What Integrates with Amazon Web Services (AWS)?
Find out what Amazon Web Services (AWS) integrations exist in 2025. Learn what software and services currently integrate with Amazon Web Services (AWS), and sort them by reviews, cost, features, and more. Below is a list of products that Amazon Web Services (AWS) currently integrates with:
-
1
Amazon Polly
Amazon
Amazon Polly is a service designed to convert written text into realistic speech, enabling the development of applications that can communicate vocally and fostering the creation of innovative speech-enabled products. Utilizing state-of-the-art deep learning technologies, Polly's Text-to-Speech (TTS) service produces natural-sounding human voices. With a variety of lifelike voices available in numerous languages, developers can create speech-enabled applications that are functional in diverse global markets. Beyond the Standard TTS voices, Amazon Polly also provides Neural Text-to-Speech (NTTS) voices, which enhance speech quality significantly through a novel machine learning technique. In addition, Polly's Neural TTS supports two distinct speaking styles: a Newscaster style designed for news narration and a Conversational style that is perfect for interactive communication scenarios such as telephony. This flexibility allows developers to tailor the auditory experience to fit their specific application needs. -
2
Amazon Simple Notification Service (SNS) is a comprehensive messaging platform designed for both system-to-system and app-to-person (A2P) communications. It facilitates interaction between systems through a publish/subscribe (pub/sub) model, allowing messages to flow seamlessly between independent microservice applications or directly to users via SMS, mobile push notifications, and email. The pub/sub capabilities for system-to-system interactions support topics that enable high-throughput, push-based, many-to-many messaging. By leveraging Amazon SNS topics, your publishing systems can efficiently distribute messages to a wide array of subscriber systems or customer endpoints, including Amazon SQS queues, AWS Lambda functions, and HTTP/S, thus allowing for concurrent processing. Additionally, the A2P messaging feature empowers you to send messages to users on a large scale, utilizing either a pub/sub model or direct-publish messages through a unified API. This flexibility enhances communication strategies for businesses aiming to engage their users effectively.
-
3
Amazon Pinpoint
Amazon
Amazon Pinpoint is a versatile and scalable service designed for both outbound and inbound marketing communications. It enables businesses to engage with their customers through various channels, including email, SMS, push notifications, and voice calls. The platform is user-friendly, making it straightforward to set up and adaptable for a wide range of marketing communication needs. Users can segment their target audience to ensure the right customers receive personalized messages tailored to their interests. Additionally, Amazon Pinpoint provides comprehensive delivery and campaign metrics to help assess the effectiveness of communications. As a service that can expand alongside your business, it has the capability to handle billions of messages daily across different channels. Getting started is simple, requiring just a few clicks within the Amazon Pinpoint interface. Suitable for both marketers and developers, the platform accommodates marketing, bulk, or transactional communication scenarios. Marketers benefit from the ability to visually design, orchestrate, and execute campaigns via the console, while developers can utilize Amazon Pinpoint APIs for tasks such as message dispatching, campaign scheduling, and monitoring user interactions on web and mobile platforms. This dual functionality ensures that both groups can maximize their communication strategies effectively. -
4
Amazon Rekognition
Amazon
Amazon Rekognition simplifies the integration of image and video analysis into applications by utilizing reliable, highly scalable deep learning technology that doesn’t necessitate any machine learning knowledge from users. This powerful tool allows for the identification of various elements such as objects, individuals, text, scenes, and activities within images and videos, alongside the capability to flag inappropriate content. Moreover, Amazon Rekognition excels in delivering precise facial analysis and search functions, which can be employed for diverse applications including user authentication, crowd monitoring, and enhancing public safety. Additionally, with the feature known as Amazon Rekognition Custom Labels, businesses can pinpoint specific objects and scenes in images tailored to their operational requirements. For instance, one could create a model designed to recognize particular machine components on a production line or to monitor the health of plants. The beauty of Amazon Rekognition Custom Labels lies in its ability to handle the complexities of model development, ensuring that users need not possess any background in machine learning to effectively utilize this technology. This makes it an accessible tool for a wide range of industries looking to harness the power of image analysis without the steep learning curve typically associated with machine learning. -
5
Fluentd
Fluentd Project
Establishing a cohesive logging framework is essential for ensuring that log data is both accessible and functional. Unfortunately, many current solutions are inadequate; traditional tools do not cater to the demands of modern cloud APIs and microservices, and they are not evolving at a sufficient pace. Fluentd, developed by Treasure Data, effectively tackles the issues associated with creating a unified logging framework through its modular design, extensible plugin system, and performance-enhanced engine. Beyond these capabilities, Fluentd Enterprise also fulfills the needs of large organizations by providing features such as Trusted Packaging, robust security measures, Certified Enterprise Connectors, comprehensive management and monitoring tools, as well as SLA-based support and consulting services tailored for enterprise clients. This combination of features makes Fluentd a compelling choice for businesses looking to enhance their logging infrastructure. -
6
euBackups
euBackups
$26.75 per monthCloud-hosted, GDPR compliant backups for businesses. Backups of your employees, critical data, and systems are simplified. German servers provide a secure and robust infrastructure. Get your free trial for 30 days. -
7
OpenText Static Application Security Testing (SAST) provides precise identification and remediation of application security flaws directly within source code, helping organizations reduce risks early in development. The platform supports over 33 major programming languages and frameworks, enabling broad language coverage for diverse development environments. It integrates smoothly with widely used CI/CD pipelines and developer tools such as Jenkins, Atlassian Bamboo, Azure DevOps, and Microsoft Visual Studio, ensuring security fits naturally into existing workflows. AI-driven analysis prioritizes vulnerabilities and dramatically reduces false positives by customizing rules and scan depths, speeding up development cycles by up to 25%. OpenText SAST meets compliance benchmarks like OWASP 1.2b, offering developers detailed guidance to efficiently fix issues and improve code quality. Its flexible deployment options include multi-tenant SaaS, private cloud, and on-premises installations, allowing organizations to scale securely and according to their infrastructure needs. Backed by a dedicated Software Security Research team, the solution receives agile updates to stay current with emerging threats. Customers praise the tool for reducing manual code review efforts while increasing vulnerability detection accuracy.
-
8
dbTimer
ecompute
$1.50 per monthRDS databases can be used to save money. dbTimer for AWS allows you to save money by only using your databases when you need them. Schedule timers for each database every day to save computing time. You can restrict access by limiting the times your databases and services are accessible. A unique list of all databases that are running in different regions shows you which ones. Set timers for your databases. Timers can save you hours every day, week, month, and year. A unique list of all databases that have been stopped in any region shows you the results. You can instantly run or stop a database. Find out if there is any CO2 emitted by databases running in the cloud. -
9
SendSafely
SendSafely
$11.50/user/ month SendSafely is a comprehensive end-to-end encryption solution tailored for contemporary businesses. It allows for the effortless sharing of encrypted files and sensitive information across any device, simplifying secure file exchanges. With a focus on security, it is trusted by prominent brands that prioritize the safeguarding of customer data. The platform is compatible with all major web browsers, requiring no software installation or management of encryption keys. Designed to aid in compliance with essential regulations such as HIPAA, GDPR, and CCPA, SendSafely offers a Business Associate Agreement (BAA) for added assurance. Users can choose from various pre-built integrations or create custom solutions using the developer API. The platform includes business-specific features like user management, single sign-on, and options for custom branding. Furthermore, SendSafely connects seamlessly with numerous popular third-party systems, enhancing them with end-to-end encryption. This capability allows businesses to incorporate encryption into their existing workflows, thus extending the functionality of their current applications and infrastructure. In today’s digital landscape, ensuring the security of data exchange is not just a necessity, but a vital component of maintaining trust with clients. -
10
Liongard
Liongard
$29Standardize, secure and scale your IT managed service. Liongard is the only automation platform that gives complete visibility across the stack. This allows you to unleash your team and operate at 10x speed. Logging in manually to manage Internet Domains, SQL servers and all other systems is a tedious task. Unify systems in Liongard for auditing historical data, monitoring critical changes, setting proactive alerts, and reporting across the IT stack. With Liongard's unified platform for automation, you can quickly onboard customers and monitor system changes every day. Liongard's unified platform for automation makes it easier to onboard customers and track system changes daily. Liongard's unified automation platform allows you to access data for business reviews, scoping new project opportunities, and converting customers into Managed Services. Your MSP can be more profitable, efficient, and secure. This includes everything from how you evaluate potential customers to how they protect their systems. Liongard automates the process, minimizing human errors. -
11
Cisco Catalyst SD-WAN
Cisco
Connect users seamlessly to any application from any location, leveraging integrated multi-cloud features, strong security measures, and predictive analytics to ensure your network performs efficiently. Establish a secure access service edge framework built on the reliable structure of Catalyst SD-WAN, which simplifies your IT systems while providing safe connectivity from any point. With automation, multi-cloud functionalities, insightful analytics, predictive capabilities, and robust security, you can concentrate more on driving your business forward. Benefit from the flexibility of multitenancy and multi-region fabric support, whether your deployments are on-premises or cloud-based. Your wide area network (WAN) will effortlessly accommodate the expansion of your network. Enhance security for branches and the cloud, boost communication and collaboration, improve application performance, and ensure streamlined Cloud OnRamp access through this all-encompassing suite of services. Experience the peace of mind that comes with top-notch security measures, allowing for secure connections among individuals across the globe, while also preparing your organization for future growth and challenges. -
12
Tenable Cloud Security
Tenable
The cloud security platform that is actionable. Reduce risk by quickly exposing and closing security gaps caused by misconfigurations. CNAPP solutions replace a patchwork product that can cause more problems than it solves, such as false positives or excessive alerts. These products are often only partially covered and create friction and overhead with the products that they're meant to work with. CNAPPs are the best way to monitor cloud native applications. They allow businesses to monitor cloud infrastructure and application security as a group, rather than monitoring each one individually. -
13
StackStorm
StackStorm
StackStorm seamlessly integrates your applications, services, and workflows into a cohesive system. Whether you're implementing straightforward if/then rules or designing intricate workflows, StackStorm empowers you to tailor your DevOps automation to meet your specific needs. There's no requirement to alter your current processes, as StackStorm works with the tools you already utilize. The strength of a product is often amplified by its community, and StackStorm boasts a vibrant user base worldwide, ensuring you always have access to support and resources. This platform is capable of automating and optimizing almost every aspect of your organization, with several popular use cases. In instances of system failures, StackStorm can serve as your initial support tier, diagnosing issues, resolving known errors, and escalating to human intervention when necessary. Managing continuous deployment can become increasingly intricate, surpassing what Jenkins or other specialized tools offer, but StackStorm allows you to automate sophisticated CI/CD pipelines according to your preferences. Additionally, ChatOps merges automation with teamwork, enhancing the productivity and efficiency of DevOps teams while adding a touch of style to their workflow. Ultimately, StackStorm is designed to evolve with your organization’s needs, fostering innovation and efficiency at every turn. -
14
Drone
Harness
Configuration as code allows for pipelines to be set up using a straightforward and legible file that can be committed to your git repository. Each step in the pipeline runs within a dedicated Docker container, which is automatically retrieved at the time of execution. Drone is compatible with various source code management systems, effortlessly integrating with platforms like GitHub, GitHubEnterprise, Bitbucket, and GitLab. It supports a wide range of operating systems and architectures, including Linux x64, ARM, ARM64, and Windows x64. Additionally, Drone is flexible with programming languages, functioning seamlessly with any language, database, or service that operates in a Docker container, offering the choice of utilizing thousands of public Docker images or providing custom ones. The platform also facilitates the creation and sharing of plugins by leveraging containers to insert pre-configured steps into your pipeline, allowing users to select from hundreds of available plugins or develop their own. Furthermore, Drone simplifies advanced customization options, enabling users to implement tailored access controls, establish approval workflows, manage secrets, extend YAML syntax, and much more. This flexibility ensures that teams can optimize their workflows according to their specific needs and preferences. -
15
ThreatWatch
ThreatWatch
Stay updated on new threats with our real-time, machine-curated threat intelligence. Identify and prioritize potential risks up to three months in advance compared to leading scanning solutions, eliminating the need for redundant scans or agents. Leverage Attenu8, our AI-driven platform, to focus on the most critical threats. Protect your DevOps pipeline from open source vulnerabilities, malware, code secrets, and configuration challenges. Safeguard your infrastructure, network, IoT devices, and other assets by representing them as virtual entities. Effortlessly discover and manage your assets through a straightforward open-source CLI. Decentralize your security functions with immediate alerts. Seamlessly integrate with MSTeams, Slack, JIRA, ServiceNow, and other platforms through our robust API and SDK. Maintain an edge over your adversaries by staying informed about emerging malware, vulnerabilities, exploits, patches, and remediation steps in real-time, powered by our advanced AI and machine-curated threat intelligence. With our solutions, your organization can ensure comprehensive security across all its digital assets. -
16
Qwiet AI
Qwiet AI
FreeThe Fastest Code Analysis. 40X faster scan speeds so developers don't have to wait long for results after submitting a pull request. The Most Accurate Result. Qwiet AI is the only AI with the highest OWASP benchmark score. This is more than triple the commercial average, and more than twice the second highest score. Developer-Centric Security Processes. 96% of developers say that disconnected security and developer workflows hinder their productivity. Implementing developer-centric AppSec workflows decreases mean-time-to-remediation (MTTR), typically by 5X - enhancing both security and developer productivity. Automated Business Logic Flaws in Dev. Identify vulnerabilities unique to your codebase before they reach production. Achieve compliance. Maintain and demonstrate compliance with privacy and security regulations such as SOC 2 PCI-DSS GDPR and CCPA. -
17
beSOURCE
Beyond Security (Fortra)
Use potent code analysis to integrate security into SDLC. Software development must include security. It has not been historically. Static application security testing was used to be separated from Code quality reviews. This resulted in limited impact and value. beSOURCE focuses on the code security of applications and integrates SecOps with DevOps. Other SAST offerings view security as a separate function. Beyond Security has turned this model on its head by adopting the SecOps perspective when addressing security from every angle. Security Standards. beSOURCE adheres all relevant standards. -
18
Logstash
Elasticsearch
Centralize, transform, and store your data seamlessly. Logstash serves as a free and open-source data processing pipeline on the server side, capable of ingesting data from numerous sources, transforming it, and then directing it to your preferred storage solution. It efficiently handles the ingestion, transformation, and delivery of data, accommodating various formats and levels of complexity. Utilize grok to extract structure from unstructured data, interpret geographic coordinates from IP addresses, and manage sensitive information by anonymizing or excluding specific fields to simplify processing. Data is frequently dispersed across multiple systems and formats, creating silos that can hinder analysis. Logstash accommodates a wide range of inputs, enabling the simultaneous collection of events from diverse and common sources. Effortlessly collect data from logs, metrics, web applications, data repositories, and a variety of AWS services, all in a continuous streaming manner. With its robust capabilities, Logstash empowers organizations to unify their data landscape effectively. For further information, you can download it here: https://sourceforge.net/projects/logstash.mirror/ -
19
EC2 Spot
Amazon
$0.01 per user, one-time payment,Amazon EC2 Spot Instances allow users to leverage unused capacity within the AWS cloud, providing significant savings of up to 90% compared to standard On-Demand pricing. These instances can be utilized for a wide range of applications that are stateless, fault-tolerant, or adaptable, including big data processing, containerized applications, continuous integration/continuous delivery (CI/CD), web hosting, high-performance computing (HPC), and development and testing environments. Their seamless integration with various AWS services—such as Auto Scaling, EMR, ECS, CloudFormation, Data Pipeline, and AWS Batch—enables you to effectively launch and manage applications powered by Spot Instances. Additionally, combining Spot Instances with On-Demand, Reserved Instances (RIs), and Savings Plans allows for enhanced cost efficiency and performance optimization. Given AWS's vast operational capacity, Spot Instances can provide substantial scalability and cost benefits for running large-scale workloads. This flexibility and potential for savings make Spot Instances an attractive choice for businesses looking to optimize their cloud spending. -
20
LUCY Security Awareness Training
LUCY Security AG
Train. Phish. Assess. engage. alarm. Lucy Security, a Swiss company, allows organizations to assess and improve their employees' security awareness and test their IT defenses. With our E-Learning platform, hundreds of preconfigured videos, training and quiz, you can turn employees into a human firewall. The most powerful IT Security Awareness Solution on the market. On-Premise or SaaS -
21
Humanitec
Humanitec
Platform engineering is revolutionizing how engineering organizations build and run their cloud-native setups. Humanitec is leading this revolution, providing enteprises with the fastest and most reliable way to build Internal Developer Platforms (IDPs). Humanitec is the leader in the platform engineering space. Named a 2022 Gartner® Cool Vendor, we drive developer productivity by radically simplifying how teams deliver software at scale. Our core product, the Humanitec Platform Orchestrator, is used by mid and large-size engineering organizations, from 100+ developer scale-ups all the way to Fortune 100s. Our OSS workload specification Score lets developers describe their workloads and dependencies as code. The Platform Orchestrator dynamically generates app and infra configurations with every new deployment, driving standardization across the entire software delivery lifecycle. This means no more ticket ops or waiting times for developers, resulting in 4x higher deployment frequency and 30% faster time to market. As a SaaS provider, Humanitec takes information security very seriously. We’re ISO 27001 certified and constantly strive to protect data while adhering to the industry’s best security practices. -
22
One-IoT Device Management
Friendly Technologies
Friendly's One IoT Device Management allows for the remote oversight of various IoT devices, including those with intricate data models and limited capability, utilizing standard protocols like LwM2M, OMA-DM, MQTT, CoAP, TR-369 USP TR-069, among others. This solution facilitates automated initialization and remote administration of IoT devices, featuring an Admin Portal, a Technician Portal, a Quality of Experience (QoE) Dashboard, Business Intelligence (BI), and Big Data Analytics, along with a comprehensive API for tailoring vertical applications. Additionally, Friendly offers an App generator module that simplifies the creation and updating of custom applications without the need for programming skills. Moreover, Friendly's One-IoT™ Device Management can be deployed through private cloud, public cloud, or directly on the customer's site, providing flexibility to suit various operational needs. This adaptability ensures that users can effectively manage their IoT ecosystem in a way that aligns best with their infrastructure requirements. -
23
Ivanti vADC
Ivanti
Impress your users with applications that are not only faster and more dependable but also maintain high standards of performance and security. Ivanti vADC transcends the typical software load balancer by managing a greater volume of transactions, even during peak times, while ensuring consistent uptime and real-time monitoring of application traffic for security purposes. By improving customer experience with more appealing and responsive services, you can also drive business growth. Furthermore, you can enhance system efficiency and elevate the throughput of application servers and security by as much as 50%. Cost-effectiveness is achieved through flexible capacity-based licensing options. Specifically designed for virtualization and cloud portability, Ivanti vADC offers unmatched scalability and adaptability, boosting application performance and security across a diverse array of environments, including physical and virtual data centers, as well as public and hybrid clouds. Ultimately, this solution equips businesses to thrive in an increasingly digital landscape. -
24
Aptible
Aptible
Aptible provides a seamless solution to implement the essential security measures required for regulatory compliance and customer audits. With its Aptible Deploy feature, you can effortlessly maintain adherence to compliance standards while fulfilling customer audit expectations. The platform ensures that your databases, traffic, and certificates are securely encrypted, meeting all necessary encryption mandates. Data is automatically backed up every 24 hours, and you have the flexibility to initiate a manual backup whenever needed, with a straightforward restoration process that takes just a few clicks. Moreover, comprehensive logs for every deployment, configuration alteration, database tunnel, console operation, and session are generated and preserved. Aptible continuously monitors the EC2 instances within your stacks, looking out for potential security threats such as unauthorized SSH access, rootkit infections, file integrity issues, and privilege escalation attempts. Additionally, the dedicated Aptible Security Team is available around the clock to promptly investigate and address any security incidents that may arise, ensuring your systems remain safeguarded. This proactive approach allows you to focus on your core business while leaving security in expert hands. -
25
Odus
Odus
$45 per monthEnhance your communication efficiency by automating calls and messages through human-like robots, which can significantly cut costs, boost sales, and achieve over a 25% conversion rate in voice interactions without requiring any coding skills. With the innovative DCT solution (Dialogue Contextualization Technology) by Odus.ai, you can virtually eliminate the need for support agents, achieving a remarkable 99% efficiency. This isn't just a promise; you can automate your calls in just two days using our intuitive Dialogue Builder, which only requires you to prepare 30+ questions for each topic. Don't waste valuable time gathering excessive data; the unique modular design of Odus enables you to develop any necessary software integration within a week, whether on our SaaS platform or via an on-premises solution. Additionally, you can create chatbots and explore various possibilities without limitations, available across channels like Web-widget, Messenger, Telegram, Viber, or even your custom mobile app and website widget. You have the flexibility to cancel your subscription at any time, with a simple month-to-month payment commitment. Moreover, benefit from robust analytics that provide insights into scenarios, conversion rates, and dialogue performance, empowering you to refine your strategies effectively. This comprehensive approach ensures that your communication processes are not only automated but also optimized for maximum impact. -
26
QuantRocket
QuantRocket
QuantRocket is a Python-based platform for researching, backtesting, and trading quantitative strategies. Built on Docker, QuantRocket can be deployed locally or to the cloud and has an open architecture that is flexible and extensible. It provides a JupyterLab environment, offers a suite of data integrations, and supports multiple backtesters: Zipline, the open-source backtester that originally powered Quantopian; Alphalens, an alpha factor analysis library; Moonshot, a vectorized backtester based on pandas; and MoonshotML, a walk-forward machine learning backtester. -
27
HashiCorp Vault
HashiCorp
Ensure the protection, storage, and stringent management of tokens, passwords, certificates, and encryption keys that are essential for safeguarding sensitive information, utilizing options like a user interface, command-line interface, or HTTP API. Strengthen applications and systems through machine identity while automating the processes of credential issuance, rotation, and additional tasks. Facilitate the attestation of application and workload identities by using Vault as a reliable authority. Numerous organizations often find credentials embedded within source code, dispersed across configuration files and management tools, or kept in plaintext within version control systems, wikis, and shared storage. It is crucial to protect these credentials from being exposed, and in the event of a leak, to ensure that the organization can swiftly revoke access and remedy the situation, making it a multifaceted challenge that requires careful consideration and strategy. Addressing this issue not only enhances security but also builds trust in the overall system integrity. -
28
Sophos Cloud Optix
Sophos
Gain comprehensive visibility into assets and network traffic across AWS, Azure, and Google Cloud, while employing risk-based prioritization to address security concerns with facilitated remediation. Streamline the management of expenses for various cloud services by monitoring them all on one interface. Automatically detect and assess risks related to security and compliance, receiving contextual alerts that categorize affected resources, along with detailed steps for remediation and guided responses. Enhance your oversight by tracking cloud services side by side on a single screen, while also obtaining independent recommendations aimed at minimizing costs and spotting potential indicators of compromise. Automate compliance evaluations to save significant time by quickly mapping Control IDs from broader compliance tools to Cloud Optix, resulting in the generation of audit-ready reports with ease. Additionally, effortlessly integrate security and compliance checks at any phase of the development pipeline to identify misconfigurations, as well as embedded secrets, passwords, and keys that could pose security threats. This comprehensive approach ensures that organizations remain vigilant and proactive in their cloud security and compliance efforts. -
29
Kamzan
Kamzan
A comprehensive cloud suite designed for business digitization, collaboration, and data sharing. We offer a Private Cloud tailored specifically for your needs, ensuring a unique technological infrastructure that stands apart from others to reduce the likelihood of data breaches. Your data is securely housed within the European Union, specifically in a Data Center located in Germany, compliant with CISPE standards. Each piece of data is encrypted with distinct keys assigned to individual private clouds, and the underlying database that supports our service is also protected through encryption. The communication protocol we utilize is fortified by a unique TLS 1.3 certificate tailored for each client, enhancing security further. Furthermore, we maintain a distinctly European supply chain and provide a contract that explicitly states that no profiling will occur, and that your data will never be sold or shared with third parties, ensuring that the complete intellectual and physical ownership of the data remains with your company. This commitment to data integrity and privacy is fundamental to our service offering, allowing clients to operate with peace of mind. -
30
Expel
Expel
We make it possible for you to do the things you love about security, even if you don't think about it. Managed security: 24x7 detection and response. We detect and respond immediately to attacks. Recommendations can be specific and data-driven. Transparent cybersecurity. No more MSSPs. No "internal analysts console." No curtain to hide behind. No more wondering. Full visibility. You can see and use the exact same interface that our analysts use. You can see how we make critical decisions in real time. You can watch the investigations unfold. We'll provide you with clear English answers when we spot an attack. You can see exactly what our analysts do, even while an investigation is underway. You can choose your security tech. We make it more efficient. Resilience recommendations can significantly improve your security. Our analysts make specific recommendations based upon data from your environment and past trends. -
31
AT&T Managed Threat Detection and Response
AT&T
$6,695 per monthAT&T Managed Threat Detection and Response ensures your organization’s safety through continuous security monitoring, leveraging the expertise of AT&T Cybersecurity and our award-winning USM platform alongside AT&T Alien Labs™ for advanced threat intelligence. With round-the-clock proactive monitoring and investigation provided by the AT&T Security Operations Center (SOC), our skilled analysts utilize years of managed security experience to safeguard your business from sophisticated threats at all hours. The Unified Security Management (USM) platform combines various security functionalities into a single, cohesive system, surpassing other Managed Detection and Response (MDR) offerings by delivering centralized visibility across your cloud environments, networks, and endpoints. This approach not only facilitates early and effective threat detection but also ensures a swift response time. Enhanced by the unmatched visibility of the AT&T IP backbone and a global network of USM sensors, AT&T Alien Labs continuously supplies tactical threat intelligence to the USM platform, ensuring your organization remains vigilant against evolving risks. As cyber threats become increasingly sophisticated, having access to such comprehensive intelligence is vital in maintaining your organization’s security posture. -
32
GoSecure
GoSecure
Organizations looking to stay above the crowd, stop reacting and be in control. Companies looking to enter the continuous improvement process and optimize their investments. Through GoSecure Titan®'s Managed Security Services (which includes our Managed Extended Detection & Response (MXDR) Service) and our Professional Security Services, we are your ally to prevent breaches. -
33
Nexpose
Rapid7
Vulnerability management tools are essential for responding effectively at the moment a threat arises. With new vulnerabilities emerging daily, it's crucial to have ongoing intelligence that enables you to identify, locate, and prioritize these risks for your organization while ensuring that your exposure is minimized. Nexpose, the on-premises solution from Rapid7, provides real-time monitoring of vulnerabilities and continuously updates its data to adapt to the latest threats, allowing for immediate action when necessary. For those seeking enhanced features like Remediation Workflow or the universal Insight Agent, InsightVM offers a robust platform for vulnerability management. How current is your information? Is it outdated by days or even weeks? With Nexpose, you can rest assured that you're working with data that is never more than a few seconds old, delivering a dynamic view of your ever-evolving network landscape. This immediacy not only enhances your response capabilities but also strengthens your overall security posture. -
34
Ensure your network is safeguarded against DDoS threats at both the network and application layers with a solution that offers flexibility and scalability suitable for inline, out-of-band, and hybrid configurations. Conventional DDoS mitigation strategies tend to address only a limited array of attack vectors, which leads to several shortcomings: methods like black-holing or rate-limiting often hinder legitimate users during network layer (or flood) attacks. Additionally, these solutions fail to recognize SSL traffic and are susceptible to their positioning within the network during application layer onslaughts. On-premises protective measures become ineffective when WAN bandwidth saturation disrupts Internet access. Thankfully, the F5 BIG-IP DDoS Hybrid Defender delivers a more robust defense mechanism. It stands out as the sole multi-layered protection that effectively counters combined network and sophisticated application attacks while offering complete SSL decryption, anti-bot functionalities, and advanced detection techniques, all integrated into a single appliance. This comprehensive approach ensures not only enhanced security but also seamless user experiences even amidst evolving threat landscapes.
-
35
Cloud-based DDoS protection provides a powerful solution that identifies and neutralizes attacks prior to impacting your network infrastructure. In these unpredictable times, it's essential to ensure your organization remains secure with this proactive defense that intercepts threats before they can reach you. The F5 Distributed Cloud DDoS Mitigation Service offers a comprehensive, managed protection option that addresses large-scale, SSL, or application-specific assaults in real time, safeguarding your business from attacks that can surpass even hundreds of gigabits per second. Additionally, the F5 Security Operations Center (SOC) stands ready to defend your enterprise, constantly monitoring and responding to potential threats to maintain your security. With such robust measures in place, you can focus on your core business activities without the looming fear of cyber disruptions.
-
36
Layer7 Live API Creator
Broadcom
Accelerate the transition from concept to implementation by swiftly launching APIs with secure, low-code development and microservice creation. The Layer7 Live API Creator, which was previously known as CA Live API Creator, can function independently or in conjunction with Layer7 API Management. It allows developers to utilize a visual interface, facilitating quicker API development and microservice generation while enabling the creation of new data schemas or the integration of existing data sources and systems. This tool empowers business users to design APIs without requiring extensive technical expertise. By significantly reducing the time needed to establish data processing systems, it enhances agility. Additionally, the application of reactive logic rules across various data sources simplifies the enforcement of business policies and security measures. The integration of reactive logic is seamlessly ordered, chained, and executed through events and Webhooks, providing opportunities for enhancement and extension using JavaScript or Java. This results in improved data exploration and transaction processing capabilities. Furthermore, Layer7 Live API Creator offers a customizable user interface that is dynamically generated based on the data schema, allowing for a tailored experience that meets specific user needs. Ultimately, this solution not only streamlines API development but also empowers organizations to respond rapidly to changing business demands. -
37
Qualys WAF
Qualys
Qualys Web Application Firewall (WAF) is a service based on virtual appliances designed to streamline application security while minimizing operational costs and complexity. Utilizing a cohesive platform, it consistently identifies threats using proprietary inspection logic and rulesets, and can provide virtual patches for web application vulnerabilities as necessary. Its straightforward, scalable, and flexible methodology enables rapid blocking of web application attacks, safeguarding sensitive information from exposure, and regulating access to your applications. Qualys WAF can function independently or in conjunction with Qualys Web Application Scanning (WAS), which enhances the process of discovering and addressing web application vulnerabilities efficiently, regardless of whether you manage a few applications or many. By employing Qualys WAS for scanning and enabling one-click virtual patches for any identified vulnerabilities in the WAF, users can oversee everything from a centralized cloud portal, ensuring seamless management. Moreover, the deployment of Qualys WAF can be completed in just minutes, and it offers support for SSL/TLS, further enhancing its security capabilities. This combination of features makes it a robust solution for protecting web applications in today’s ever-evolving threat landscape. -
38
Virtana Platform
Virtana
Before transitioning to the public cloud, it's essential to utilize an AI-driven observability platform that enables you to manage costs, enhance performance, monitor your systems, and ensure uptime across various environments, including data centers and both private and public clouds. Enterprises often grapple with the critical question of which workloads to migrate and how to mitigate unforeseen expenses and performance drops after moving to the cloud. The Virtana unified observability platform offers a solution by facilitating migration and optimization across hybrid, public, and private cloud landscapes. This comprehensive platform gathers precise data and leverages AIOps technologies—such as machine learning and sophisticated data analytics—to deliver intelligent insights on individual workloads, empowering organizations to make informed decisions regarding their migration strategy. By harnessing this platform, businesses can effectively navigate the complexities of cloud migration while adhering to performance standards and optimizing their overall infrastructure. -
39
Densify
Densify
Densify offers a cutting-edge Cloud and Container Resource Management Platform that utilizes machine learning to enable cloud and container workloads to accurately assess their resource needs, fully automating the management of these resources. With Densify, CloudOps teams can ensure that applications consistently receive the optimal resources necessary while minimizing expenses. There’s no need for software installations, complicated implementations, or extensive training—just results. Recognized as a top-tier solution with a rating of “9.5/10, spectacular” by ZDnet, Densify underscores that effective optimization relies on highly precise analytics that stakeholders can trust and act upon. It fosters collaboration and transparency among Finance, Engineering, Operations, and application owners, promoting ongoing cost optimization efforts. Moreover, it seamlessly integrates with your existing ecosystem to support the processes and systems essential for confident optimization strategies, creating a comprehensive framework for resource management. -
40
Cloudamize
Cloudamize
$11/Server Cloudamize simplifies cloud migrations. Get to the cloud faster and with greater accuracy. Cloudamize simplifies cloud migration and transforms it. We are proud to have helped over 1,000 companies navigate the cloud transition and we are confident that we can help you with your cloud initiatives. Cloud TCO Assessment will help you create a business case to accelerate your cloud migration strategy. High-precision analytics can simplify cloud complexities and provide peace of mind for migration planning. Cloud Migration Planning helps you to create a detailed plan for migrating workloads to the best-fit cloud service. Multi-cloud migration can be accelerated to the CSP you choose with our multi-cloud approach. Connecting your business with the power of the top public cloud providers around the world. We can help you make the right decisions about your application portfolio, and create the best cloud operating model for your company. -
41
AWS Snowball
Amazon
Speed up the transfer of offline data or remote storage to the cloud seamlessly. Migrate vast amounts of data, reaching petabytes, to the cloud with no restrictions on storage capacity or computing resources. Enhance application performance in challenging edge environments that lack connectivity and handle computational tasks even with limited access to networks. Safeguard your data while it is being transferred using Snowball's durable design, built-in logistics, and secure, tamper-evident packaging, ensuring efficient delivery to the intended destination. Within the AWS Snowball console, choose your desired device, which could be either the AWS Snowball Edge Compute Optimized or the AWS Snowball Edge Storage Optimized. Initiate a job linked to an Amazon S3 bucket, opt for Amazon Simple Notification Service (Amazon SNS) to monitor progress, and set up configurations such as Amazon EC2 AMIs. AWS will then prepare and dispatch the selected device to your location. Upon receipt, power on the device and utilize AWS OpsHub to unlock it for use. Connect the device to your local area network, and leverage AWS OpsHub to manage it, facilitate data transfers, or launch EC2 instances as needed. This streamlined process ensures that your data migration is not only efficient but also secure and straightforward. -
42
Dusk IOP
Dusk Mobile
Dusk IOP, proudly Australian owned and operated, unites teams and data to enhance operational efficiency. By leveraging visibility, actionable insights, intelligence, and automation, it empowers your field workforce, back office, and customers to collaborate seamlessly within a unified digital environment. The platform excels in workforce scheduling, project management, and streamlined workflows, establishing a new standard for automation, compliance, safety, and transparency. With a single-view system that integrates effortlessly with your existing infrastructure, you can easily manage resources or teams using drag-and-drop dispatch and reassign tasks with just a click. It comes equipped with built-in constraints for skills, shifts, locations, and more to ensure optimal planning. Additionally, Dusk IOP facilitates the management of Agile projects, offering notifications and multiple viewing options, including Gantt, Task View, Kanban, and a dynamic risk matrix, thus enhancing project efficiency. You can also digitize your paper forms from your virtual workspace, making processes smoother and more effective. By gaining a clear understanding of actual job costs—which encompass tool time, travel time, and allowances—you can significantly boost your profitability and make informed decisions for future projects. -
43
Organizations are increasingly turning to containerized environments to accelerate application development. However, these applications still require essential services like routing, SSL offloading, scaling, and security measures. F5 Container Ingress Services simplifies the process of providing advanced application services to container deployments, facilitating Ingress control for HTTP routing, load balancing, and enhancing application delivery performance, along with delivering strong security services. This solution seamlessly integrates BIG-IP technologies with native container environments, such as Kubernetes, as well as PaaS container orchestration and management systems like RedHat OpenShift. By leveraging Container Ingress Services, organizations can effectively scale applications to handle varying container workloads while ensuring robust security measures are in place to safeguard container data. Additionally, Container Ingress Services promotes self-service capabilities for application performance and security within your orchestration framework, thereby enhancing operational efficiency and responsiveness to changing demands.
-
44
Mirantis Kubernetes Engine
Mirantis
Mirantis Kubernetes Engine (formerly Docker Enterprise) gives you the power to build, run, and scale cloud native applications—the way that works for you. Increase developer efficiency and release frequency while reducing cost. Deploy Kubernetes and Swarm clusters out of the box and manage them via API, CLI, or web interface. Kubernetes, Swarm, or both Different apps—and different teams—have different container orchestration needs. Use Kubernetes, Swarm, or both depending on your specific requirements. Simplified cluster management Get up and running right out of the box—then manage clusters easily and apply updates with zero downtime using a simple web UI, CLI, or API. Integrated role-based access control (RBAC) Fine-grained security access control across your platform ensures effective separation of duties, and helps drive a security strategy built on the principle of least privilege. Identity management Easily integrate with your existing identity management solution and enable two-factor authentication to provide peace of mind that only authorized users are accessing your platform. Mirantis Kubernetes Engine works with Mirantis Container Runtime and Mirantis Secure Registry to provide security compliance. -
45
Keeni
Keeni
Our aim is to establish a comprehensive platform that facilitates the standardization and sharing of operating procedures, ultimately enhancing the performance of diverse teams across the globe. We are dedicated to demystifying complexities by empowering anyone to create and execute standard operating procedures from any location, at any time, and on any device. With Keeni's software for standard operating procedures, you can transform your PDF, Word, and Google Docs into collaborative digital workflows that enhance business processes. The transition to digitized workflows using cutting-edge software lays the groundwork for automating processes within an organization. By utilizing Keeni, you can easily upload or import your PDF, Word, and Google Docs, converting them into effective digital workflows. Successful companies are minimizing human error by adopting systematic processes and focusing on continuous improvement in their everyday operations. Keeni supports organizations in evolving from reliance on paper documents and spreadsheets to a more collaborative and methodical approach to team procedures, leading to greater efficiency and productivity. In doing so, businesses can foster innovation and adaptability in a rapidly changing environment. -
46
BOSS811
BOSS Solutions
BOSS811 is a cloud-based management system designed specifically for the damage prevention sector. This platform enhances operational efficiency, lowers expenses, and is user-friendly, allowing governmental and public works entities to oversee excavation requests seamlessly. Its features encompass compliance management and work order oversight, supplemented by customizable dashboards and extensive reporting options. Additionally, BOSS Solutions offers a highly-regarded help desk software solution that can be utilized both in the cloud and on-premise. The reporting functionalities include a wide range of standard reports and visual charts, while customizable widgets enable users to tailor their dashboards to suit diverse requirements. The BOSS811 mobile applications for iOS and Android empower users and locators to respond to locate requests and monitor status and reports while on the move. Furthermore, the platform's sketching tools allow for the annotation of uploaded images with pertinent site details. BOSS811 operates on Amazon servers located within the United States and boasts the capability to automatically scale resources as needed, ensuring reliability and performance. As a result, users can confidently manage their tasks without concern for system limitations. -
47
Ticked Off
Ticked Off
$7 per monthTicked Off is a repair and maintenance platform for your business that allows you to manage all support services - assets, contractors as well as programmed maintenance, repairs, and safety - in one easy to use platform. It can be used on any device. You can save your business time and money today by allowing for customizable approvals, site limits, job tracking, and scheduled preventative maintenance. With unparalleled reporting, you can make confident and informed decisions to prepare your business for tomorrow. More than a ticketing system. You can manage repairs and maintenance from anywhere. Assets, contractors and programmed maintenance are all available in one platform. There is a smarter way of doing repairs and maintenance. Your entire team can connect to gain insights that will help you save time and money. All your maintenance needs, including contractors, assets, repairs, reporting, safety, and more, are covered in one easy-to-use platform. -
48
Starburst Enterprise
Starburst Data
Starburst empowers organizations to enhance their decision-making capabilities by providing rapid access to all their data without the hassle of transferring or duplicating it. As companies accumulate vast amounts of data, their analysis teams often find themselves waiting for access to perform their evaluations. By facilitating direct access to data at its source, Starburst ensures that teams can quickly and accurately analyze larger datasets without the need for data movement. Starburst Enterprise offers a robust, enterprise-grade version of the open-source Trino (formerly known as Presto® SQL), which is fully supported and tested for production use. This solution not only boosts performance and security but also simplifies the deployment, connection, and management of a Trino environment. By enabling connections to any data source—be it on-premises, in the cloud, or within a hybrid cloud setup—Starburst allows teams to utilize their preferred analytics tools while seamlessly accessing data stored in various locations. This innovative approach significantly reduces the time taken for insights, helping businesses stay competitive in a data-driven world. -
49
Gitpod
Gitpod
$9 per user per monthYour dev environments can be described as code to automate the last piece of your DevOps process. You can create new, task-based environments for every issue, branch, merge/pull request. GitOps is the new way to achieve a higher level of productivity. All application code, configuration, and infrastructure should be stored in machine-executable code in your Git repositories. This code can then be applied to dev environments continuously and automatically. Prebuilds were created to solve this problem. Gitpod doesn't require a powerful laptop to code. It works on a Chromebook and iPad. You only need a browser. Gitpod centralizes all source codes and never stores them on insecure machines or networks. Gitpod is a Kubernetes multi-service Kubernetes app that we developed in Gitpod. You can code, build, debug, and run K8s apps entirely in the cloud. Fully-baked workspaces are available for every branch or pull/merge request. They are pre-configured and connected to their own K8s deployment. -
50
Macrometa
Macrometa
We provide a globally distributed real-time database, along with stream processing and computing capabilities for event-driven applications, utilizing as many as 175 edge data centers around the world. Developers and API creators appreciate our platform because it addresses the complex challenges of managing shared mutable state across hundreds of locations with both strong consistency and minimal latency. Macrometa empowers you to seamlessly enhance your existing infrastructure, allowing you to reposition portions of your application or the entire setup closer to your end users. This strategic placement significantly boosts performance, enhances user experiences, and ensures adherence to international data governance regulations. Serving as a serverless, streaming NoSQL database, Macrometa encompasses integrated pub/sub features, stream data processing, and a compute engine. You can establish a stateful data infrastructure, create stateful functions and containers suitable for prolonged workloads, and handle data streams in real time. While you focus on coding, we manage all operational tasks and orchestration, freeing you to innovate without constraints. As a result, our platform not only simplifies development but also optimizes resource utilization across global networks.