Select your cookie preferences

We use essential cookies and similar tools that are necessary to provide our site and services. We use performance cookies to collect anonymous statistics, so we can understand how customers use our site and make improvements. Essential cookies cannot be deactivated, but you can choose “Customize” or “Decline” to decline performance cookies.

If you agree, AWS and approved third parties will also use cookies to provide useful site features, remember your preferences, and display relevant content, including relevant advertising. To accept or decline all non-essential cookies, choose “Accept” or “Decline.” To make more detailed choices, choose “Customize.”

Sign in
Your Saved List Become a Channel Partner Sell in AWS Marketplace Amazon Web Services Home Help

It completes the requirement and is suitable for AWS security

  • By Information Technology and Services
  • on 04/04/2024

What do you like best about the product?
It helps in protecting the data and securing it by finding the discrepancies in security. The report is generates is quite good. It helps in marking the probable vulnerabilities which a newbie might be unaware.

To be brutally honest, it completes the gaps that is left intentionally by AWS architects. Never really required customer support, the documentation is quite bulky and manual is enough.

Implementation was tough but worth it. Easy for technical people to use it.
What do you dislike about the product?
Satisfactory UI. Report could be better. They should integrate more charts and graphs in the report. Glitches come often.

Definitely not easy for business users to understand. A cybersecurity architect will be needed to comprehend whats happening, and whats actually required.

You won't use it frequently unless a lot of applications are deployed in CI/CD pipeline.
What problems is the product solving and how is that benefiting you?
AWS implementaion was tough, but this tool made sure that vulnerabilities were handled carefully. Our apps were secure in the best way possible with minimal threats to data.


There are no comments to display