Loading...
Cloud security tools and solutions for securing cloud infrastructure, containers, serverless applications, and multi-cloud environments. Task: Misconfiguration
Browse 60 security tools
CNAPP providing unified cloud security posture, workload, and app protection.
CSPM solution for multi-cloud misconfiguration detection and compliance mgmt
Runtime CNAPP + CADR platform unifying app-layer threat detection and response.
AWS cloud security scanner that unifies findings into a graph-based attack path view.
MSP-focused tool automating M365 security policy enforcement and drift remediation.
Agentless CSPM for AWS, Azure, GCP & OCI with continuous config monitoring.
CNAPP providing CSPM and workload protection across multicloud environments.
SaaS and AI security platform for posture mgmt, ITDR, and NHI governance.
CSPM solution for detecting and remediating cloud misconfigurations.
AWS cloud security platform for misconfiguration discovery, IAM mgmt & compliance.
Cloud asset discovery & threat detection with continuous monitoring & CI/CD integration.
CSPM tool with runtime threat detection, ML models, and auto-remediation.
Multi-cloud CSPM platform with continuous config validation & auto-remediation.
Multi-cloud CSPM tool for misconfiguration detection, compliance & remediation.
Agentless Kubernetes & container security with KSPM across multi-cloud.
Cloud security suite for auto-detecting and remediating misconfigs across multi-cloud.
Cloud security scanner that finds & fixes 383+ misconfigs across major cloud providers.
SSPM platform for detecting & remediating SaaS misconfigurations and risks.
Unified CNAPP consolidating CSPM, CIEM, and CWPP for multi-cloud security.
Agentless CSPM for continuous misconfiguration detection across multi-cloud.
Managed cloud CDR platform with AI-driven detection and 24/7 SOC response.
Cloud security platform for misconfiguration remediation and exposure mgmt
SaaS security platform for managing misconfigurations and risks
Continuous M365 security monitoring for misconfigurations and risks
Get strategic cybersecurity insights in your inbox