Loading...
Cloud security tools and solutions for securing cloud infrastructure, containers, serverless applications, and multi-cloud environments. Task: Compliance
Explore 55 curated cybersecurity tools, with 15,627 visitors searching for solutions
Cybercrime intelligence tools for searching compromised credentials from infostealers
Password manager with end-to-end encryption and identity protection features
VPN service providing encrypted internet connections and privacy protection
Fractional CISO services for B2B companies to build security programs
Feature your product and reach thousands of professionals.
Automated Microsoft 365 security configuration management and remediation tool
Automated Microsoft 365 security configuration management and remediation tool
Cloud-native platform for detecting and preventing file-based threats
Cloud-native platform for detecting and preventing file-based threats
Cloud-native application protection platform with unified security
Cloud-native application protection platform with unified security
Container security platform with image scanning, admission control, and runtime
Container security platform with image scanning, admission control, and runtime
Runtime security for physical, virtual, cloud, and container workloads
Runtime security for physical, virtual, cloud, and container workloads
CSPM platform for detecting misconfigurations & compliance gaps across clouds
CSPM platform for detecting misconfigurations & compliance gaps across clouds
Comprehensive CNAPP solution with CSPM, CWPP, CDR, CIEM, and DevSecOps capabilities
Comprehensive CNAPP solution with CSPM, CWPP, CDR, CIEM, and DevSecOps capabilities
SaaS security platform for misconfigurations, identities, and threats
SaaS security platform for misconfigurations, identities, and threats
CNAPP platform for multi-cloud security with risk mgmt and threat detection
CNAPP platform for multi-cloud security with risk mgmt and threat detection
Unified CNAPP for multi-cloud security, compliance, and threat detection
Unified CNAPP for multi-cloud security, compliance, and threat detection
Cloud & database asset intelligence platform for visibility & compliance
Cloud & database asset intelligence platform for visibility & compliance
A cloud native application protection platform that provides security monitoring and protection across cloud, on-premises, and hybrid environments.
A cloud native application protection platform that provides security monitoring and protection across cloud, on-premises, and hybrid environments.
Agentless CNAPP for multi-cloud security, compliance, and risk management
Agentless CNAPP for multi-cloud security, compliance, and risk management
Aqua Security is a CNAPP that provides comprehensive security for cloud native applications across their entire lifecycle, from development to production, in various cloud and container environments.
Aqua Security is a CNAPP that provides comprehensive security for cloud native applications across their entire lifecycle, from development to production, in various cloud and container environments.
ScubaGear is a PowerShell-based assessment tool that evaluates Microsoft 365 tenant configurations against CISA security baselines using Open Policy Agent and generates compliance reports.
ScubaGear is a PowerShell-based assessment tool that evaluates Microsoft 365 tenant configurations against CISA security baselines using Open Policy Agent and generates compliance reports.
Access Undenied on AWS analyzes CloudTrail AccessDenied events to explain access denial reasons and provide least-privilege remediation suggestions.
Access Undenied on AWS analyzes CloudTrail AccessDenied events to explain access denial reasons and provide least-privilege remediation suggestions.
Prowler is an open source multi-cloud security assessment tool that performs audits, compliance checks, and security evaluations across AWS, Azure, GCP, and Kubernetes environments.
Prowler is an open source multi-cloud security assessment tool that performs audits, compliance checks, and security evaluations across AWS, Azure, GCP, and Kubernetes environments.
An open-source policy-as-code platform that analyzes multi-cloud and SaaS environments using SQL and YAML policies with GPT integration for security, cost, and architecture assessments.
An open-source policy-as-code platform that analyzes multi-cloud and SaaS environments using SQL and YAML policies with GPT integration for security, cost, and architecture assessments.
Cloud Custodian is a YAML-based rules engine that manages and enforces security, compliance, and cost optimization policies across AWS, Azure, and GCP cloud environments in real-time.
Cloud Custodian is a YAML-based rules engine that manages and enforces security, compliance, and cost optimization policies across AWS, Azure, and GCP cloud environments in real-time.
A container compliance and vulnerability assessment tool that uses OpenSCAP to scan Docker images and running containers for security vulnerabilities and compliance violations.
A container compliance and vulnerability assessment tool that uses OpenSCAP to scan Docker images and running containers for security vulnerabilities and compliance violations.
An open-source script that performs automated security assessments of Docker containers and hosts against CIS Docker Benchmark standards.
An open-source script that performs automated security assessments of Docker containers and hosts against CIS Docker Benchmark standards.
An open-source framework that inventories and manages AWS resources across multiple accounts by collecting data via Cross Account Assume Roles and storing it in a centralized S3 bucket for analysis.
An open-source framework that inventories and manages AWS resources across multiple accounts by collecting data via Cross Account Assume Roles and storing it in a centralized S3 bucket for analysis.
A comprehensive AWS security automation toolkit that provides event monitoring, data protection, resource management, and security configuration validation across AWS environments.
A comprehensive AWS security automation toolkit that provides event monitoring, data protection, resource management, and security configuration validation across AWS environments.
A multi-account AWS security tool that identifies misconfigurations, provides real-time reporting, and performs automated remediation to establish secure cloud guardrails.
A multi-account AWS security tool that identifies misconfigurations, provides real-time reporting, and performs automated remediation to establish secure cloud guardrails.
Get the latest cybersecurity updates in your inbox
Cybercrime intelligence tools for searching compromised credentials from infostealers
Password manager with end-to-end encryption and identity protection features
VPN service providing encrypted internet connections and privacy protection
Fractional CISO services for B2B companies to build security programs