Listing Thumbnail

    Unified identity-based access for all non-human identities

     Info
    Hush Security provides security teams with a centralized platform to discover, govern, and secure all non-human identities, secrets, and agentic AI. We correlate static and runtime intelligence to identify which NHI risks are actively exploited, then automatically provision scoped, just-in-time identity-based access policies that eliminate secrets entirely. Our patent-pending technology extends cloud IAM principles to every system in your stack, addressing your most critical attack vector while preventing future vulnerabilities from ungoverned NHIs

    Overview

    Hush Security delivers unified identity-based access and governance for all non-human identities, secrets, and agentic AI across your AWS infrastructure and beyond. Security teams operate blind to NHI risks, secrets, API keys, and agentic AI sprawling without governance. Traditional scanners find problems but can't fix them. Vaults store secrets but don't control access. Hush solves this through runtime detection and unified access management. We correlate every discovered secret with live production usage to identify active exploitation, then automatically provision identity-based, just-in-time credentials to verified workloads. This eliminates ungoverned identities, long-lived credentials, unauthorized access, stale identities, over-permissioning, and manual secret lifecycle management. Deploy in minutes through AWS Marketplace. Works across AWS, multi-cloud, and on-premise environments, including legacy databases and APIs where identity federation is impractical. The result: Complete visibility, automated governance, and 90% blast radius reduction. One platform. Unified control

    Highlights

    • Runtime Detection for Real Exploited NHI Risks, Native AWS and AWS Secrets Manager integration. Hush identifies which secrets are actively exploited right now and detects secrets other tools miss by capturing secret fingerprints through network-level visibility
    • Extend Cloud IAM Security Principles Across All Applications Apply AWS IAM's proven security model across your entire stack, especially to systems and applications that don't support the cloud IAM access model, including databases, APIs, and legacy infrastructure
    • Govern and Manage Access to All Agentic AI Systems Secure AI agents through runtime visibility and identity-based access policies. Control authentication, monitor usage, and enforce just-in-time access for every AI agent action

    Details

    Delivery method

    Deployed on AWS
    New

    Introducing multi-product solutions

    You can now purchase comprehensive solutions tailored to use cases and industries.

    Multi-product solutions

    Features and programs

    Financing for AWS Marketplace purchases

    AWS Marketplace now accepts line of credit payments through the PNC Vendor Finance program. This program is available to select AWS customers in the US, excluding NV, NC, ND, TN, & VT.
    Financing for AWS Marketplace purchases

    Pricing

    Unified identity-based access for all non-human identities

     Info
    Pricing is based on the duration and terms of your contract with the vendor. This entitles you to a specified quantity of use for the contract duration. If you choose not to renew or replace your contract before it ends, access to these entitlements will expire.
    Additional AWS infrastructure costs may apply. Use the AWS Pricing Calculator  to estimate your infrastructure costs.

    12-month contract (1)

     Info
    Dimension
    Description
    Cost/12 months
    Hush Starter Pack
    Unified Non-Human Identity Security Platform
    $60,000.00

    Vendor refund policy

    For refuns please contact us sales@hush.security 

    How can we make this page better?

    We'd like to hear your feedback and ideas on how to improve this page.
    We'd like to hear your feedback and ideas on how to improve this page.

    Legal

    Vendor terms and conditions

    Upon subscribing to this product, you must acknowledge and agree to the terms and conditions outlined in the vendor's End User License Agreement (EULA) .

    Content disclaimer

    Vendors are responsible for their product descriptions and other product content. AWS does not warrant that vendors' product descriptions or other product content are accurate, complete, reliable, current, or error-free.

    Usage information

     Info

    Delivery details

    Software as a Service (SaaS)

    SaaS delivers cloud-based software applications directly to customers over the internet. You can access these applications through a subscription model. You will pay recurring monthly usage fees through your AWS bill, while AWS handles deployment and infrastructure management, ensuring scalability, reliability, and seamless integration with other AWS services.

    Support

    AWS infrastructure support

    AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.

    Similar products

    Customer reviews

    Ratings and reviews

     Info
    0 ratings
    5 star
    4 star
    3 star
    2 star
    1 star
    0%
    0%
    0%
    0%
    0%
    0 reviews
    No customer reviews yet
    Be the first to review this product . We've partnered with PeerSpot to gather customer feedback. You can share your experience by writing or recording a review, or scheduling a call with a PeerSpot analyst.