Average Ratings 0 Ratings
Average Ratings 0 Ratings
Description
AWS Config is a service that allows for the assessment, auditing, and evaluation of the configurations of AWS resources. By continuously monitoring and documenting these configurations, Config facilitates the automation of evaluating recorded settings against desired benchmarks. Users can examine changes in configurations and the interrelationships between AWS resources, explore comprehensive histories of resource configurations, and assess compliance with their internal standards. This functionality streamlines processes related to compliance auditing, security evaluations, change management, and operational issue resolution. Furthermore, AWS Config serves as a key resource for conducting configuration audits and compliance checks for both AWS and external resources. Additionally, it allows for the integration and publication of configurations from third-party resources, including GitHub repositories, Microsoft Active Directory, or any on-premises servers, thereby enhancing the breadth of compliance oversight. Overall, the versatility and capabilities of AWS Config make it an essential tool for managing resource configurations effectively.
Description
Oversee cloud resource settings and manage compliance with organizational and regulatory standards from a central location. Handle security and compliance measures directly within the IBM Cloud® environment. The IBM Security and Compliance Center allows you to monitor your security and compliance status using a single dashboard. Establish rules for provisioned resources to maintain standardized configurations. Opt for pre-established control groups to adhere to industry best practices. Choose particular controls to satisfy regulatory requirements. Monitor network and user activity to identify any anomalies. Generate downloadable reports to serve as evidence for audits. Utilize custom tools to consolidate security issues in one central location. Streamline and automate your security and compliance measures. Enable governance of configurations effectively. Detect potential vulnerabilities and threats proactively. Follow a comprehensive tutorial to complete the necessary setup for managing your security posture successfully. By implementing these strategies, organizations can enhance their overall security framework and ensure continuous compliance.
API Access
Has API
API Access
Has API
Integrations
AWS App Mesh
Alert Logic
Anstrex
BOSCO
Bitcanopy
CardinalOps
CorralData
DisruptOps
IBM Cloud
Ikigai
Integrations
AWS App Mesh
Alert Logic
Anstrex
BOSCO
Bitcanopy
CardinalOps
CorralData
DisruptOps
IBM Cloud
Ikigai
Pricing Details
$0.001 per rule evaluation
Free Trial
Free Version
Pricing Details
No price information available.
Free Trial
Free Version
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Vendor Details
Company Name
Amazon
Founded
1994
Country
United States
Website
aws.amazon.com/config/
Vendor Details
Company Name
IBM
Founded
1911
Country
United States
Website
www.ibm.com/cloud/security-and-compliance-center
Product Features
Configuration Management
Access Control / Permissions
Application Deployment
Automated Provisioning
Infrastructure Automation
Node Management
Orchestration
Reporting Analytics / Visualization
Task Management
Product Features
Cloud Security
Antivirus
Application Security
Behavioral Analytics
Encryption
Endpoint Management
Incident Management
Intrusion Detection System
Threat Intelligence
Two-Factor Authentication
Vulnerability Management
Compliance
Archiving & Retention
Artificial Intelligence (AI)
Audit Management
Compliance Tracking
Controls Testing
Environmental Compliance
FDA Compliance
HIPAA Compliance
ISO Compliance
Incident Management
OSHA Compliance
Risk Management
Sarbanes-Oxley Compliance
Surveys & Feedback
Version Control
Workflow / Process Automation