Bitcanopy Description

Automated AWS security. AWS infrastructure insight and remediation performed by experts. Ensure that AWS Config has been enabled in all regions. Identify and block S3 public read/write/full access. Automated enforcement of S3 volumes and objects encryption. Stop login from an invalid IP address. Stop non-compliant dev resources. Eliminate unused elastic load balancers. Apply IP restriction policy to AWS resources automatically. Remove any internet-facing ELBs. Pre-defined policies only allow certain ports to remain open. RDS - Terminate unencrypted public instances. Monitoring and remediating your infrastructure against 100+ such rules, which include compliance with AWS CIS benchmarks as well as AWS Best Practices.

Pricing

Pricing Starts At:
$75 per month
Free Version:
Yes
Free Trial:
Yes

Integrations

Reviews

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Company Details

Company:
Bitcanopy
Year Founded:
2016
Headquarters:
United States
Website:
www.bitcanopy.com

Media

Bitcanopy Screenshot 1
Recommended Products
Get Advanced Threat Protection for Your Azure Workloads Icon
Get Advanced Threat Protection for Your Azure Workloads

FortiGate NGFW on Azure Enables You to Protect Your Workloads Beyond Basic Azure Security Services

FortiGate NGFW identifies and stops advanced threats with powerful application control, malware protection, web filtering, antivirus, and IPS technology. As the attack surface expands, FortiGate provides integrated and automated protection against emerging and sophisticated threats while securing hybrid or multi-cloud environments. Deploy today in Azure Marketplace.

Product Details

Platforms
SaaS
Type of Training
Documentation
Live Online
Customer Support
Phone Support
Online

Bitcanopy Features and Options

Cloud Management Software

Access Control
Billing & Provisioning
Capacity Analytics
Cost Management
Demand Monitoring
Multi-Cloud Management
Performance Analytics
SLA Management
Supply Monitoring
Workflow Approval

Cloud Security Software

Antivirus
Application Security
Behavioral Analytics
Encryption
Endpoint Management
Incident Management
Intrusion Detection System
Threat Intelligence
Two-Factor Authentication
Vulnerability Management