Listing Thumbnail

    Vorlon

     Info
    Sold by: Vorlon, Inc 
    Vorlon provides security teams with detection, investigation, and response tools to protect their data in third-party applications.

    Overview

    Vorlon empowers security teams to detect, investigate and respond to third-party application risks. Our solution facilitates risk profiling of apps, delivers visibility, and enables continuous discovery and monitoring of third-party applications and data in motion.

    After purchasing our product, a Vorlon representative will be in touch with you within 24-48 hours.

    Highlights

    • Reduce time to identify data breaches and security incidents from months to minutes.
    • Reduce time to mitigate data breaches and security incidents from months to days.
    • Reduce your risk of data exposure.

    Details

    Categories

    Delivery method

    Deployed on AWS
    New

    Introducing multi-product solutions

    You can now purchase comprehensive solutions tailored to use cases and industries.

    Multi-product solutions

    Features and programs

    Financing for AWS Marketplace purchases

    AWS Marketplace now accepts line of credit payments through the PNC Vendor Finance program. This program is available to select AWS customers in the US, excluding NV, NC, ND, TN, & VT.
    Financing for AWS Marketplace purchases

    Pricing

    Pricing is based on the duration and terms of your contract with the vendor. This entitles you to a specified quantity of use for the contract duration. If you choose not to renew or replace your contract before it ends, access to these entitlements will expire.
    Additional AWS infrastructure costs may apply. Use the AWS Pricing Calculator  to estimate your infrastructure costs.

    12-month contract (2)

     Info
    Dimension
    Description
    Cost/12 months
    Base Platform
    Access to Vorlon platform and monitored applications
    $175,000.00
    12m Data Retention
    12 months data retention
    $100,000.00

    Vendor refund policy

    Contact Support

    How can we make this page better?

    We'd like to hear your feedback and ideas on how to improve this page.
    We'd like to hear your feedback and ideas on how to improve this page.

    Legal

    Vendor terms and conditions

    Upon subscribing to this product, you must acknowledge and agree to the terms and conditions outlined in the vendor's End User License Agreement (EULA) .

    Content disclaimer

    Vendors are responsible for their product descriptions and other product content. AWS does not warrant that vendors' product descriptions or other product content are accurate, complete, reliable, current, or error-free.

    Usage information

     Info

    Delivery details

    Software as a Service (SaaS)

    SaaS delivers cloud-based software applications directly to customers over the internet. You can access these applications through a subscription model. You will pay recurring monthly usage fees through your AWS bill, while AWS handles deployment and infrastructure management, ensuring scalability, reliability, and seamless integration with other AWS services.

    Resources

    Vendor resources

    Support

    Vendor support

    Knowledge Center and Human Support support@vorlon.io 

    AWS infrastructure support

    AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.

    Product comparison

     Info
    Updated weekly
    By Vorlon, Inc
    By Stream.Security
    By Varonis France SaS

    Accolades

     Info
    Top
    25
    In Log Analysis
    Top
    100
    In Data Security and Governance, Data Governance

    Overview

     Info
    AI generated from product descriptions
    Third-Party Application Risk Detection
    Detects and identifies risks associated with third-party applications through continuous discovery and monitoring capabilities.
    Data Visibility and Monitoring
    Provides visibility into data in motion across third-party applications with continuous monitoring and tracking.
    Risk Profiling
    Performs risk profiling of applications to assess and categorize security threats and vulnerabilities.
    Security Incident Investigation
    Enables investigation of security incidents and data breaches with tools to analyze and understand breach scope and impact.
    Incident Response Capabilities
    Provides response tools and workflows to mitigate identified security incidents and data exposure risks.
    Agentless Detection Architecture
    Agentless approach for security detection and response without requiring agent installation across cloud infrastructure.
    Real-time Configuration Monitoring
    Continuous tracking of behavior and configuration changes to provide an updated model of the environment with instant analysis of security and compliance implications.
    Threat Detection Framework
    Threat detection across Network and IAM using MITRE ATT&CK framework driven by machine learning analysis.
    Attack Chain Visualization
    Dynamic visual attack storyline that connects workloads, network data, cloud identities, and audit logs for root cause analysis.
    CloudTwin Technology
    CloudTwin technology designed to provide a precise and constantly updated model of the cloud environment for rapid response capabilities.
    Sensitive Data Discovery and Classification
    Automatically identifies and classifies sensitive data including PII, PCI, and secrets across structured and unstructured data stores in SaaS, IaaS, and on-premises environments using AI-powered automation.
    Permissions Analysis and Least Privilege Automation
    Maps and normalizes granular permissions across platforms into a CRUDS model to identify excessive access, eliminate data exposure from sharing links and stale permissions, and safely automate privilege reduction.
    Data Security Posture Management
    Continuously discovers configuration gaps across SaaS and IaaS platforms, provides customizable dashboards for visualization and assessment, and enables automated remediation of misconfigurations and security gaps.
    Real-Time Threat Detection and Monitoring
    Monitors data activity across SaaS and IaaS platforms to detect suspicious behavior, data exfiltration attempts, unauthorized access, and abnormal activity with granular audit trail capabilities for forensic investigations.
    Multi-Platform Coverage
    Provides automated data security and posture management across AWS, Box, M365, Google, Salesforce, GitHub, Okta, Zoom, Jira, and Slack with consistent classification policies and unified visibility.

    Contract

     Info
    Standard contract
    No
    No
    No

    Customer reviews

    Ratings and reviews

     Info
    0 ratings
    5 star
    4 star
    3 star
    2 star
    1 star
    0%
    0%
    0%
    0%
    0%
    0 reviews
    No customer reviews yet
    Be the first to review this product . We've partnered with PeerSpot to gather customer feedback. You can share your experience by writing or recording a review, or scheduling a call with a PeerSpot analyst.