Listing Thumbnail

    Uptycs CNAPP

     Info
    Sold by: Uptycs 
    Deployed on AWS
    Vendor Insights
    Quick Launch
    Uptycs is an AWS Security partner with Security Software and Container Security Competencies. We offer customers security context and choice. Deployment options meet customer telemetry and scaling needs across more than 40 AWS services including: Compute (EC2, EBS, ELB, Lambda), Containers (ECR, ECS, EKS), Storage (S3, EFS, S3 Glacier), Database (RDS, ElastiCache), Networking & Content Delivery (VPC, CloudFront, Route 53, API Gateway), Developer Tools (CodeCommit, CodeDeploy, CodePipeline, CodeBuild), Management & Governance (Organizations, CloudWatch, CloudFormation, CloudTrail, Config, ServiceCatalog, Systems Manager), Analytics (Redshift, ElasticSearch, Kinesis), Security, Identity, Compliance (IAM, GuardDuty, WAF, Security Hub), Application Integration (SNS,SQS), End User Computing (Workspaces), Machine Learning (SageMaker), and Migration Services. Uptycs offers custom pricing and solutions via private offer. Reach out directly to aws@uptycs.com.

    Overview

    Play video

    Uptycs is the top Cloud-Native Application Protection Platform (CNAPP) choice for security teams collaborating with developers to safeguard critical application pipelines, mitigate risks, and defend runtime environments in the hybrid cloud.

    Uptycs consolidates cloud security silos into a unified platform, providing a single security console, policy framework, and data lake. This unification enables greater automation, simplifies policy enforcement, and extends security coverage, all while reducing costs.

    DATA IS YOUR POWER, NOT A HEADACHE

    Uptycs tackled the cybersecurity data challenge first to give you deeper context so you can prioritize what truly matters. Our modern architecture normalizes security telemetry close to its collection point, and then streams it into your detection cloud, so you can query your attack surface like a database. No black boxes, no ETL, and no need to put in a support ticket to get new insights.

    FULL LIFECYCLE CLOUD-NATIVE APPLICATION PROTECTION

    Detect malware or suspicious behavior on developer endpoints, identify vulnerabilities early in the build process, verify secure configurations, and continuously monitor in production.

    :: Prioritize security findings across your hybrid cloud workloads (VMs, containers, clusters, and serverless), and cloud infrastructure (databases, data stores, object storage) through exposure scanning, full attack path analysis, and correlation of security signals

    :: Detect active threats to workloads with anomaly and behavior-based detections. Identify, prioritize, and fix misconfigurations and policy violations in Infrastructure as Code (IaC)

    :: Simplify the maintenance of least privilege access and reduce IAM risks with full visibility into policies, users, and roles. Detect identity-specific threats through Identity Threat Detection and Response (ITDR) capabilities

    :: Get deep support for AWS and start with instant-on, agentless coverage, then add the Uptycs Sensor for runtime protection, advanced remediation, and forensics

    :: Gain full visibility into your software development pipeline posture and apply guardrails throughout your software development lifecycle (SDLC)

    :: Fully protect your cloud with visibility of all cloud-connected assets, empowering you to understand your blast radius should a developer laptop be compromised

    :: Meet compliance mandates with support for CIS benchmarks, HIPAA, ISO 27001, NIST, PCI, and SOC 2 across your cloud infrastructure and workloads running within the cloud

    PROTECT YOUR CRITICAL WORKLOADS, WHEREVER THEY RUN

    Replace multiple agents and tools with Uptycs for unified threat detection and response, vulnerability scanning, security hygiene, compliance, cyber asset management, file integrity monitoring (FIM), and ad hoc investigation and threat hunting.

    :: Enjoy deep support for rare Linux distros, IBM LinuxONE, Linux on Z, IBM Power, AIX, HPC environments, and more

    :: Enjoy blazing-fast response times with the Uptycs osquery-based agent with eBPF, designed to minimize its memory, CPU, and disk I/O footprint

    :: Leverage rich security telemetry that goes beyond basic events to include file system files, Augeas lens, DNS lookups, sudoers list, and disk encryption

    DATASHEET QUICK LINKS:

    :: Uptycs for AWS: https://www.uptycs.com/resources/product-brief/aws-security 

    :: Uptycs CNAPP for Hybrid Cloud Security: https://www.uptycs.com/resources/datasheets/uptycs-for-cloud-native-applications-cnapp 

    :: Kubernetes and container security: https://www.uptycs.com/resources/datasheets/kubernetes-container-security 

    :: Uptycs Vulnerability Management: https://www.uptycs.com/resources/uptycs-vulnerability-management 

    :: Uptycs File Integrity Monitoring (FIM): https://www.uptycs.com/resources/datasheets/uptycs-file-integrity-monitoring-fim 

    :: Uptycs for IBM LinuxONE, LinuxONE 4 Express, Linux on Z, Linux on IBM Power, and AIX: https://www.uptycs.com/resources/datasheets/ibm-aix-security 

    :: Uptycs MDR for outsourced detection and response: https://www.uptycs.com/services/mdr-managed-detection-response 

    :: Case Study: Lookout Relies on Uptycs for AWS Security and Compliance: https://www.uptycs.com/case-studies/lookout 

    Reach out directly to learn more about how we can tailor solutions to your unique needs.

    Uptycs provides custom pricing for customers via Private Offer. Please contact aws@uptycs.com  for a better understanding of our pricing model and products.

    Highlights

    • Complete, consistent coverage. Secure public and private cloud, Kubernetes, rare Linux distros, IBM LinuxONE, developer endpoints, and the software pipeline. Scales from hundreds to millions of workloads with proven reliability. Learn more at https://www.uptycs.com/products/cnapp.
    • Deeper data delivers better insights. Correlate real-time insights with historical data to prioritize the threats and vulnerabilities that matter. Get 13-month lookback for compliance and forensic analysis, and Ask Uptycs for on-the-fly investigations.
    • Remediation requires cloud speed. Slash MTTR by 50% with real-time ATT&CK-mapped detections and blast radius visibility from laptop to code to cloud.

    Details

    Sold by

    Categories

    Delivery method

    Deployed on AWS

    Unlock automation with AI agent solutions

    Fast-track AI initiatives with agents, tools, and solutions from AWS Partners.
    AI Agents

    Features and programs

    Vendor Insights

     Info
    Skip the manual risk assessment. Get verified and regularly updated security info on this product with Vendor Insights.
    Security credentials achieved
    (1)

    Financing for AWS Marketplace purchases

    AWS Marketplace now accepts line of credit payments through the PNC Vendor Finance program. This program is available to select AWS customers in the US, excluding NV, NC, ND, TN, & VT.
    Financing for AWS Marketplace purchases

    Quick Launch

    Leverage AWS CloudFormation templates to reduce the time and resources required to configure, deploy, and launch your software.

    Pricing

    Uptycs CNAPP

     Info
    Pricing is based on the duration and terms of your contract with the vendor. This entitles you to a specified quantity of use for the contract duration. If you choose not to renew or replace your contract before it ends, access to these entitlements will expire.
    Additional AWS infrastructure costs may apply. Use the AWS Pricing Calculator  to estimate your infrastructure costs.

    12-month contract (2)

     Info
    Dimension
    Description
    Cost/12 months
    Uptycs Cloud Audit (100 Cloud Workloads)
    Inventory, Compliance, Vuln Mgmt, Risks, IaC, and Identity Analytics.
    $12,000.00
    Uptycs Cloud Secure (100 Cloud Workloads)
    Cloud Audit + Workload Protection, Forensics, and Threat Detections.
    $18,000.00

    Vendor refund policy

    All fees are non-cancellable and non-refundable except as required by law.

    How can we make this page better?

    We'd like to hear your feedback and ideas on how to improve this page.
    We'd like to hear your feedback and ideas on how to improve this page.

    Legal

    Vendor terms and conditions

    Upon subscribing to this product, you must acknowledge and agree to the terms and conditions outlined in the vendor's End User License Agreement (EULA) .

    Content disclaimer

    Vendors are responsible for their product descriptions and other product content. AWS does not warrant that vendors' product descriptions or other product content are accurate, complete, reliable, current, or error-free.

    Usage information

     Info

    Delivery details

    Software as a Service (SaaS)

    SaaS delivers cloud-based software applications directly to customers over the internet. You can access these applications through a subscription model. You will pay recurring monthly usage fees through your AWS bill, while AWS handles deployment and infrastructure management, ensuring scalability, reliability, and seamless integration with other AWS services.

    Resources

    Vendor resources

    Support

    Vendor support

    support@uptycs.com  support.uptycs.com

    AWS infrastructure support

    AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.

    Product comparison

     Info
    Updated weekly

    Accolades

     Info
    Top
    10
    In Monitoring, Application Development
    Top
    25
    In Observability, Software Development

    Customer reviews

     Info
    Sentiment is AI generated from actual customer reviews on AWS and G2
    Reviews
    Functionality
    Ease of use
    Customer service
    Cost effectiveness
    13 reviews
    Insufficient data
    0 reviews
    Insufficient data
    Insufficient data
    Insufficient data
    Insufficient data
    Positive reviews
    Mixed reviews
    Negative reviews

    Overview

     Info
    AI generated from product descriptions
    Cloud Security Coverage
    Comprehensive security monitoring across 40+ AWS services including compute, containers, storage, databases, networking, and security services
    Threat Detection Mechanism
    Anomaly and behavior-based detection with advanced threat identification using osquery-based agent with eBPF technology
    Infrastructure as Code Security
    Identify, prioritize, and fix misconfigurations and policy violations in Infrastructure as Code (IaC) environments
    Identity and Access Management
    Comprehensive visibility and management of IAM policies, users, roles with Identity Threat Detection and Response (ITDR) capabilities
    Compliance and Monitoring
    Support for multiple compliance standards including CIS benchmarks, HIPAA, ISO 27001, NIST, PCI, and SOC 2 with continuous security telemetry monitoring
    Cloud Asset Discovery
    Agentless scanning technology providing comprehensive visibility across cloud infrastructure and platform assets
    Risk Prioritization
    Advanced risk scoring mechanism that identifies and correlates potential attack paths and security vulnerabilities
    Security Integration
    Seamless integration into CI/CD processes for continuous security assessment throughout software development lifecycle
    Generative AI Analysis
    AI-powered investigation and remediation capabilities for enhanced security threat detection and response
    Multi-Domain Security Coverage
    Unified platform integrating multiple cloud security domains including CSPM, CWPP, CIEM, DSPM, container and API security
    Cloud Native Security Engine
    Agentless Cloud Native Application Protection Platform (CNAPP) with a unique offensive security engine for comprehensive cloud security
    Multi-Cloud Asset Management
    Includes asset inventory, graph explorer, and security posture management across public and private cloud environments
    Advanced Threat Detection
    Real-time AI-powered detection and prevention of runtime threats including ransomware, zero-days, and fileless attacks
    Infrastructure Security Scanning
    Comprehensive scanning capabilities including Infrastructure as Code (IaC), secrets scanning, and vulnerability assessment
    Cloud Object Storage Protection
    AI-powered malware detection for cloud object storage with millisecond scanning and automated quarantine capabilities

    Security credentials

     Info
    Validated by AWS Marketplace
    FedRAMP
    GDPR
    HIPAA
    ISO/IEC 27001
    PCI DSS
    SOC 2 Type 2
    -
    -
    -
    -
    -
    -
    -
    -
    -
    No security profile

    Contract

     Info
    Standard contract
    No
    No
    No

    Customer reviews

    Ratings and reviews

     Info
    0 ratings
    5 star
    4 star
    3 star
    2 star
    1 star
    0%
    0%
    0%
    0%
    0%
    0 AWS reviews
    |
    14 external reviews
    Star ratings include only reviews from verified AWS customers. External reviews can also include a star rating, but star ratings from external reviews are not averaged in with the AWS customer star ratings.
    Rajitha A.

    Une solution unifiée pour améliorer la gestion et les opérations informatiques – tout en un.

    Reviewed on Jan 27, 2025
    Review provided by G2
    Qu'aimez-vous le plus Ă  propos de the product?
    Uptycs est bon pour sa fonctionnalité comparative. Il peut analyser plusieurs outils de la même catégorie et aider à faire le bon choix à la fin. Cela est particulièrement utile pour des personnes comme moi qui passent constamment d'un outil à l'autre lorsque je dois choisir le meilleur pour la sécurité du cloud.
    Que n’aimez-vous pas à propos de the product?
    Pour faciliter un processus de prise de décision plus rapide, je suggère d'ajouter des recommandations ou des résumés plus concis et clairs.
    Quels sont les problèmes que the product résout, et en quoi cela vous est-il bénéfique?
    En tant que professionnel de la sécurité, il est important pour moi d'avoir des points de non-conformité pertinents et de réduire le risque de ces points de non-conformité pour l'infrastructure. Uptycs m'est avantageux car je peux voir le statut de conformité de l'infrastructure cloud et je peux également l'appliquer avec des vérifications de conformité automatisées.
    Sécurité informatique et réseau

    Uptycs – un outil de surveillance de sécurité avancé, bien que coûteux.

    Reviewed on Jan 26, 2025
    Review provided by G2
    Qu'aimez-vous le plus Ă  propos de the product?
    Très bon outil pour surveiller la sécurité, conforme aux normes CIS ou PCI DSS. J'aime la possibilité de créer vos propres requêtes SQL dans la recherche en sécurité réseau.
    Que n’aimez-vous pas à propos de the product?
    C'est dommage que le prix soit élevé, je continuerais volontiers à utiliser cet outil si ce n'était pas pour les frais élevés.
    Quels sont les problèmes que the product résout, et en quoi cela vous est-il bénéfique?
    Uptycs aborde les problèmes de visibilité à travers les environnements, le maintien de la conformité, les faux positifs excessifs, la sécurisation des conteneurs et le manque de flexibilité dans la personnalisation des outils pour répondre aux besoins individuels.
    reviewer2301639

    Great features, good support, and lots of functionality

    Reviewed on Oct 27, 2023
    Review provided by PeerSpot

    What is our primary use case?

    We are using the solution for configuration and file integrity management. It's a validation tool. 

    What is most valuable?

    They have multiple great features. 

    It offers most of the functionalities we need. 

    What needs improvement?

    The one thing missing is the IPS part, the blocking part. 

    We end up facing a lot of issues after upgrades.

    For how long have I used the solution?

    I've been using the solution for three or more years.

    What do I think about the stability of the solution?

    The solution is somewhat stable. It depends on how we are integrating it. Apart from the major upgrades and bugs around that, I'd rate the stability six or seven out of ten. 

    What do I think about the scalability of the solution?

    The solution is scalable. It covers multiple functionalities, operating systems, and clouds. 

    We have around 10,000 users on the solution currently. 

    How are customer service and support?

    Technical support is good. They provide us with valuable assistance. 

    How would you rate customer service and support?

    Positive

    How was the initial setup?

    The initial setup was really hard since the profiles you have to build around certain things. We had a lot of challenges implementing it. 

    It was a bit time-consuming to set up. 

    What's my experience with pricing, setup cost, and licensing?

    The pricing is moderate compared to other products in the market. However, it is not the cheapest option. 

    Depending on the requirements and how it is used, it's worth the money spent. 

    What other advice do I have?

    I'm an end-user.

    We use the solution on multiple clouds. 

    I'd advise users to validate which product and metrics will help them the most. The solution has multiple functionalities. Don't go in blindly. Know what you want to get out of the product. 

    I'd rate the solution eight out of ten based on the scalability potential. 

    Which deployment model are you using for this solution?

    Public Cloud
    Joseph M.

    Excellent EDR léger avec prise en charge complète de Mac

    Reviewed on Aug 03, 2023
    Review provided by G2
    Qu'aimez-vous le plus Ă  propos de the product?
    Il est difficile de trouver un EDR avec un support décent pour les Macs, il y a beaucoup d'options pour Windows mais si vous êtes dans un environnement hybride, vous remarquerez probablement la différence entre les systèmes d'endpoint. Uptycs prend en charge Windows/Mac/Unix de manière égale avec un ensemble complet de détections pour chacun. Le développement continu signifie que vous restez à la pointe de la technologie. Les systèmes sont faciles à utiliser et à comprendre, le réglage est simple.
    Que n’aimez-vous pas à propos de the product?
    Les communications autour des bugs sont insuffisantes. Le backend est constamment en développement, ce qui signifie que les choses vont changer, et pas toujours de la manière que vous pourriez souhaiter. Supprimer Uptycs d'un Mac à distance est difficile au mieux, bien que cela soit principalement dû à Apple.
    Quels sont les problèmes que the product résout, et en quoi cela vous est-il bénéfique?
    Uptycs est une suite complète EDR/XDR et peut également fournir un MDR. Nous utilisons les capacités EDR et MDR pour couvrir les actifs de l'entreprise à des fins de conformité, de gouvernance et de sécurité.
    Bharath K.

    Uptycs RequĂŞte OS

    Reviewed on Jul 19, 2023
    Review provided by G2
    Qu'aimez-vous le plus Ă  propos de the product?
    Les détections sont en détail avec l'arborescence des processus et les fichiers associés sont écrits en détail avec leurs hachages et le compte utilisé pour exécuter.
    Que n’aimez-vous pas à propos de the product?
    Le tableau de bord. Une barre de recherche commune serait facile pour l'analyste de rechercher des noms d'hĂ´te/IP.
    Quels sont les problèmes que the product résout, et en quoi cela vous est-il bénéfique?
    Solution de sécurité des points de terminaison.
    Si les adversaires tentent d'échapper aux détections, Defender/Falcon Uptycs a pu capturer ces événements.
    View all reviews