Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Description

CloudXray is a solution for scanning cloud workloads that functions in two modes: a basic mode for identifying misconfigurations and an advanced mode for comprehensive scanning that includes malware detection, OS vulnerabilities, and misconfiguration analysis. Its architecture features a centralized orchestrator situated in a single region, complemented by distributed scanners that extend coverage to all identified regions, ensuring compatibility with both AWS and GCP platforms. By employing an agentless methodology, it examines workloads and volumes throughout your cloud account for threats such as malware, CVEs, and policy violations. The solution dynamically provisions scanning instances as needed, integrates through roles and APIs, and ensures ongoing monitoring of cloud resources without the necessity for persistent agents. With support for quick deployment, CloudXray is tailored for scalable, multi-region cloud environments. It is specifically crafted to assist organizations in upholding a secure framework across compute instances, storage volumes, and operating system layers by merging configuration assessments with vulnerability detection and additional features. This comprehensive approach not only enhances security but also streamlines compliance with industry regulations.

Description

REMnux® is a specialized Linux distribution designed for reverse-engineering and examining malicious software. This toolkit offers a well-organized selection of free tools developed by the community for analysts to utilize in their malware investigations, eliminating the need to individually locate, set up, and configure each tool. For easy access, users can download the REMnux virtual machine in OVA format and import it into their hypervisor environment. Additionally, it can be installed directly on a dedicated host or integrated into an existing system that runs a compatible version of Ubuntu. The toolkit also includes Docker images for widely-used malware analysis tools, allowing them to operate as containers without the necessity of direct installation on the host system. Furthermore, users have the option to run the entire REMnux distribution as a container, enhancing flexibility in various environments. For comprehensive guidance on installation, usage, and how to contribute to REMnux, along with detailed information about the tools in the toolkit, users should refer to the official REMnux documentation site, which serves as a valuable resource for both new and experienced analysts alike.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

Amazon Web Services (AWS)
Cloudnosys
Docker
Google Cloud Platform
Kasm Workspaces
Microsoft 365
Microsoft Azure

Integrations

Amazon Web Services (AWS)
Cloudnosys
Docker
Google Cloud Platform
Kasm Workspaces
Microsoft 365
Microsoft Azure

Pricing Details

No price information available.
Free Trial
Free Version

Pricing Details

No price information available.
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

Cloudnosys

Founded

2016

Country

United States

Website

cloudnosys.com/cloudxray

Vendor Details

Company Name

REMnux

Founded

2010

Website

remnux.org

Product Features

Cloud Security

Antivirus
Application Security
Behavioral Analytics
Encryption
Endpoint Management
Incident Management
Intrusion Detection System
Threat Intelligence
Two-Factor Authentication
Vulnerability Management

Vulnerability Scanners

Asset Discovery
Black Box Scanning
Compliance Monitoring
Continuous Monitoring
Defect Tracking
Interactive Scanning
Logging and Reporting
Network Mapping
Perimeter Scanning
Risk Analysis
Threat Intelligence
Web Inspection

Product Features

Alternatives

Alternatives

YUM Reviews

YUM

Red Hat
Palo Alto Networks WildFire Reviews

Palo Alto Networks WildFire

Palo Alto Networks