Managing organizational risk is critical for effective information security and privacy. Risk Management solutions on AWS provide tools and aids for integrating security, privacy, and cyber supply chain risk management into system lifecycles. These solutions help defense agencies improve interoperability and reuse, enhance cybersecurity posture, meet requirements like Department of Defense (DoD) 8510.01, DoD Cloud Computing (CC) Security Requirements Guide (SRG), and Federal Risk and Authorization Management Program (FedRAMP), and proactively identify, assess, and mitigate risks.
Partner Solutions
Software, SaaS, or managed services from AWS Partners
![](https://d1.awsstatic.com/Gradient-Divider-orange-blue.317b0a6e1db69aa03ede8c5fd6fad7ee117a626f.jpg)
Total results: 20
- Publish Date
-
Arctic Wolf Security Operations Platform - Managed Detection…
Arctic Wolf® is a global leader in security operations, delivering the first cloud-native security operations platform to end cyber risk. Powered by threat telemetry spanning endpoint, network, and cloud sources, the Arctic Wolf® Security Operations Cloud ingests and analyzes more than 1.9 trillion security events a week across the globe, enabling critical outcomes for most security use cases and optimizing customers’ disparate security solutions. Now deployed to more than 3,000 customers worldwide, the Arctic Wolf® Platform delivers automated threat detection and response at scale, and empowers organizations of any size to establish world-class security operations with the push of a button. -
Trend Micro Cloud One
Trend Micro's ABI integration streamlines deployment of our cloud security platform and facilitates full integration of our XDR solution. Automatically deploy security to workloads and layer Trend threat intelligence on top of your AWS CloudTrail logs to detect any suspicious activity, empowering you to accelerate detection and response in the cloud. -
Tenable Vulnerability Management
Tenable Vulnerability Management (formerly Tenable.io) provides the actionable and accurate data you need to identify, investigate, and prioritize the remediation of vulnerabilities and misconfigurations in your modern IT environment.