Security in a multi-account environment

To improve security posture across a multi-account environment, organizations need to implement controls such as vulnerability assessment, firewalls, and intrusion prevention. AWS Marketplace offers integrated software solutions for AWS Control Tower that help organizations secure diverse workloads and provide broader visibility into assets, events and vulnerabilities.

These are just a few examples of IT resource optimization solutions. Scroll down or use the drop-down menu to learn more about each solution.

Choose a solution
  • Choose a solution
  • Alert Logic
  • Tenable
  • Trend Micro
  • CrowdStrike

Alert Logic

Alert Logic Managed Detection and Response (MDR) is always on, providing protection across your entire organization and delivering unrivaled security through five key elements: intelligence driven by data and humans, a scalable MDR platform, security experts named to your account, security insights at your fingertips, and protection tailored to each asset in your environment.

Alert Logic MDR (US) features include:

  • A named MDR concierge with 24/7 threat management and a 15-minute escalation SLA
  • Real-time reporting, intrusion detection, and user behavior anomaly detection
  • Hybrid asset and risk discovery
  • Essential compliance coverage
  • Vulnerability scanning and Endpoint protection
  • Cloud configuration assessment

How it works

Additional resources from Alert Logic


ClubCorp is the largest owner and operator of private clubs nationwide with 200+ country clubs, city clubs, athletic clubs, and stadium clubs. The company has adopted a multi-cloud, hybrid environment in relentless pursuit of the ultimate member experience. With constant growth, a constantly changing IT footprint, and an urgent need to keep member data secure, ClubCorp turned to Alert Logic. With Alert Logic MDR, the company has mitigated security concerns saving both time and resources.

quotes icon

We needed an environment that was going to be secure, stable and scalable. We’ve had that with AWS and Alert Logic.

Zach Vinduska, Vice President, Infrastructure, Security & Compliance, ClubCorp


Vulnerability Management for Modern IT, provides the most accurate information about assets and vulnerabilities in your IT environment. Available as a cloud-delivered solution, features the broadest vulnerability coverage, intuitive dashboard visualizations for rapid analysis, and seamless integrations that help you maximize efficiency and increase effectiveness. features include:

  • Comprehensive assessment
  • Predictive prioritization
  • Dynamic asset tracking
  • Passive network monitoring
  • Automated cloud visibility
  • Pre-built integrations and flexible API

How it works

Additional resources from Tenable

Trend Micro

Trend Micro Cloud One™ - Workload Security is purpose-built for server, cloud, and container environments, providing visibility across your entire hybrid cloud. Automatically protect against vulnerabilities, malware, and unauthorized changes with a wide range of powerful and intelligent capabilities. Workload Security automatically integrates with the DevOps toolchain and includes a rich set of REST APIs, which facilitate deployment, policy management, health checks, and compliance reporting.

Trend Micro Cloud One – Workload Security features include:

  • Intrusion prevention, anti-malware, machine learning, behavioral analysis, application control, integrity monitoring, web reputation, firewall, and log inspection
  • Security policy automation as you migrate or create new workloads
  • Multi-platform application control to detect and block unauthorized software execution
  • API-first, developer-friendly tools to help you integrate security controls into DevOps processes
  • Integration for leading SIEM, security management, orchestration, monitoring, pipeline, and IT service management tools

How it works

Additional resources from Trend Micro


Blackbaud is the world's leading cloud software company powering social good. Serving the entire social good community—nonprofits, foundations, companies, education institutions, healthcare organizations and individual change agents—Blackbaud connects and empowers organizations to increase their impact through cloud software, services, expertise, and data intelligence.

quotes icon
We compared solutions between several companies,
and Trend Micro was the most complete solution. Trend
Micro Cloud One - Workload Security checked all the
boxes across cybersecurity and DevOps.

      Mario Mendoza, Team Lead, Cyber Security Architecture and Engagement, Blackbaud


Crowdstrike Falcon Endpoint Protection uses advanced artificial intelligence (AI), machine learning, behavioral protection, kernel level visibility and proactive threat hunting to identify potential attacks in real-time. For organizations who are adopting or migrating to cloud workloads, CrowdStrike Falcon Endpoint Protection provides comprehensive visibility and breach protection allowing customers to rapidly adopt and secure technology across any workload.

CrowdStrike Falcon Endpoint Protection Premium features include:

Workload Discovery: Automatically discover all existing cloud workload and containers deployments to get full visibility into the scope and nature of your cloud footprint

Observability: Improve cloud hygiene with real-time information about workloads and containers, including metadata on configurations, networking and security.

Runtime Protection: Protect against malware and sophisticated attacks for Amazon EC2 instances running Linux

EDR for Cloud Workloads: EDR for cloud workloads and containers helps prevent silent failure by capturing raw events for complete event monitoring and visibility

API-Led Integrations: Seamlessly integrate with DevOps and CI/CD pipelines and leverage AWS Cloud Formation, Terraform, Ansible, Chef, Puppet, etc

How it works

Additional resources from CrowdStrike

Oak Hill Advisors

Oak Hill Advisors relies on CrowdStrike for in-context visibility and streaming protection of their cloud workloads. CrowdStrike has become integral to both managing and updating the tools Oak Hill offers its customers as well as growing and innovating the firm’s technological footprint. A comprehensive overview of AWS accounts, VPCs, security groups, and EC2 instances helps their security team operate with their cloud-first strategy.

quotes icon

One security challenge of the cloud is that your systems cannot sit behind a perimeter. Another challenge is the dynamism of the infrastructure. We introduce changes daily, which in the past was not the case. And even if it were, because we were behind a firewall it took more time to discover and mitigate security issues. In the cloud, your vulnerability can be exposed within minutes or seconds. That’s where CrowdStrike is truly valuable for us. Our security team can continue to work on what they need to work on.

Sajawal Haider, Chief Information and Security Officer, Oak Hill Advisors

Have questions? Have tips?

We're here to help you get started with AWS Marketplace. Ask for or give advice on the AWS Marketplace discussion forum.

Have questions? Have tips?

We're here to help you get started with AWS Marketplace. Ask for or give advice on the AWS Marketplace discussion forum.