Loading...
Browse 35 serverless tools
SBOM generation tool for serverless functions across cloud platforms
SBOM generation tool for serverless functions across cloud platforms
Real-time runtime visibility platform for detecting active exploitation
Real-time runtime visibility platform for detecting active exploitation
Agent-based runtime firewall for web apps and APIs with AI-driven rules
Agent-based runtime firewall for web apps and APIs with AI-driven rules
Data management and security platform with discovery and classification tech.
Data management and security platform with discovery and classification tech.
Cloud infrastructure security audit service for AWS, Azure, and other platforms
Cloud infrastructure security audit service for AWS, Azure, and other platforms
Zero trust workload protection for VMs, containers, K8s, and serverless
Zero trust workload protection for VMs, containers, K8s, and serverless
API discovery tool that maps application attack surface from source code
API discovery tool that maps application attack surface from source code
Managed Apache Flink service for real-time stream & batch data processing
Managed Apache Flink service for real-time stream & batch data processing
Cloud-based managed MySQL database service with automated operations
Cloud-based managed MySQL database service with automated operations
Unified API and AI security platform for discovery, protection, and testing
Unified API and AI security platform for discovery, protection, and testing
Container and Kubernetes security platform with runtime visibility and detection
Container and Kubernetes security platform with runtime visibility and detection
Real-time cloud threat detection, investigation, and response platform
Real-time cloud threat detection, investigation, and response platform
Automated incident response platform for Microsoft 365 and identity systems
Automated incident response platform for Microsoft 365 and identity systems
Cloud-based DDI (DNS, DHCP, IPAM) service for hybrid multi-cloud environments
Cloud-based DDI (DNS, DHCP, IPAM) service for hybrid multi-cloud environments
Runtime protection for containers, K8s, serverless, and VMs in cloud environments
Runtime protection for containers, K8s, serverless, and VMs in cloud environments
Security platform for serverless functions with vulnerability scanning & runtime
Security platform for serverless functions with vulnerability scanning & runtime
Malware scanning for cloud object storage and file services
Malware scanning for cloud object storage and file services
Code to cloud security platform for app lifecycle protection
Code to cloud security platform for app lifecycle protection
Comprehensive CNAPP solution with CSPM, CWPP, CDR, CIEM, and DevSecOps capabilities
Comprehensive CNAPP solution with CSPM, CWPP, CDR, CIEM, and DevSecOps capabilities
Varna is an AWS serverless security tool that monitors CloudTrail logs using Event Query Language to detect and alert on suspicious activities in cloud environments.
Varna is an AWS serverless security tool that monitors CloudTrail logs using Event Query Language to detect and alert on suspicious activities in cloud environments.
A defense-in-depth security automation framework for AWS that combines threat intelligence, machine learning, and serverless technologies to prevent, detect, and respond to threats through automated security telemetry collection and analysis.
A defense-in-depth security automation framework for AWS that combines threat intelligence, machine learning, and serverless technologies to prevent, detect, and respond to threats through automated security telemetry collection and analysis.
A Lambda function that automatically disables AWS IAM User Access Keys after a specified time period to reduce security risks from aging credentials.
A Lambda function that automatically disables AWS IAM User Access Keys after a specified time period to reduce security risks from aging credentials.
A serverless application that creates and monitors fake HTTP endpoints as honeytokens to detect attackers, malicious insiders, and automated threats.
A serverless application that creates and monitors fake HTTP endpoints as honeytokens to detect attackers, malicious insiders, and automated threats.
Datadog offers a comprehensive suite of cybersecurity tools for various aspects of application and infrastructure monitoring.
Datadog offers a comprehensive suite of cybersecurity tools for various aspects of application and infrastructure monitoring.
Get strategic cybersecurity insights in your inbox
Real-time OSINT monitoring for leaked credentials, data, and infrastructure
A threat intelligence aggregation service that consolidates and summarizes security updates from multiple sources to provide comprehensive cybersecurity situational awareness.
AI security assurance platform for red-teaming, guardrails & compliance