Listing Thumbnail

    AWS Secure

     Info
    Sold by: CLARA, Inc. 
    AWS Secure is a managed security service centered around AWS Security Hub, leveraging AWS Health, Amazon GuardDuty, AWS Config, AWS CloudTrail, and Amazon Inspector. By integrating vulnerability assessments, log monitoring, and access management, it minimizes risks in your cloud environment while reducing operational overhead.

    Overview

    AWS Secure is an integrated solution that leverages AWS native services to enhance the security of your cloud environment. This service provides vulnerability assessments, log monitoring, IAM management, and compliance support, making corporate security operations simple and efficient.

    At its core, the service centers around AWS Security Hub while utilizing AWS Health, Amazon GuardDuty, AWS Config, AWS CloudTrail, and Amazon Inspector. It performs vulnerability assessments and continuous threat monitoring to accelerate risk visibility and response.

    Compliance support is also reinforced, enabling the provision of security policies aligned with standards such as PCI-DSS, NIST, and the AWS Foundational Security Best Practices. Audit trail management via AWS Config and AWS CloudTrail reduces the burden of regulatory compliance.

    By leveraging AWS Secure, organizations can maximize the safety and operational efficiency of their AWS environments while mitigating security risks.

    Highlights

    • Automating Security Operations in AWS Environments Centralizes vulnerability assessment, monitoring, and access management utilizing core services such as AWS Security Hub, AWS Health, Amazon GuardDuty, AWS Config, AWS CloudTrail, and Amazon Inspector.
    • Simplifying Compliance Readiness Provides log auditing and audit trail management via AWS Config and AWS CloudTrail to meet various security standards.

    Details

    Delivery method

    Deployed on AWS
    New

    Introducing multi-product solutions

    You can now purchase comprehensive solutions tailored to use cases and industries.

    Multi-product solutions

    Pricing

    Custom pricing options

    Pricing is based on your specific requirements and eligibility. To get a custom quote for your needs, request a private offer.

    How can we make this page better?

    Tell us how we can improve this page, or report an issue with this product.
    Tell us how we can improve this page, or report an issue with this product.

    Legal

    Content disclaimer

    Vendors are responsible for their product descriptions and other product content. AWS does not warrant that vendors' product descriptions or other product content are accurate, complete, reliable, current, or error-free.

    Support

    Vendor support

    Contact Us: Please contact us via the following URL: https://ci.clara.jp/contact/ 

    Troubleshooting: Please refer to the following URL: https://spt.clara.jp/ 

    Support Details: To assist with your AWS security operations, this service provides 24/7/365 technical support. We accept consultations regarding security configuration optimization, incident response, and operational support.

    Managed Service Level: When a security alert that violates Clara Rules is detected, we will investigate and propose countermeasures. In addition, upon request, we can perform security alert response tasks on your behalf within the following standard number of days. Please note in advance that investigations may take time depending on the nature of the security alert.

    • AWS Security Hub Standard Days (Service Level Objective): 1 business day

    • Amazon GuardDuty Standard Days (Service Level Objective): 3 business days

    • Amazon Inspector Amazon Inspector is a vulnerability management service, and we do not conduct investigations for it. However, we can provide explanations regarding the vulnerabilities and how to address them. Upon request, we can also propose patch applications and updates as appropriate.

    • Amazon Macie Amazon Macie is a sensitive data discovery service, and we do not investigate the discovery results themselves. However, we can provide proposals on how to respond, such as explaining the details and risks of the detected data, reviewing access controls, and applying encryption. Upon request, we may also perform tasks on your behalf regarding permission setting changes for the relevant buckets or data protection measures (available as a separate estimate).