficacy while lowering TCO.
  • 21
    NETSCOUT Arbor DDoS
    Since 1999, our DDoS protection and network visibility solutions have been tested and proven in the world's largest, most complex networks. We deliver powerful visibility and traffic intelligence, at internet scale, to help customers not only understand their own environment, but threat actors, their tools, behaviors and campaigns on a global basis. Layered, Automated DDoS Attack Protection: Industry best practices recommend a comprehensive layered, approach, backed by continuous threat intelligence. Stop today’s high volume attacks, which are exceeding 600GB/sec. Stealthy application-layer attacks against existing stateful infrastructure devices, such as firewall, IPS and ADCs. Only a tightly integrated defense can adequately protect you from the full spectrum of DDoS attacks. Organizations face increasing pressure to drive technology transformation while managing risk.
  • 22
    UltraWAF

    UltraWAF

    Vercara

    Vercara UltraWAF is a cloud-based web application protection service that protects against threats that target the application layer. As a cloud-based WAF solution, UltraWAF protects your applications from data breaches, defacements, malicious bots, and other web application-layer attacks. By protecting your applications no matter where they are hosted, UltraWAF simplifies your operations through consistently configured rules with no provider restrictions or hardware requirements. UltraWAF equips your company with adaptable security features to counteract the most significant network and application-layer threats, including SQL injection, XSS, and DDoS attacks. Its always-on security posture, combined with cloud-based scalability, ensures comprehensive protection against the OWASP top 10, advanced bot management, and vulnerability scanning, allowing you to effectively shield your critical and customer-facing applications from emerging threats.
  • 23
    CloudSphere

    CloudSphere

    CloudSphere

    CloudSphere is a cloud governance platform. CloudSphere provides governance across migration planning, security posture, identity, compliance and cost management in the cloud. We are the only cloud management platform that collects the key data points that together define applications in cloud environments and correlates them to enable governance at the application level. Our solutions include cloud migration planning, cloud cost management and cloud security posture management. The most advanced agentless application discovery and dependency mapping solution for migrating complex apps. The only governance platform with Application Intelligence that allows you to manage migration, cost and security on a per application basis in the cloud. A single platform and user experience for cloud planning and governance across all cloud providers dramatically reduces the number of tools required.
  • 24
    Cutover

    Cutover

    Cutover

    The Cutover platform enables enterprises to simplify complexity, streamline work, and increase visibility. Cutover’s AI-powered automated runbooks connect teams, technology, and systems, increasing efficiency and reducing risk in IT disaster and cyber recovery, cloud migration, release management, and technology implementation. As a centralized system of execution, Cutover differentiates itself with scalable and proven dynamic, automated runbook technology that transforms enterprise IT operations with a new way of working. Cutover enables the creation of a template library of comprehensive, executable, and auditable runbooks covering the entire IT infrastructure. Cutover is trusted by world-leading institutions, including the three largest US banks and three of the world’s five largest investment banks.
  • 25
    Certa

    Certa

    Certa

    Certa is a no-code workflow platform. Certa brings people, processes and data sources together within a unified platform and seamlessly integrates with your enterprise ecosystem. Certa’s workflow designer toolkit enables you to build dynamic third party solutions that can adapt with your business. A Software as Service platform for business to business interactions, including on-boarding, due diligence, risk mitigation and monitoring of their third party relationships. Highly configurable so that your organization doesn't have to change its business rules, and easy ongoing changes ensure continuous process improvement. Native integrations with major enterprise systems and over 50+ data sources. Plus our no-code open API and RPA framework enables us to integrate with new APIs in minutes. Personalized dashboards inform the process, ensuring that each users groups know what to do at all times, and what's waiting on them for review and approval.
  • 26
    CENTRI Protected Sessions

    CENTRI Protected Sessions

    CENTRI Technology

    Secure your IoT data from creation to consumption, through every mile along the way. Protected Sessions changes the game by giving you data security for bi-directional communications while freeing you from the limitations of multiple network protocols and a mixed IoT topology. Session lifecycles are IoT-friendly by design – by working within the constraints of low-power MCU devices using low-power networks that may have intermittent network access, Protected Sessions can maintain the security of your communications channel through lifespans from seconds to months! Using heavyweight industry-standard encryption, CENTRI Protected Sessions is optimized for lightweight devices with data compression and a tiny footprint, providing both security and efficiency between the endpoint device and the back of the cloud. Protected Sessions secures bi-directional communications between your IoT devices and your application server/cloud.
  • 27
    REDXRAY

    REDXRAY

    Red Sky Alliance

    You have spent years building your business, so don’t let cyber criminals destroy it in seconds. Using our proprietary intelligence feeds, REDXRAY can identify threats against your networks, supply chain, or target companies/agencies daily. The emailed report covers the following threat types: Botnet Tracker, Breach Data, Keylogger Records, Malicious Emails Context, Malicious Email Detections, OSINT Records, Sinkhole Traffic, and THREATRECON Records.
  • 28
    Confidant

    Confidant

    Confidant

    Confidant is a open source secret management service that provides user-friendly storage and access to secrets in a secure way, from the developers at Lyft. Confidant solves the authentication chicken and egg problem by using AWS KMS and IAM to allow IAM roles to generate secure authentication tokens that can be verified by Confidant. Confidant also manages KMS grants for your IAM roles, which allows the IAM roles to generate tokens that can be used for service-to-service authentication, or to pass encrypted messages between services. Confidant stores secrets in an append-only way in DynamoDB, generating a unique KMS data key for every revision of every secret, using Fernet symmetric authenticated cryptography. Confidant provides an AngularJS web interface that allows end-users to easily manage secrets, the mappings of secrets to services and the history of changes.
  • 29
    SecureIdentity MFA
    The simple ‘username and password’ approach alone is not strong enough to protect your business’ critical data. Log-ins can be compromised within minutes, making your private data vulnerable to threat. Our SecureIdentity platform provides the identity of the user, the device and the data they are working on, so you can prove exactly who is doing what at any time. MFA is best practice for layered data and privacy security. Our MFA solution integrates seamlessly with Microsoft’s Active Directory and other LDAP solutions, allowing you to reutilize your existing authentication database infrastructure, avoiding the need to re-architect, deploy, backup and manage a secondary user database. We believe users should be able to choose any personal device to be their authentication token, whether it is their mobile phone, tablet, laptop or even their desk phone.
  • 30
    InfoSum

    InfoSum

    InfoSum

    InfoSum unlocks data’s limitless potential. Using patented, privacy-first technology, InfoSum connects customer records between and amongst companies, without ever sharing data. Customers across financial services, content distribution, connected television, eCommerce, gaming, and entertainment all trust InfoSum to seamlessly and compliantly connect their customer data to other partners through privacy-safe, permissioned, data networks. There are many applications for InfoSum’s technology, including standard ‘data-onboarding’ to much more sophisticated use cases that allow for the creation of owned identity platforms, the development of new data and advertising products, and the formation of entirely new marketplaces. InfoSum was founded in 2015. The company has multiple patents, protecting its invention of the ‘non-movement of data.’ InfoSum is based in the US, UK and CE, with offices, and customers across Europe and North America. The company is poised for exponential growth