What is Amazon Detective?

Analyze and visualize security information to quickly identify the root causes of possible security threats. Amazon Detective streamlines the analysis process, allowing for efficient investigation and rapid identification of security issues or suspicious activities. By automatically collecting log information from your AWS resources, it employs machine learning, statistical methods, and graph theory to generate an interconnected dataset, which aids in faster and more effective security assessments. Complementary AWS security tools, such as Amazon GuardDuty, Amazon Macie, and AWS Security Hub, as well as external security applications, play a crucial role in identifying potential vulnerabilities or alerts. These tools are essential for detecting anomalies and helping direct you toward the appropriate remediation steps. Nevertheless, there may be situations where a security alert necessitates a more in-depth examination of the data to accurately identify and address the root cause prior to implementing corrective actions. Consequently, leveraging a combination of these services can significantly strengthen your overall security framework and enhance your ability to respond to threats effectively. In doing so, organizations can create a more resilient security environment, ultimately reducing the risk of data breaches.

Pricing

Free Trial Offered?:
Yes

Screenshots and Video

Amazon Detective Screenshot 1

Company Facts

Company Name:
Amazon
Date Founded:
1994
Company Location:
United States
Company Website:
aws.amazon.com/detective/

Product Details

Deployment
SaaS
Training Options
Documentation Hub
Support
Web-Based Support

Product Details

Target Company Sizes
Individual
1-10
11-50
51-200
201-500
501-1000
1001-5000
5001-10000
10001+
Target Organization Types
Mid Size Business
Small Business
Enterprise
Freelance
Nonprofit
Government
Startup
Supported Languages
English

Amazon Detective Categories and Features

Network Security Software

Access Control
Analytics / Reporting
Firewalls
Internet Usage Monitoring
Intrusion Detection System
Threat Response
VPN
Vulnerability Scanning

IT Security Software

Anti Spam
Anti Virus
Email Attachment Protection
Event Tracking
IP Protection
Internet Usage Monitoring
Intrusion Detection System
Spyware Removal
Two-Factor Authentication
Vulnerability Scanning
Web Threat Management
Web Traffic Reporting