We use essential cookies and similar tools that are necessary to provide our site and services. We use performance cookies to collect anonymous statistics, so we can understand how customers use our site and make improvements. Essential cookies cannot be deactivated, but you can choose “Customize” or “Decline” to decline performance cookies.
If you agree, AWS and approved third parties will also use cookies to provide useful site features, remember your preferences, and display relevant content, including relevant advertising. To accept or decline all non-essential cookies, choose “Accept” or “Decline.” To make more detailed choices, choose “Customize.”
Customize cookie preferences
We use cookies and similar tools (collectively, "cookies") for the following purposes.
Essential
Essential cookies are necessary to provide our site and services and cannot be deactivated. They are usually set in response to your actions on the site, such as setting your privacy preferences, signing in, or filling in forms.
Performance
Performance cookies provide anonymous statistics about how customers navigate our site so we can improve site experience and performance. Approved third parties may perform analytics on our behalf, but they cannot use the data for their own purposes.
Allowed
Functional
Functional cookies help us provide useful site features, remember your preferences, and display relevant content. Approved third parties may set these cookies to provide certain site features. If you do not allow these cookies, then some or all of these services may not function properly.
Allowed
Advertising
Advertising cookies may be set through our site by us or our advertising partners and help us deliver relevant marketing content. If you do not allow these cookies, you will experience less relevant advertising.
Allowed
Blocking some types of cookies may impact your experience of our sites. You may review and change your choices at any time by selecting Cookie preferences in the footer of this site. We and selected third-parties use cookies or similar technologies as specified in the AWS Cookie Notice.
Your privacy choices
We display ads relevant to your interests on AWS sites and on other properties, including cross-context behavioral advertising. Cross-context behavioral advertising uses data from one site or app to advertise to you on a different company’s site or app.
To not allow AWS cross-context behavioral advertising based on cookies or similar technologies, select “Don't allow” and “Save privacy choices” below, or visit an AWS site with a legally-recognized decline signal enabled, such as the Global Privacy Control. If you delete your cookies or visit this site from a different browser or device, you will need to make your selection again. For more information about cookies and how we use them, please read our AWS Cookie Notice.
Dieser Inhalt steht in der ausgewählten Sprache nicht zur Verfügung. Wir arbeiten beständig daran, unsere Inhalte auch in der ausgewählten Sprache zur Verfügung zu stellen. Vielen Dank für Ihre Geduld.
Streamline provisioning, management, and operations of AWS resources with existing ITSM tools.
Visibility and control
Federate visibility and control of resources across your AWS environment.
Resolve cloud operational issues
Detect and resolve cloud operational issues with ITSM workflows.
Cloud speed
Execute service management processes at cloud speed.
Use cases
Enable self-service to request AWS resources
Use curated products to request AWS resources such as Amazon WorkSpaces, Amazon EC2, application patterns or an AWS account with your ITSM tooling.
View AWS resource data and compliance status
View AWS resource relationships and compliance status federated in near real time to your existing asset repository (CMDB). Streamline AWS resource data within your hybrid cloud environment.
Detect and respond to operational issues
Eliminate swiveling cloud operations across AWS and other operational tools to accelerate detection, response, remediation and change enablement processes.
Remediate security incidents
Respond and remediate security incidents detected from findings in your existing IT environment.