Listing Thumbnail

    yamory: Vulnerability management cloud

     Info
    Deployed on AWS
    yamory is a security platform that integrates with AWS and integrates configuration management (CSPM), automatic software extraction, SBOM management, and vulnerability management in hosts, containers, and applications on your AWS account. It can be set up in 3 minutes.

    Overview

    yamory is a security platform that integrates with AWS and integrates configuration management (CSPM), automatic software extraction, SBOM management, and vulnerability management in hosts, containers, and applications on your AWS account. It can be set up in 3 minutes.

    The main features of yamory are

    Cloud Asset Scanning: Provides vulnerability management by extracting dependent components in servers, containers, and applications by simply connecting your AWS account to the service.

    SBOM, SCA: Extracts dependent components in application code and provides vulnerability management functions.

    Host and Container Image: Extraction of components in servers and containers and vulnerability management

    EOL management: EOL information, if any, can be notified and managed for extracted software information.

    CSPM: Checks and manages AWS configuration deficiencies based on general rules such as CIS Benchmarks.

    Team and organization management: Teams can be set up for each of the various product divisions to encourage autonomous product risk management, and security divisions can manage high threat level risks across the organization.

    Highlights

    • Setup in 3 minutes. Cloud AssetScan can detect and manage a comprehensive set of risks on your AWS account by simply linking the service to your AWS account. 3 minutes to set up.
    • Threat-based auto triage function: While many risks and vulnerabilities are detected and operations are unable to turn around, threat-based automatic triage allows resources to be focused on vulnerabilities that are truly high risk.
    • EOL management: Based on the extracted SBOM information, if information is available in the EOL master DB managed by yamory, EOLs six months or three months old can be detected and managed.

    Details

    Delivery method

    Deployed on AWS
    New

    Introducing multi-product solutions

    You can now purchase comprehensive solutions tailored to use cases and industries.

    Multi-product solutions

    Features and programs

    Financing for AWS Marketplace purchases

    AWS Marketplace now accepts line of credit payments through the PNC Vendor Finance program. This program is available to select AWS customers in the US, excluding NV, NC, ND, TN, & VT.
    Financing for AWS Marketplace purchases

    Pricing

    yamory: Vulnerability management cloud

     Info
    Pricing is based on the duration and terms of your contract with the vendor. This entitles you to a specified quantity of use for the contract duration. If you choose not to renew or replace your contract before it ends, access to these entitlements will expire.
    Additional AWS infrastructure costs may apply. Use the AWS Pricing Calculator  to estimate your infrastructure costs.

    1-month contract (1)

     Info
    Dimension
    Description
    Cost/month
    150 Assets
    Provides a 150-asset usage quota.
    $2,600.00

    Vendor refund policy

    All fees are non-cancellable and non-refundable except as required by law.

    How can we make this page better?

    We'd like to hear your feedback and ideas on how to improve this page.
    We'd like to hear your feedback and ideas on how to improve this page.

    Legal

    Vendor terms and conditions

    Upon subscribing to this product, you must acknowledge and agree to the terms and conditions outlined in the vendor's End User License Agreement (EULA) .

    Content disclaimer

    Vendors are responsible for their product descriptions and other product content. AWS does not warrant that vendors' product descriptions or other product content are accurate, complete, reliable, current, or error-free.

    Usage information

     Info

    Delivery details

    Software as a Service (SaaS)

    SaaS delivers cloud-based software applications directly to customers over the internet. You can access these applications through a subscription model. You will pay recurring monthly usage fees through your AWS bill, while AWS handles deployment and infrastructure management, ensuring scalability, reliability, and seamless integration with other AWS services.

    Support

    Vendor support

    Contact us at partner-yamory@assured.inc 

    "The contracted company will be assigned a person in charge to provide the following operational support Technical support: Answers to technical inquiries. Onboarding support: Onboarding program will be conducted several times in 3 months through web meetings. Periodic follow-up: A CS representative will periodically check the status of the program."

    AWS infrastructure support

    AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.

    Product comparison

     Info
    Updated weekly

    Accolades

     Info
    Top
    50
    In Device Security
    Top
    25
    In Legal & Compliance

    Overview

     Info
    AI generated from product descriptions
    Cloud Asset Scanning
    Vulnerability management through extraction of dependent components in servers, containers, and applications by connecting AWS account to the service
    Software Bill of Materials and Software Composition Analysis
    Extraction of dependent components in application code with vulnerability management functions and SBOM generation capabilities
    Configuration Management
    Checks and manages AWS configuration deficiencies based on general rules such as CIS Benchmarks
    End-of-Life Management
    Detection and management of end-of-life software based on extracted SBOM information with notifications for software reaching EOL status
    Threat-Based Automatic Triage
    Automatic prioritization of vulnerabilities based on threat level to focus resources on high-risk vulnerabilities
    Multi-Cloud Compliance and Security Posture Management
    Provides CSPM, CIEM, CWPP and CNAPP capabilities across major cloud providers in a single dashboard for monitoring and remediating cloud security vectors
    Intelligent Alert Prioritization
    Implements risk scoring and adaptive notifications to prioritize security threats and route alerts to appropriate team members, reducing alert fatigue
    Automated Remediation Capabilities
    Offers a library of automated remediation options to reduce time required for fixing security issues
    Multi-Account Management
    Supports management of multiple AWS accounts under a single unified dashboard for centralized monitoring
    Agentless Deployment
    Delivers agentless architecture with five-minute onboarding process and includes JIRA integration with inbuilt review workflows for collaborative remediation
    AI-Powered Threat Detection and Response
    End-to-end security for AI and machine learning models with pipeline visibility, prompt firewalling, and sandboxing for untrusted models, including protection against prompt injection and AI-specific threats.
    Cloud Security Posture Management
    Agentless CSPM solution that pinpoints misconfigurations, evaluates vulnerabilities, and provides unified visibility across all cloud assets.
    Cloud Workload Protection
    Runtime protection for cloud workloads with real-time threat detection, application hardening, and micro-segmentation to prevent lateral movement of threats.
    Continuous Compliance Automation
    Automated compliance checks and reporting for over 30 industry standards including SOC2, HIPAA, PCI, STIG, CIS, MITRE, and NIST with centralized compliance posture view.
    Application Security Scanning
    Integrated shift-left security solution providing SAST, SCA, and DAST scanning to identify and fix vulnerabilities throughout the development lifecycle.

    Contract

     Info
    Standard contract
    No

    Customer reviews

    Ratings and reviews

     Info
    0 ratings
    5 star
    4 star
    3 star
    2 star
    1 star
    0%
    0%
    0%
    0%
    0%
    0 reviews
    No customer reviews yet
    Be the first to review this product . We've partnered with PeerSpot to gather customer feedback. You can share your experience by writing or recording a review, or scheduling a call with a PeerSpot analyst.