Endpoint security

Help protect and secure endpoints against zero-day exploits, incidents, and data loss using third-party software.

Having an up-to-date device inventory, enforcing configuration compliance, and finding and managing vulnerabilities are key on preventing endpoint security incidents. It is also important to consider capabilities to quickly detect, respond to, and recover from intrusions. Endpoint detection and response (EDR) tools can help your organization detect malicious activities on endpoints and facilitate incident response activities.


Discover how to unpack and leverage the telemetry provided by endpoint security solutions using MITRE ATT&CK Cloud examples.

Watch webinar 

Solutions

The solutions available in AWS Marketplace help you manage and configure your endpoint assets and secure them against vulnerabilities, malware, and data loss. Endpoint detection and response tools can help you discover intrusions and facilitate remediation to remove unauthorized users from the endpoint.

Crowdstrike
CrowdStrike Falcon Complete delivers comprehensive and easy-to-use endpoint and workload
protection, backed 24/7 by CrowdStrike’s elite team of experts.

See how it works: Demo |  Datasheet 

Digital Guardian

Digital Guardian DLP can discover and classify regulated data and IP, plus enforce policies to defend it against inadvertent loss or malicious theft.

See how it works: Datasheet 

SentinelOne

SentinelOne delivers autonomous endpoint protection through a single agent that prevents, detects, responds, and hunts attacks across major vectors.

See how it works: Demo | Datasheet

Tanium

Tanium as a Service is an endpoint management and security platform that provides visibility, control and rapid response.

See how it works: Video | Datasheet

TrendMicro

Trend Micro Cloud One provides visibility and threat protection services to help prevent unwanted and unknown apps from executing on your endpoints.

See how it works: Video | Datasheet

Resources

Learn about the latest practices, tools, and how to implement effective IAM processes and policies with resources from AWS Marketplace.

View all security resources 

Key benefits of using third-party solutions available in AWS Marketplace

Tap the largest provider community

Extend the benefits of AWS by using capabilities from familiar solution providers you already trust. These providers have proven success securing different stage of cloud adoption, from initial migration through ongoing day to day management.

Reduce risk without losing speed

Quickly procure and deploy solutions that find and address vulnerabilities, detect intrusions, and enable faster response to incidents while minimizing business disruptions.

Integrate easily with AWS

Count on security tools that are designed for AWS interoperability to follow security best practices.