Threat & Vulnerability Management

Identifying and resolving vulnerabilities and threats is imperative for safeguarding sensitive data against unauthorized access and theft. With the Threat & Vulnerability Management solutions on AWS, you can deploy and configure threat and vulnerability tools, develop an incident response plan, report on vulnerabilities, and establish controls to protect your digital environment and resources. These solutions help to improve your security posture and maintain the integrity of your AWS environment.

AWS Solutions

Ready-to-deploy solutions assembling AWS Services, code, and configurations

Showing results: 1
Total results: 1
  • Publish Date
  • Security Insights on AWS

    Security Insights on AWS creates an automated dashboard based on data from Amazon Security Lake to help Chief Information Security Officers (CISOs) and security operations center (SOC) teams gain visibility into their security data, quickly identify threats, and take timely action to enhance their enterprise-wide security.
1
Back to top 

Partner Solutions

Software, SaaS, or managed services from AWS Partners

Showing results: 1
Total results: 1
  • Publish Date
  • Orca Cloud Security Platform

    Orca Security provides full-stack cloud security visibility for your AWS cloud environment—using one time, read-only integration. The platform detects vulnerabilities, malware, misconfigurations, lateral movement risk, weak and leaked passwords, overly permissive identities and entitlements, as well as breaches. By utilizing data from the assets' run time block storage, Orca is able to provide complete and centralized coverage, without the use of deployed agents.
1
Back to top 

Guidance

Prescriptive architectural diagrams, sample code, and technical content

Showing results: 1
Total results: 1
  • Publish Date
1