Overview
*** NOTE: For custom pricing/contract, please contact aws@normalyze.ai for a private offer. Freemium for 1-cloud account available at https://normalyze.ai/freemium ***
Normalyze helps organizations protect all the data they run in the cloud. Normalyze put data security at the center of information security. With Normalyze, users can discover and visualize their cloud data attack surface within minutes and get real-time visibility and control into their security posture, including access, configurations, and sensitive data to secure cloud infrastructures at scale.
Through its agentless assessment, data discovery, data classification, AI driven vulnerability analysis, risk prioritization, and comprehensive remediation insights, Normalyze helps enterprises understand the complete picture when it comes to cloud data risks. That includes everything needed to be discovered and understood around the applications, infrastructure, configurations, vulnerabilities, and the identities and permissions associated with the user and system access.
DISCOVER & ANALYZE
The Normalyze platform initially performs its agentless cloud discovery scan to identify all cloud systems in the environment. During this discovery of cloud resources, Normalyze identifies and prioritizes everything running operationally in the cloud environment and interconnected systems. Normalyze's AI-backend also scrutinizes all structured and unstructured data within the cloud environment. A real-time, visual graph is created of all available cloud resources; what identities have access to these systems, their permissions, and all of the available data stores.
DETECT & PRIORITIZE
After the Discovery phase, Normalyze prioritizes proprietary, regulated, and otherwise sensitive data and ranks it in its importance and risk level. The risks are determined by vulnerability severity, the nature of the data, its access paths, and the condition of its resource configurations.
The agentless Normalyze assessments are continuous. Every time an asset is added, changed, or removed, the graph is instantly updated. In this analysis, the identity and permission information is considered, along with uncovered vulnerabilities and misconfigurations that could lead to a data breach. The AI-driven analysis will look at everything within the cloud environment and identify all of the possible paths to sensitive data and potentially viable attack vectors.
All of the discovered data, whether structured or unstructured, is prioritized based on sensitivity and associated regulatory controls (e.g. PCI DSS, HIPAA, GDPR, etc.). Normalyze will highlight the data that needs immediate attention. The Normalyze one-pass data scanner samples enterprise data to detect sensitive entries (e.g. names, social security numbers, credit card numbers, etc.) within data stores. Normalyze then connects the data via specific profiles to confirm the presence of sensitive and proprietary data. Unique to Normalyze, this scan capability helps customers reduce false-positives and increase efficiency of scans.
IMPORTANT: None of this scan data ever leaves the control of the customer or ever moves to another cloud, nor is it ever transferred to another region or nation. Normalyze only collects metadata necessary to create the visual graph.
REMEDIATE & PREVENT
With cloud assets discovered, data identified and classified, and then remediation prioritized based on sensitivity, enterprise security teams are ready to take steps to remedy the most pressing data risks and work down from there.
As Normalyze identifies risky conditions, its prioritization engine makes all of the conditions that place data at risk so that teams understand what steps they need to remedy the situation. Remediation efforts can be dispatched to a service management platform, or other automated measures can be taken. Specific groups or individuals can be alerted to remedy the vulnerability, or steps can be taken to remove access.
Highlights
- 100% Agentless & autonomous discovery, classification and cataloging for all data and access points across AWS, Azure, GCP, Snowflake and other cloud environments. >> Free tier and trial available at https://normalyze.ai/freemium
- Fully-automated Data Security Posture Management (DSPM) with continuous monitoring, risk detection, and guided remediation.
- Discover, visualize and remediate your cloud data attack surface within minutes. Get real-time visibility and control into your security posture, including access, configurations, sensitive data, and threats.
Details
Features and programs
Financing for AWS Marketplace purchases
Pricing
Dimension | Description | Cost/month |
---|---|---|
Normalyze Freemium | Visit: https://normalyze.ai/pricing/ and select Free (1 Cloud Acct) | $0.00 |
Normalyze Premium | Up to 3 cloud accounts; 1TB of data scanning; 60 day graph history | $995.00 |
Normalyze Enterprise T1 | Ent features; 24x7 support; API; Scope limits: please get custom quote | $10,000.00 |
Vendor refund policy
N/A
Legal
Vendor terms and conditions
Content disclaimer
Delivery details
Software as a Service (SaaS)
SaaS delivers cloud-based software applications directly to customers over the internet. You can access these applications through a subscription model. You will pay recurring monthly usage fees through your AWS bill, while AWS handles deployment and infrastructure management, ensuring scalability, reliability, and seamless integration with other AWS services.
Resources
Support
Vendor support
Normalyze - Freemium, 1-Cloud Environment Trial Account >> https://normalyze.ai/freemium Normalyze - Cloud Data Security Posture Management Platform // Support Documents >> https://normalyze.ai/resources/documents/ Contact Us >>
AWS infrastructure support
AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.
Customer reviews
Normalyze
Our data can be recovered easily
Authenticate websitev
User friendly
Some features have to be added for security purpose