Cloud infrastructure security

Discover, inspect, and protect workloads, containers, and cloud native applications with third-party software.

Businesses need to be confident that their cloud workloads are protected, monitored
for security incidents, and compliant with key cloud controls. Cloud workload protection platforms (CWPP) provide organizations with comprehensive visibility and protection at the host-level helping to secure several workload layers like applications, databases, and functions.

Explore best practices for implementing a multi-layer defense strategy for security in the cloud.

Watch webinar 

Solutions

The solutions available in AWS Marketplace enhance the security posture of your workloads through the integrated features of CWPP. These features include the scanning of operating systems and containers, host configuration and compliance checks, host-based network segmentation, system integrity monitoring, log management, and application control.

Alert Logic

Alert Logic MDR provides a purpose-built security solution utilizing many threat and security analysis techniques backed by security experts and 24/7 SOCs.

See how it works: DemoDatasheet 

Aqua Security Software Inc.

Aqua Enterprise Platform provides insights and security automation that secures workloads across containers, VMs, and serverless.

See how it works: Demo |  Datasheet 

Palo Alto Networks

Prisma Cloud offers full-lifecycle protection for applications, data, and the entire cloud native technology stack with compliance across AWS environments.

See how it works: Demo |  Datasheet 

Rapid7

Rapid7 InsightVM identifies vulnerabilities in your IT environment and provides the reporting, automation, and integrations to prioritize and fix them.

See how it works: DemoDatasheet 

Snyk

Snyk enables over 2 million developers to build securely across the entire application lifecycle, from code to containers and cloud infrastructure.

See how it works: Demo |  Datasheet 

Tenable

Tenable.io provides an accurate view of assets and vulnerabilities across your environment to help you prioritize remediation based on actual cyber risks.

See how it works: Video |  Datasheet 

Resources

Learn about the latest practices, tools, and how to implement CWPPs with resources from AWS Marketplace.

Learn how risk management and compliance work together, and spot existing gaps in implementation.

Watch webinar 

SANS and AWS Marketplace discuss security for cloud workloads.

Watch webinar 
View all security resources 

Key benefits of using third-party solutions available in AWS Marketplace

Tap the largest provider community

Extend the benefits of AWS by using capabilities from familiar solution providers you already trust. These providers have proven success securing different stage of cloud adoption, from initial migration through ongoing day to day management.

Reduce risk without losing speed

Quickly procure and deploy solutions that find and address vulnerabilities, detect intrusions, and enable faster response to incidents while minimizing business disruptions.

Integrate easily with AWS

Count on security tools that are designed for AWS interoperability to follow security best practices.