Listing Thumbnail

    Uptycs CNAPP

     Info
    Sold by: Uptycs 
    Vendor Insights
    Quick Launch
    Uptycs is an AWS Security partner with Security Software and Container Security Competencies. We offer customers security context and choice. Deployment options meet customer telemetry and scaling needs across more than 40 AWS services including: Compute (EC2, EBS, ELB, Lambda), Containers (ECR, ECS, EKS), Storage (S3, EFS, S3 Glacier), Database (RDS, ElastiCache), Networking & Content Delivery (VPC, CloudFront, Route 53, API Gateway), Developer Tools (CodeCommit, CodeDeploy, CodePipeline, CodeBuild), Management & Governance (Organizations, CloudWatch, CloudFormation, CloudTrail, Config, ServiceCatalog, Systems Manager), Analytics (Redshift, ElasticSearch, Kinesis), Security, Identity, Compliance (IAM, GuardDuty, WAF, Security Hub), Application Integration (SNS,SQS), End User Computing (Workspaces), Machine Learning (SageMaker), and Migration Services. Uptycs offers custom pricing and solutions via private offer. Reach out directly to aws@uptycs.com.
    Listing Thumbnail

    Uptycs CNAPP

     Info
    Sold by: Uptycs 

    Overview

    Play video

    Uptycs is the top Cloud-Native Application Protection Platform (CNAPP) choice for security teams collaborating with developers to safeguard critical application pipelines, mitigate risks, and defend runtime environments in the hybrid cloud.

    Uptycs consolidates cloud security silos into a unified platform, providing a single security console, policy framework, and data lake. This unification enables greater automation, simplifies policy enforcement, and extends security coverage, all while reducing costs.

    DATA IS YOUR POWER, NOT A HEADACHE

    Uptycs tackled the cybersecurity data challenge first to give you deeper context so you can prioritize what truly matters. Our modern architecture normalizes security telemetry close to its collection point, and then streams it into your detection cloud, so you can query your attack surface like a database. No black boxes, no ETL, and no need to put in a support ticket to get new insights.

    FULL LIFECYCLE CLOUD-NATIVE APPLICATION PROTECTION

    Detect malware or suspicious behavior on developer endpoints, identify vulnerabilities early in the build process, verify secure configurations, and continuously monitor in production.

    :: Prioritize security findings across your hybrid cloud workloads (VMs, containers, clusters, and serverless), and cloud infrastructure (databases, data stores, object storage) through exposure scanning, full attack path analysis, and correlation of security signals

    :: Detect active threats to workloads with anomaly and behavior-based detections. Identify, prioritize, and fix misconfigurations and policy violations in Infrastructure as Code (IaC)

    :: Simplify the maintenance of least privilege access and reduce IAM risks with full visibility into policies, users, and roles. Detect identity-specific threats through Identity Threat Detection and Response (ITDR) capabilities

    :: Get deep support for AWS and start with instant-on, agentless coverage, then add the Uptycs Sensor for runtime protection, advanced remediation, and forensics

    :: Gain full visibility into your software development pipeline posture and apply guardrails throughout your software development lifecycle (SDLC)

    :: Fully protect your cloud with visibility of all cloud-connected assets, empowering you to understand your blast radius should a developer laptop be compromised

    :: Meet compliance mandates with support for CIS benchmarks, HIPAA, ISO 27001, NIST, PCI, and SOC 2 across your cloud infrastructure and workloads running within the cloud

    PROTECT YOUR CRITICAL WORKLOADS, WHEREVER THEY RUN

    Replace multiple agents and tools with Uptycs for unified threat detection and response, vulnerability scanning, security hygiene, compliance, cyber asset management, file integrity monitoring (FIM), and ad hoc investigation and threat hunting.

    :: Enjoy deep support for rare Linux distros, IBM LinuxONE, Linux on Z, IBM Power, AIX, HPC environments, and more

    :: Enjoy blazing-fast response times with the Uptycs osquery-based agent with eBPF, designed to minimize its memory, CPU, and disk I/O footprint

    :: Leverage rich security telemetry that goes beyond basic events to include file system files, Augeas lens, DNS lookups, sudoers list, and disk encryption

    DATASHEET QUICK LINKS:

    :: Uptycs for AWS: https://www.uptycs.com/resources/product-brief/aws-security 

    :: Uptycs CNAPP for Hybrid Cloud Security: https://www.uptycs.com/resources/datasheets/uptycs-for-cloud-native-applications-cnapp 

    :: Kubernetes and container security: https://www.uptycs.com/resources/datasheets/kubernetes-container-security 

    :: Uptycs Vulnerability Management: https://www.uptycs.com/resources/uptycs-vulnerability-management 

    :: Uptycs File Integrity Monitoring (FIM): https://www.uptycs.com/resources/datasheets/uptycs-file-integrity-monitoring-fim 

    :: Uptycs for IBM LinuxONE, LinuxONE 4 Express, Linux on Z, Linux on IBM Power, and AIX: https://www.uptycs.com/resources/datasheets/ibm-aix-security 

    :: Uptycs MDR for outsourced detection and response: https://www.uptycs.com/services/mdr-managed-detection-response 

    :: Case Study: Lookout Relies on Uptycs for AWS Security and Compliance: https://www.uptycs.com/case-studies/lookout 

    Reach out directly to learn more about how we can tailor solutions to your unique needs.

    Uptycs provides custom pricing for customers via Private Offer. Please contact aws@uptycs.com  for a better understanding of our pricing model and products.

    Highlights

    • Complete, consistent coverage. Secure public and private cloud, Kubernetes, rare Linux distros, IBM LinuxONE, developer endpoints, and the software pipeline. Scales from hundreds to millions of workloads with proven reliability. Learn more at https://www.uptycs.com/products/cnapp.
    • Deeper data delivers better insights. Correlate real-time insights with historical data to prioritize the threats and vulnerabilities that matter. Get 13-month lookback for compliance and forensic analysis, and Ask Uptycs for on-the-fly investigations.
    • Remediation requires cloud speed. Slash MTTR by 50% with real-time ATT&CK-mapped detections and blast radius visibility from laptop to code to cloud.

    Details

    Sold by

    Categories

    Delivery method

    Features and programs

    Vendor Insights

     Info
    Skip the manual risk assessment. Get verified and regularly updated security info on this product with Vendor Insights.
    Security credentials achieved
    (1)

    Financing for AWS Marketplace purchases

    AWS Marketplace now accepts line of credit payments through the PNC Vendor Finance program. This program is available to select AWS customers in the US, excluding NV, NC, ND, TN, & VT.
    Financing for AWS Marketplace purchases

    Quick Launch

    Leverage AWS CloudFormation templates to reduce the time and resources required to configure, deploy, and launch your software.

    Pricing

    Pricing is based on contract duration. You pay upfront or in installments according to your contract terms with the vendor. This entitles you to a specified quantity of use for the contract duration. If you choose not to renew or replace your contract before it ends, access to these entitlements will expire.

    12-month contract (2)

     Info
    Dimension
    Description
    Cost/12 months
    Uptycs Cloud Audit (100 Cloud Workloads)
    Inventory, Compliance, Vuln Mgmt, Risks, IaC, and Identity Analytics.
    $12,000.00
    Uptycs Cloud Secure (100 Cloud Workloads)
    Cloud Audit + Workload Protection, Forensics, and Threat Detections.
    $18,000.00

    Vendor refund policy

    All fees are non-cancellable and non-refundable except as required by law.

    Custom pricing options

    Find a fit for enterprise or unique needs with a private offer.

    Legal

    Vendor terms and conditions

    Upon subscribing to this product, you must acknowledge and agree to the terms and conditions outlined in the vendor's End User License Agreement (EULA) .

    Content disclaimer

    Vendors are responsible for their product descriptions and other product content. AWS does not warrant that vendors' product descriptions or other product content are accurate, complete, reliable, current, or error-free.

    Usage information

     Info

    Delivery details

    Software as a Service (SaaS)

    SaaS delivers cloud-based software applications directly to customers over the internet. You can access these applications through a subscription model. You will pay recurring monthly usage fees through your AWS bill, while AWS handles deployment and infrastructure management, ensuring scalability, reliability, and seamless integration with other AWS services.

    Resources

    Vendor resources

    Support

    Vendor support

    support@uptycs.com  support.uptycs.com

    AWS infrastructure support

    AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.

    Customer reviews

    Ratings and reviews

     Info
    0 ratings
    5 star
    4 star
    3 star
    2 star
    1 star
    0%
    0%
    0%
    0%
    0%
    0 AWS reviews
    |
    11 external reviews
    External reviews are sourced from G2  and are not included in the star rating for this product.
    Joseph M.

    Excellent lightweight EDR with full Mac support

    Reviewed on Aug 03, 2023
    Review provided by G2
    What do you like best about the product?
    It's tought ot find an EDR with decent support for Macs, there's plenty of options for Windows but if you're in a hybrid environment you're likely to notice the difference between endpoint systems. Uptycs supports Windows/Mac/Unix equally with a full set of detections for each. Inplementing Uptycs is a breeze, and the continuous development means you remain on the cutting edge. Systems are easy to use and figure out, tuning is straigtforward
    What do you dislike about the product?
    Communications around bugs is lacking. The backend is constantly under development which means things will change, and not always in a way you may want them to. Removing Uptycs from a Mac remotely is challenging at best, although this is mostly due to Apple.
    What problems is the product solving and how is that benefiting you?
    Uptycs isa full suite EDR/XDR and can provide an MDR as well. We use the EDR and MDR capabilities to cover corporate assets for compliance, governance, and security purposes.
    Bharath K.

    Uptycs OS Query

    Reviewed on Jul 19, 2023
    Review provided by G2
    What do you like best about the product?
    The Detections are in detail with Process tree and Associated files are written in detail with their Hashes and the account used to execute.
    What do you dislike about the product?
    The Dashboard.
    A common search bar would be easy for analyst to search Hostnames/IP
    What problems is the product solving and how is that benefiting you?
    Endpoint security solution.
    If Thread Adversaries try to evade detections Defender/Falcon Uptycs was able to capture those events
    Sean M.

    In-depth endpoint visibility in a lightweight agent

    Reviewed on May 20, 2023
    Review provided by G2
    What do you like best about the product?
    Engaged, highly-capable team, thriving product and roadmap, great visibility and insight for macOS endpoints with highly customizable features in a cloud deployment.
    What do you dislike about the product?
    N/A. Uptycs has a lot of feature breadth added in the last few years - this has plugged a lot of gaps in the vision. Hard to think about what there would be to dislike about such an actively developed product.
    What problems is the product solving and how is that benefiting you?
    Uptycs provides fantastic visibility and insight into macOS endpoints, powered by an osquery-based deployed agent. This has given our security operations team significant extensibility points to build custom detections and rules.
    Anwar R.

    Actionable runtime threat and vulnerability insights and threat hunting capability

    Reviewed on May 15, 2023
    Review provided by G2
    What do you like best about the product?
    The structured threat intelligence layered on top of system query interfaces (osquery, kubequery, and cloudquery). I also like the vulnerability detection on workstation operating systems and software.
    What do you dislike about the product?
    For the osquery based solution, it would be great to be able to readily control the permissions the agent has on the endpoints.
    What problems is the product solving and how is that benefiting you?
    Runtime threat management, detection and response. Vulnerability management.
    Financial Services

    Uptycs Endpoint detection

    Reviewed on May 10, 2023
    Review provided by G2
    What do you like best about the product?
    The data analytics in use on the platform allows single plane of glass on endpoints.
    What do you dislike about the product?
    Would love to see an EDR implementation. The data and analytics are already available. Endpoint response would be great.
    What problems is the product solving and how is that benefiting you?
    Establishing a baseline for endpoint configuration compliance.
    View all reviews