
Rekor
Software Supply Chain Transparency Log
Discover and compare 596 cloud security solutions for AWS, Azure, GCP and multi-cloud environments.
Software Supply Chain Transparency Log
Akamai Enterprise Application Access (EAA) provides secure application access using a Zero Trust Network Access (ZTNA) model, eliminating traditional VPNs.
Cloudlist is a tool for listing Assets from multiple Cloud Providers.
A Zero Trust Network Access (ZTNA) solution for secure application access in remote environments.
Knox is a secret management service
A zero-trust network access solution that secures application access in hybrid environments, implementing deny-by-default and least-privilege access principles.
A structured framework for incident response in AWS environments, leveraging native AWS services for log collection, threat detection, and incident management.
A web application firewall that protects web applications from various threats, including OWASP Top Ten vulnerabilities and zero-day attacks.
A non-interactive daemon for host management using gRPC for remote interactions and policy enforcement through Open Policy Agent (OPA).
A managed DDoS protection service that safeguards applications from DDoS attacks.
SkyArk helps to discover, assess and secure the most privileged entities in Azure and AWS
A managed security service that addresses sophisticated cyber threats using AI-native technology.