Cloud infrastructure security

Discover, inspect, and protect workloads, containers, and cloud native applications with third-party software.

Businesses need to be confident that their cloud workloads are protected, monitored
for security incidents, and compliant with key cloud controls. Cloud workload protection platforms (CWPP) provide organizations with comprehensive visibility and protection at the host-level helping to secure several workload layers like applications, databases, and functions.

Explore best practices for implementing a multi-layer defense strategy for security in the cloud.

Watch webinar 

Solutions

The solutions available in AWS Marketplace enhance the security posture of your workloads through the integrated features of CWPP. These features include the scanning of operating systems and containers, host configuration and compliance checks, host-based network segmentation, system integrity monitoring, log management, and application control.

Alert Logic

Alert Logic MDR provides a purpose-built security solution utilizing many threat and security analysis techniques backed by security experts and 24/7 SOCs.

See how it works: DemoDatasheet 

Aqua Security Software Inc.

Aqua Enterprise Platform provides insights and security automation that secures workloads across containers, VMs, and serverless.

See how it works: Demo |  Datasheet 

Palo Alto Networks

Prisma Cloud offers full-lifecycle protection for applications, data, and the entire cloud native technology stack with compliance across AWS environments.

See how it works: Demo |  Datasheet 

Rapid7

Rapid7 InsightVM identifies vulnerabilities in your IT environment and provides the reporting, automation, and integrations to prioritize and fix them.

See how it works: DemoDatasheet 

Snyk

Snyk enables over 2 million developers to build securely across the entire application lifecycle, from code to containers and cloud infrastructure.

See how it works: Demo |  Datasheet 

Tenable

Tenable.io provides an accurate view of assets and vulnerabilities across your environment to help you prioritize remediation based on actual cyber risks.

See how it works: Video |  Datasheet 

IBM Security Services
IBM Security Guardium empowers organizations to quickly achieve smarter, unified data protection across their hybrid AWS cloud environment.

See how it works: DemoDatasheet 

Resources

Learn about the latest practices, tools, and how to implement CWPPs with resources from AWS Marketplace.

Woman holding laptop standing in server warehouse

EBOOK

The value and impact of Cloud Security Posture Management (CSPM) tools

Learn how organizations are using cloud posture management tools to proactively resolve vulnerabilities in their infrastructure, applications, and workloads.

No. of pages: 11
Estimated read time: 7 minutes

Shadowed man sitting in front of 3 blue monitors

ON-DEMAND WEBINAR

How to prioritize security controls for sensitive AWS assets

Learn how to enhance security controls, maintain compliance, and safeguard your data.

Woman holding laptop standing in server warehouse

ON-DEMAND WEBINAR

How to improve threat detection and response in AWS

Review the break down of each component of extended detection and response (XDR) to learn practical guidance on approaches, tools, and implementation strategies.

View all security resources 

Key benefits of using third-party solutions available in AWS Marketplace

Tap the largest provider community

Extend the benefits of AWS by using capabilities from familiar solution providers you already trust. These providers have proven success securing different stage of cloud adoption, from initial migration through ongoing day to day management.

Reduce risk without losing speed

Quickly procure and deploy solutions that find and address vulnerabilities, detect intrusions, and enable faster response to incidents while minimizing business disruptions.

Integrate easily with AWS

Count on security tools that are designed for AWS interoperability to follow security best practices.