Identifying and resolving vulnerabilities and threats is imperative for safeguarding sensitive data against unauthorized access and theft. With the Threat & Vulnerability Management solutions on AWS, you can deploy and configure threat and vulnerability tools, develop an incident response plan, report on vulnerabilities, and establish controls to protect your digital environment and resources. These solutions help to improve your security posture and maintain the integrity of your AWS environment.
AWS Solutions
Ready-to-deploy solutions assembling AWS Services, code, and configurations
Partner Solutions
Software, SaaS, or managed services from AWS Partners
Total results: 1
- Publish Date
-
Orca Cloud Security Platform
Orca Security provides full-stack cloud security visibility for your AWS cloud environment—using one time, read-only integration. The platform detects vulnerabilities, malware, misconfigurations, lateral movement risk, weak and leaked passwords, overly permissive identities and entitlements, as well as breaches. By utilizing data from the assets' run time block storage, Orca is able to provide complete and centralized coverage, without the use of deployed agents.
Guidance
Prescriptive architectural diagrams, sample code, and technical content