

Cloud Infrastructure Security
Full-spectrum security for your cloud infrastructure

AWS
Amazon Web Services
Deep coverage across EC2/EKS/Lambda with IAMgraph analysis, S3 posture, VPC flow analytics, andGuardDuty/Security Hub signals.
EC2
EKS
Lambda
S3
RDS
IAM

Cloud
Alibaba Cloud
ECS/ACK visibility, RAM/IAM evaluation, OSS & RDS posture checks, plus Function Compute runtime insights for regulated workloads.
ECS
ACK
Function Compute
OSS
RDS
RAM

Azure
Microsoft Azure
Protect VMs/AKS/Functions; evaluate Storage & Key Vault posture; integrate Defender for Cloud and AAD conditional-access hygiene.
VMs
AKS
Functions
Blob Storage
SQL
AAD

Cloud
Oracle Cloud
Compute/OKE/Functions with Object Storage & Database posture; IAM and network segmentation analysis across compartments.
Compute
OKE
Functions
Object Storage
Database
IAM

Cloud
Google Cloud
GKE & Cloud Run controls, SCC findings ingestion, VPC/NAT telemetry, Artifact/Container Analysis, and IAM policy-drift alerts.
Compute
GKE
Cloud Run
Storage
SQL
IAM
Cloud Security Platforms
Industry-leading platforms for complete cloud protection

Wiz
Cloud Security Platform
Agentless CNAPP for unified cloud risk and identity visibility.
Most Comprehensive
Cloud Security Posture Management
Kubernetes Security
Vulnerability Management
Cloud Network Security
Unified Cloud Security & Risk Visibility
Comprehensive Protection Across Workloads

Orca
Agentless Cloud Security
SideScanning™ Agentless Visibility for Multi-Cloud Risk and Posture
Agentless Leader
Agentless Workload Scanning
SideScanning Technology
Compliance Automation
Threat Detection
Agentless Multi-Cloud Security & Visibility
Automated Compliance & Threat Detection

Upwind
Runtime-Powered CNAPP
Runtime context + posture for attack-path analysis, Kubernetes protection, and risk reduction.
Runtime Intelligence
Runtime Security Context
CNAPP Platform
Kubernetes Protection
Attack Path Analysis
Runtime-Powered Cloud Security
Kubernetes & Application Protection

GCP
Security Command Center
Google Cloud’s native risk platform with asset inventory, findings, and threat detection.
GCP Native
Asset Discovery & Inventory
Vulnerability Detection
Security Analytics
Event Threat Detection
Centralized Cloud Risk Management
Integrated Threat Detection & Analytics
Cloud Infrastructure Security
Full-spectrum security for your cloud infrastructure
Advanced Cloud Security Implementation
Advanced security controls for enterprise cloud environments
Cloud Intrusion Detection System (IDS)
Network-based IDS for VPC/VNet traffic analysis
Host-based IDS for workload telemetry
ML-powered anomaly detection & baselining
Real-time alert correlation & dedup
SIEM/SOAR integrations (Splunk, QRadar, Chronicle)
IAM & Identity Governance
Privileged access management (PAM)
Just-in-time (JIT) access provisioning
Behavior-based identity analytics
RBAC right-sizing and least-privilege
Service account lifecycle controls
Cloud DDoS Protection
L3/L4 volumetric attack mitigation
L7 application protection & WAF rules
Global scrubbing centers & anycast
Auto-scaling defense mechanisms
CDN-integrated protections
Network Traffic Analysis
Risk Scoring
Workload Protection
Threat Intelligence
Container Security
Automated Response
Identity Governance
Security Dashboards
Data Encryption & DLP
Incident Response
Security Orchestration
Secrets Management
