
Rekor
Software Supply Chain Transparency Log
Discover and compare 596 cloud security solutions for AWS, Azure, GCP and multi-cloud environments.
Software Supply Chain Transparency Log
A cloud-based intrusion detection system that detects and alerts on network-based threats in cloud environments.
Tools for managing AWS resources including EC2, EBS, RDS, IAM, CloudFormation and Route53.
A security platform for real-time threat detection and continuous security monitoring in cloud and hybrid environments.
Cloudlist is a tool for listing Assets from multiple Cloud Providers.
A next-gen cloud SIEM that aggregates data from various sources to detect and respond to sophisticated attacks in dynamic environments.
A cloud management platform with first class support for containers.
A cloud-based SIEM solution for managing and analyzing security-related data across diverse environments.
PacBot (Policy as Code Bot)
Imperva's Web Application Firewall (WAF) protects web applications from cyber threats like SQL injection and cross-site scripting.
Knox is a secret management service
Alert Logic's Managed Detection and Response (MDR) provides threat detection and response across diverse environments.