Serverless
Browse 36 serverless tools
FEATURED
Datadog offers a comprehensive suite of cybersecurity tools for various aspects of application and infrastructure monitoring.
Cloud-native, AI-powered cyber range platform for cybersecurity training.
AWS-native malware scanning & data classification for S3 and other AWS storage.
Malware scanning solution for Azure Blob Storage with in-tenant detection.
Transparent data protection platform with encryption & tokenization for cloud envs.
SBOM generation tool for serverless functions across cloud platforms
Real-time runtime visibility platform for detecting active exploitation
Agent-based runtime firewall for web apps and APIs with AI-driven rules
Data management and security platform with discovery and classification tech.
Zero trust workload protection for VMs, containers, K8s, and serverless
API discovery tool that maps application attack surface from source code
Unified API and AI security platform for discovery, protection, and testing
Container and Kubernetes security platform with runtime visibility and detection
Real-time cloud threat detection, investigation, and response platform
Automated incident response platform for Microsoft 365 and identity systems
Cloud-based DDI (DNS, DHCP, IPAM) service for hybrid multi-cloud environments
Runtime protection for containers, K8s, serverless, and VMs in cloud environments
Security platform for serverless functions with vulnerability scanning & runtime
Malware scanning for cloud object storage and file services
Code to cloud security platform for app lifecycle protection
Comprehensive CNAPP solution with CSPM, CWPP, CDR, CIEM, and DevSecOps capabilities
A project for demonstrating AWS attack techniques with a focus on ethical hacking practices.
Lambda-Proxy is a utility that enables SQL injection testing of AWS Lambda functions by converting SQLMap HTTP attacks into Lambda invoke calls through a local proxy.
A serverless SOAR framework for AWS GuardDuty that automatically executes configurable response actions based on security findings and threat severity.
Stay Updated with Mandos Brief
Get strategic cybersecurity insights in your inbox