Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Description

Amazon Macie is an entirely managed service focused on data security and privacy that leverages machine learning and pattern recognition to locate and safeguard sensitive information within AWS. As organizations grapple with the increasing amounts of data they generate, the task of identifying and securing sensitive information can become more complex, costly, and labor-intensive. By automating the process of discovering sensitive data at scale, Amazon Macie helps reduce the financial burden associated with data protection. It generates an inventory of Amazon S3 buckets, highlighting unencrypted buckets, those that are publicly accessible, and those shared with AWS accounts outside your designated AWS Organizations. Additionally, Macie utilizes machine learning and pattern matching methods on the selected buckets to pinpoint and notify you about sensitive data, including personally identifiable information (PII), ensuring that your organization remains compliant and secure. Furthermore, by streamlining this process, Macie enables businesses to focus more on their core operations while maintaining robust data security practices.

Description

Stop spending unnecessary time on configuring NoSQL databases; instead, opt for a key-value database and web API that can be set up in mere seconds. This solution is ideal for serverless applications, quick prototypes, and data metrics, among other uses, boasting the simplest API available. Whether you need a single bucket or multiple buckets to manage your keys, KVdb simplifies the process of reading and writing key-value data, accommodating any business requirement. Enhance the security of your database by employing access tokens that limit user permissions on reading and writing keys, making it especially suitable for applications with user accounts. You can interface with the database using curl or any preferred HTTP client library. Create a bucket that can optionally prevent key enumeration and deletion, and remember that values can be as large as 16 KB. Additionally, easily adjust numeric values with increment or decrement functions, and with our Pro plan, you can store keys indefinitely, create custom bucket scripts, and utilize access tokens to manage bucket access effectively. With these features, KVdb provides a robust solution for managing data with flexibility and security.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

AWS App Mesh
AWS Security Hub
Amazon Aurora
Amazon CloudWatch
Amazon Detective
Amazon S3
Bitcanopy
Chronicle SOAR
Pipedream

Integrations

AWS App Mesh
AWS Security Hub
Amazon Aurora
Amazon CloudWatch
Amazon Detective
Amazon S3
Bitcanopy
Chronicle SOAR
Pipedream

Pricing Details

No price information available.
Free Trial
Free Version

Pricing Details

$10 per month
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

Amazon

Founded

1994

Country

United States

Website

aws.amazon.com/macie/

Vendor Details

Company Name

Pilvy

Founded

2010

Website

kvdb.io

Product Features

Cybersecurity

AI / Machine Learning
Behavioral Analytics
Endpoint Management
IOC Verification
Incident Management
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting

Product Features

Database

Backup and Recovery
Creation / Development
Data Migration
Data Replication
Data Search
Data Security
Database Conversion
Mobile Access
Monitoring
NOSQL
Performance Analysis
Queries
Relational Interface
Virtualization

Alternatives

Enterprise Recon Reviews

Enterprise Recon

Ground Labs

Alternatives