Average Ratings 0 Ratings
Average Ratings 0 Ratings
Description
Amazon Inspector serves as an automated service for security assessments that enhances the security and compliance posture of applications running on AWS. This service efficiently evaluates applications for potential exposure, vulnerabilities, and deviations from established best practices. Upon completing an assessment, Amazon Inspector generates a comprehensive list of security findings ranked by their severity levels. Users can access these findings either directly or through detailed assessment reports available via the Amazon Inspector console or API. The security assessments conducted by Amazon Inspector enable users to identify unwanted network accessibility of their Amazon EC2 instances, as well as any vulnerabilities present on those instances. Furthermore, assessments are structured around pre-defined rules packages that align with widely accepted security best practices and vulnerability definitions. To expedite mean time to recovery (MTTR), the service leverages over 50 sources of vulnerability intelligence, which aids in the rapid identification of zero-day vulnerabilities. This comprehensive approach ensures that organizations can maintain a robust security framework while efficiently addressing potential risks.
Description
Informer's 24/7 monitoring and automated digital footprint detection will reveal your true attack surface. Access detailed vulnerability data for web applications and infrastructure. Expert remediation advice is also available. Dashboards enable you to see and understand your evolving attack surfaces, track your progress, and accurately assess your security posture. You can view and manage your vulnerabilities and discovered assets in one place. There are multiple ways to help you quickly address your risks. Access to detailed management information is provided by the custom reporting suite, which was specifically designed to record asset and vulnerability data. You will be instantly alerted whenever there are any changes to your attack surface that could impact the overall security posture in your environment, 24 hours a day.
API Access
Has API
API Access
Has API
Integrations
AWS App Mesh
AWS Marketplace
Alert Logic
Amazon EC2
Amazon Web Services (AWS)
Azure Application Gateway
Certa
Conviso Platform
FortiCNP
Google Cloud Platform
Integrations
AWS App Mesh
AWS Marketplace
Alert Logic
Amazon EC2
Amazon Web Services (AWS)
Azure Application Gateway
Certa
Conviso Platform
FortiCNP
Google Cloud Platform
Pricing Details
No price information available.
Free Trial
Free Version
Pricing Details
$500 Per Month
Free Trial
Free Version
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Vendor Details
Company Name
Amazon
Founded
1994
Country
United States
Website
aws.amazon.com/inspector/
Vendor Details
Company Name
Informer
Founded
2014
Country
United Kingdom
Website
www.informer.io/platform
Product Features
Vulnerability Management
Asset Discovery
Asset Tagging
Network Scanning
Patch Management
Policy Management
Prioritization
Risk Management
Vulnerability Assessment
Web Scanning
Vulnerability Scanners
Asset Discovery
Black Box Scanning
Compliance Monitoring
Continuous Monitoring
Defect Tracking
Interactive Scanning
Logging and Reporting
Network Mapping
Perimeter Scanning
Risk Analysis
Threat Intelligence
Web Inspection
Product Features
Vulnerability Management
Asset Discovery
Asset Tagging
Network Scanning
Patch Management
Policy Management
Prioritization
Risk Management
Vulnerability Assessment
Web Scanning
Vulnerability Scanners
Asset Discovery
Black Box Scanning
Compliance Monitoring
Continuous Monitoring
Defect Tracking
Interactive Scanning
Logging and Reporting
Network Mapping
Perimeter Scanning
Risk Analysis
Threat Intelligence
Web Inspection