To quickly and effectively respond to security issues on AWS, it is important for you to have a comprehensive understanding of what is happening across your cloud architecture. When combined with AWS services, logging and monitoring solutions from AWS Marketplace sellers give you the visibility needed to perform digital forensics in your AWS environment.

Download PDF
Contact us

Fortinet FortiAnalyzer-VM Centralized Security Logging and Reporting

Fortinet FortiAnalyzer-VM securely aggregates log data from Fortinet devices and other syslog-compatible devices. Using a comprehensive suite of easily-customized reports, users can filter and review records, including traffic, event, virus, attack, Web content, and email data, mining the data to determine your security stance and assure regulatory compliance. FortiAnalyzer is one of several versatile Fortinet Management Products that provide a diversity of deployment types, growth flexibility, advanced customization through APIs and simple licensing.

Sophos UTM 9 (PAYG)

Sophos Unified Threat Management (UTM) is a complete security platform that helps you secure your infrastructure in AWS. Sophos UTM provides multiple security tools like Next-Gen Firewall (NGFW), Web Application Firewall (WAF), Intrusion Prevention System (IPS), and Advanced Threat Protection (ATP) in one solution, saving you money and making deployment easy. Sophos UTM helps customers comply with AWS Security Best Practices and regulations such as PCI, HIPAA, and FedRAMP with security tools constantly updated to provide comprehensive real time protection, delivered through Sophos Labs, our 24x7 analytics organization and one of the world's leading threat intelligence labs.

AccessData Lab

For the first time ever, manage your digital forensic investigations in the cloud with AD Lab for AWS. AD Lab helps you power through massive data sets, handle various data types and run multiple cases at the same time, all within a collaborative, scalable environment. By enabling distributed processing, investigators can utilize additional hardware to dramatically increase their case processing and resolution speed.

View more Security Solutions