Aptible Description

Aptible automatically implements security controls that you need to comply with regulatory requirements and pass customer audits. Out-of-the box compliance. Aptible Deploy allows you to automatically meet and maintain customer audit requirements and regulatory compliance. Deploy includes everything you need to meet encryption standards so that your traffic, certificates, and databases are protected. Every 24 hours, automatic backups are made of your data. You can easily trigger a manual backup anytime, and then restore it in just a few clicks. Logs are created and backed-up for every deploy, config modification, database tunnel, console operation, as well as session. Aptible monitors your EC2 instances for potential intrusions such as rootkits, file integrity problems, unauthorized SSH access, privilege escalation, file integrity issues and file integrity issues. Aptible Security Team is available 24/7 to assist you in resolving any issues that may arise.

Pricing

Free Version:
Yes

Integrations

API:
Yes, Aptible has an API

Reviews

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Company Details

Company:
Aptible
Year Founded:
2013
Headquarters:
United States
Website:
www.aptible.com

Media

Aptible Screenshot 1
Recommended Products
Our Free Plans just got better! | Auth0 by Okta Icon
Our Free Plans just got better! | Auth0 by Okta

With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your secuirty. Auth0 now, thank yourself later.
Try free now

Product Details

Platforms
SaaS
Type of Training
Documentation
Webinars
Customer Support
24/7 Live Support
Online

Aptible Features and Options

Container Security Software

Access Roles / Permissions
Application Performance Tracking
Centralized Policy Management
Container Stack Scanning
Image Vulnerability Detection
Reporting
Testing
View Container Metadata

HIPAA Compliance Software

Access Control / Permissions
Audit Management
Compliance Reporting
Data Security
Documentation Management
For Healthcare
Incident Management
Policy Training
Remediation Management
Risk Management
Vendor Management

Aptible Lists

Aptible User Reviews

Write a Review
  • Previous
  • Next