Average Ratings 0 Ratings
Average Ratings 0 Ratings
Description
Amazon Security Lake seamlessly consolidates security information from various AWS environments, SaaS platforms, on-premises systems, and cloud sources into a specialized data lake within your account. This service enables you to gain a comprehensive insight into your security data across the entire organization, enhancing the safeguarding of your workloads, applications, and data. By utilizing the Open Cybersecurity Schema Framework (OCSF), which is an open standard, Security Lake effectively normalizes and integrates security data from AWS along with a wide array of enterprise security data sources. You have the flexibility to use your preferred analytics tools to examine your security data while maintaining full control and ownership over it. Furthermore, you can centralize visibility into data from both cloud and on-premises sources across your AWS accounts and Regions. This approach not only streamlines your data management at scale but also ensures consistency in your security data by adhering to an open standard, allowing for more efficient and effective security practices across your organization. Ultimately, this solution empowers organizations to respond to security threats more swiftly and intelligently.
Description
Experience the freedom of storage that allows data to flow freely without restrictions. With a managed data lake, you can quickly set up your system and start utilizing data without needing to be an expert in the field. Cribl Lake ensures you won’t be overwhelmed by data, enabling effortless storage, management, policy enforcement, and accessibility whenever necessary. Embrace the future with open formats while benefiting from consistent retention, security, and access control policies. Let Cribl take care of the complex tasks, transforming data into a resource that delivers value to your teams and tools. With Cribl Lake, you can be operational in minutes instead of months, thanks to seamless automated provisioning and ready-to-use integrations. Enhance your workflows using Stream and Edge for robust data ingestion and routing capabilities. Cribl Search simplifies your querying process, providing a unified approach regardless of where your data resides, so you can extract insights without unnecessary delays. Follow a straightforward route to gather and maintain data for the long haul while easily meeting legal and business obligations for data retention by setting specific retention timelines. By prioritizing user-friendliness and efficiency, Cribl Lake equips you with the tools needed to maximize data utility and compliance.
API Access
Has API
API Access
Has API
Integrations
Amazon S3
AWS Glue
AWS Lambda
AWS Security Hub
Abstract Security
Amazon EventBridge
Amazon OpenSearch Service
Amazon Simple Notification Service (SNS)
Amazon Simple Queue Service (SQS)
Amazon Web Services (AWS)
Integrations
Amazon S3
AWS Glue
AWS Lambda
AWS Security Hub
Abstract Security
Amazon EventBridge
Amazon OpenSearch Service
Amazon Simple Notification Service (SNS)
Amazon Simple Queue Service (SQS)
Amazon Web Services (AWS)
Pricing Details
$0.75 per GB per month
Free Trial
Free Version
Pricing Details
No price information available.
Free Trial
Free Version
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Vendor Details
Company Name
Amazon
Founded
1994
Country
United States
Website
aws.amazon.com/security-lake/
Vendor Details
Company Name
Cribl
Founded
2018
Country
United States
Website
cribl.io/lake/
Product Features
Cloud Security
Antivirus
Application Security
Behavioral Analytics
Encryption
Endpoint Management
Incident Management
Intrusion Detection System
Threat Intelligence
Two-Factor Authentication
Vulnerability Management