Weave Scope
A cloud-native security platform that provides asset inventory, vulnerability management, compliance monitoring, and security posture management across multiple cloud providers.
Secure your cloud infrastructure with advanced network security solutions.
A cloud-native security platform that provides asset inventory, vulnerability management, compliance monitoring, and security posture management across multiple cloud providers.
Zeus is a powerful tool for AWS EC2 / S3 / CloudTrail / CloudWatch / KMS best hardening practices with a focus on Identity and Access Management.
A command-line tool to get valuable information out of AWS CloudTrail and a general purpose toolbox for working with IAM policies
Show the history and changes between configuration versions of AWS resources
ARMO delivers developer-first Kubernetes security solutions designed to integrate seamlessly into your existing CI/CD pipeline and development workflows. Our patented technology ensures that every Kubernetes cluster, container, and microservice is secure by design and remains protected throughout its lifecycle, from development to production and from configuration to runtime. Empower your DevOps, DevSecOps, and developer teams with comprehensive security, visibility, and control across your entire Kubernetes ecosystem.
CloudDefense.AI is an advanced, multi-layered Cloud Native Application Protection Platform (CNAPP) designed to provide comprehensive security for your cloud infrastructure and native applications. We simplify complex toolchains, empowering security teams to efficiently identify and remediate vulnerabilities with unparalleled precision. Developed by engineers for engineers, CloudDefense.AI integrates seamlessly into developer workflows, offering an intuitive user experience and automated remediation capabilities to streamline security operations and enhance overall application resilience.
Cyscale is an agentless Cloud-Native Application Protection Platform (CNAPP) revolutionizing cloud security with automated, contextual analysis of misconfigurations, vulnerabilities, access, and data. Gain unparalleled visibility and actionable risk assessments to detect and respond to cloud threats with speed and precision. Our unified platform empowers organizations of all sizes to establish, enhance, and maintain robust cloud security programs aligned with industry best practices, simplifying the complex journey of cloud migration and development.
Orca Security provides continuous, agentless full-stack visibility across your entire cloud environment, identifying vulnerabilities, misconfigurations, and active threats. Its Cloud Security Platform delivers comprehensive insights in minutes, eliminating the need for complex deployments and reducing the time to detect and remediate risks across all your cloud accounts and assets.
Plerion is a comprehensive, all-in-one cloud security platform designed to unify and simplify security across AWS, Azure, and GCP environments. It provides robust Cloud Security Posture Management (CSPM), workload protection, data security, IAM security, and continuous compliance, offering unparalleled context and 360-degree transparency. Plerion empowers organizations to proactively reduce cyber risk, achieve immediate security posture improvements, and maximize ROI through a single, intuitive interface.
Prowler is a leading open-source tool dedicated to improving the security posture of cloud environments. It empowers organizations with a transparent, customizable, and community-driven approach to cloud security, offering comprehensive checks and policies tailored to individual needs. By providing full visibility into its security logic, Prowler ensures informed decision-making and fosters a collaborative security ecosystem for enhanced protection.
Wiz delivers comprehensive cloud security posture management and risk visibility across multi-cloud environments, containers, and workloads without requiring agents. By leveraging cloud-native APIs from AWS, Azure, and GCP, Wiz provides a unified, 360-degree view of your entire cloud infrastructure, identifying vulnerabilities, misconfigurations, network exposures, and sensitive data. Gain immediate insights and make informed decisions with an up-to-date, holistic representation of your security landscape.