Best IT Security Software for AWS Amplify

Find and compare the best IT Security software for AWS Amplify in 2024

Use the comparison tool below to compare the top IT Security software for AWS Amplify on the market. You can filter results by user reviews, pricing, features, platform, region, support options, integrations, and more.

  • 1
    Kroll Cyber Risk Reviews
    See Software
    Learn More
    We are the #1 incident response provider in the world. We protect, detect, and respond to cyberattacks by combining complete response capabilities and frontline threat information from over 3000 incidents per year with end-to-end expertise. Contact us immediately via our 24-hour cyber incident hotlines. Kroll's Cyber Risk specialists can help you tackle the threats of today and tomorrow. Kroll's protection solutions, detection and response are enriched with frontline threat intelligence from 3000+ incident cases each year. It is important to take proactive measures to protect your organization, as the attack surface is constantly increasing in scope and complexity. Enter Kroll's Threat Lifecycle Management. Our end-to-end solutions for cyber risk help uncover vulnerabilities, validate the effectiveness your defenses, update controls, fine-tune detectors and confidently respond any threat.
  • 2
    groundcover Reviews

    groundcover

    groundcover

    $20/month/node
    32 Ratings
    See Software
    Learn More
    Cloud-based solution for observability that helps businesses manage and track workload and performance through a single dashboard. Monitor all the services you run on your cloud without compromising cost, granularity or scale. Groundcover is a cloud-native APM solution that makes observability easy so you can focus on creating world-class products. Groundcover's proprietary sensor unlocks unprecedented granularity for all your applications. This eliminates the need for costly changes in code and development cycles, ensuring monitoring continuity.
  • 3
    Amazon Cognito Reviews
    Amazon Cognito allows you to quickly add user signup, sign in, and control access to your web and mobile applications. Amazon Cognito supports millions of users. It also supports sign-in with social identity providers such as Amazon, Google, and Amazon. Enterprise identity providers via SAML 2.0 are supported. Amazon Cognito User Pools offer a secure user directory that can scale to hundreds of millions. User Pools can be set up quickly and easily without the need to worry about setting up server infrastructure. Amazon Cognito allows users to sign in via social identity providers like Amazon, Facebook, and Amazon. Enterprise identity providers like Microsoft Active Directory via SAML are also possible. Amazon Cognito User Pools, a standards-based Identity Provider, supports identity and access management standard, such as Oauth 2.0 and SAML 2.0. HIPAA compliant and eligible for PCI DSS, SOC and ISO/IEC 27017. ISO/IEC 27018 and ISO 9001.
  • 4
    Secret Double Octopus Reviews

    Secret Double Octopus

    Secret Double Octopus

    $3/month/user
    SDO offers end-to-end workforce passwordless authentication and desktop MFA solutions for enterprise workforces. The Octopus Authentication Platform plugs into VPNs for more secure remote access, VDI and SSO portals such as Okta SSO, Ping Identity, Microsoft ADFS and ForgeRock. The solution can integrate into Okta Verify or ForgeRock MFA, as well as integrate with Cisco Duo or RSA SecureID. It is the most flexible and complete way to go passwordless in the market today. Password management tools become obsolete in a world where SDO eliminates the password, lowering help desk costs. As a FIDO2-certified server, Secret Double Octopus supports any FIDO2-certified key such as Yubico, Feitian and Google's Titan key. Secret Double Octopus is the perfect next generation authentication solution for Zero Trust network access and re-architecture initiatives.
  • 5
    Privacy1 Reviews

    Privacy1

    Privacy1

    $159 per month
    Privacy1 infrastructure brings transparency, safeguards GDPR | CCPA compliance, builds trust for your business. The solution shields your data centric organizations, lower data leak risks, ensures that no personal data is processed except with the right permission. The service has built in rich features you need to meet data compliance requirements and enforce your organizational data security to the highest level
  • 6
    RadiantOne Reviews
    Transform your existing infrastructure into an asset for the entire company with a platform that makes identity a business enabler. RadiantOne is a cornerstone for complex identity infrastructures. Using intelligent integration, you can improve your business outcomes, security and compliance posture, speed-to-market and more. RadiantOne allows companies to avoid custom coding, rework and ongoing maintenance in order to integrate new initiatives with existing environments. The deployment of expensive solutions is not on time or within budget, which negatively impacts ROI and causes employee frustration. Identity frameworks which cannot scale are a waste of time and resources. Employees struggle to provide new solutions for users. Rigid and static systems cannot meet changing requirements. This leads to duplication of efforts and repeated processes.
  • 7
    Authress Reviews

    Authress

    Rhosys

    $1.10 per month
    Authress, Authorization API to your application. Authorization can be complicated quickly. Even though it seems simple, there are many hidden complications involved in authorization. It is not something you want to do on your own. It takes time to get authorization right. In simple cases, it takes an average of 840 hours to implement authorization logic. This number increases rapidly as you add more features to your app. Your application is your biggest security vulnerability. If you don't have the right skills, your doors are open to malicious attacks. You run the risk of compromising user data, non-compliance to local regulations, and major business losses. Features: Secure authorization API. Instead of creating your own authorization logic, call our API. Written by developers for developers. Granular permissions. Define multiple levels and group them by user role. You can be as specific as you like; Identity provider integrations; Simply call an API to connect any ID provider.
  • 8
    Cyral Reviews

    Cyral

    Cyral

    $50 per month
    All data endpoints have granular visibility and can be enforced with policy enforcement. Designed to support your infrastructure-as-code workflows and orchestration. Your workloads are dynamically scaled with sub-millisecond latency. All your tools work seamlessly with your application. You can enhance cloud security by implementing granular data access policies. Increase zero trust in the data cloud. Protect your company from data breaches. You can increase trust and provide assurance to your customers. Cyral is designed to meet the unique requirements of the data cloud in terms of performance, deployment, and availability. Cyral allows you to see the whole picture. Cyral's data sidecar, a lightweight and stateless interception system that allows real-time observability of all data cloud activity and granular access control, is Cyral. High-performance and scalable interception. You can prevent malicious access and threats to your data that would otherwise go unnoticed.
  • 9
    AWS Secrets Manager Reviews

    AWS Secrets Manager

    Amazon

    $0.40 per month
    AWS Secrets Manager protects secrets that allow you to access your services, applications, and IT resources. This service allows you to easily manage, retrieve, and rotate database credentials, API keys, as well as other secrets, throughout their lifecycle. Secrets Manager APIs can be called by users and applications to retrieve secrets. This eliminates the need to hardcode sensitive data in plain text. Secrets Manager provides secret rotation with integrated integration for Amazon RDS and Amazon Redshift. The service can also be extended to other types secrets, such as API keys and OAuth tokens. Secrets Manager allows you to manage access to secrets with fine-grained permissions. You can also audit secret rotation centrally for resources in AWS Cloud, third party services, and on-premises. AWS Secrets Manager allows you to safely rotate secrets without the need for code deployments.
  • 10
    SecretHub Reviews

    SecretHub

    SecretHub

    $99 per month
    Unified secrets management platform for engineers that can be used by all levels of the stack - from intern to admin - will improve security across the stack. Security risks can be created by putting API keys and passwords in source code. However, they are complex to manage and make deployment difficult. Email, Git, and Slack are meant to share information, not keep secrets. When you deploy software multiple times per week, copy-pasting values and waiting for one admin to hold all the keys doesn't scale. Compliance audits can be difficult because it is impossible to track who accessed which secrets at what times. Replace plaintext values with a reference. This will eliminate secrets from source code. SecretHub will then load secrets into your app automatically when it starts. You can use the CLI to encrypt or store secrets, and then tell the code where to find it. Your code is now unencrypted and can be shared with your entire team.
  • 11
    Confidant Reviews
    Lyft's Confidant is an open-source secret management service that allows users to store and access secrets in a secure manner. Confidant solves both the authentication chicken-and-egg problem by using AWS KMS, IAM to allow IAM role to generate secure authentication tokens which can be verified by Confidant. Confidant also manages KMS grant for your IAM role, which allows IAM roles to generate tokens that are used for service-to–service authentication or to transmit encrypted messages between services. Confidant stores secrets using DynamoDB in an append-only manner. It generates a unique KMS key for each revision of every secret by using Fernet symmetric authenticated encryption. Confidant offers an AngularJS web interface which allows end-users easy access to secrets, the mappings secret to services, and the history of any changes.
  • Previous
  • You're on page 1
  • Next