Cloud Katana
Unlocking Serverless Computing to Assess Security Controls
Discover and compare 596 cloud security solutions for AWS, Azure, GCP and multi-cloud environments.
Unlocking Serverless Computing to Assess Security Controls
An identity security platform that manages and secures access to critical data and applications across enterprises.
Generate Multi-Account IAM users/groups/roles/policies from a simple YAML configuration file and Jinja2 templates.
A robust security feature designed to enhance access control in Google Workspace and Google Cloud Platform environments.
Enhance the security of your web applications with AWS Firewall Factory.
An identity management solution that addresses the complexities of managing identities and access rights across diverse enterprise environments.
FestIn - Open S3 Bucket Scanner
A identity and access management platform that enhances security and minimizes user friction in complex digital environments.
A utility to convert your AWS CLI credentials into AWS console access.
Identity-Aware Proxy (IAP) provides a centralized authorization layer for managing access to cloud resources and applications, ensuring secure access through authentication and authorization checks.
Automatically compile an AWS Service Control Policy that ONLY allows AWS services that are compliant with your preferred compliance frameworks.
A solution for managing identities and access across diverse systems and users.