
Overview
BlueRock Security gives organizations a secure by default compute foundation to counter AI speed attacks and the rapidly decreasing time to exploit timeframes that put increased pressure on your developers. The solution minimizes the overhead of vulnerabilty remediation, and the endless churn of "scan and patch" by protecting against ~70% of both known and unknown vulnerability exploits saving hours of time for developers.
Pre-integrated into cloud-ready Linux and Container node images, BlueRock Compute Runtime Security delivers real-time attack prevention to protect apps, container, and host runtime environments. Always-on and transparent, BlueRock removes the need to deploy yet another security agent and protects workloads without requiring developer code changes.
-
Delivered as a BlueRock-supported Linux machine image based on what you already use.
-
Enhanced with simple invariant-based runtime guardrails, BlueRock RXG is effective at blocking entire classes of exploit chains across Linux and container environments.
-
Assures workload performance and security, without compromise.
BlueRock runtime security can be configured to run in observe-only or real-time blocking mode.
Instead of searching for needles in noisy telemetry haystacks, BlueRock RXG proactively enforces runtime invariants—precise guardrails capable of disrupting entire classes of attacker exploit chains. This invariant-based approach flips the script on “detect and respond”, clearly defining what should never happen in uncompromised workloads.
This approach enables BlueRock to see and stop attacker behavior and avoid false positives. It doesn’t guess — it blocks only definitively malicious actions. And it does so with little to no performance impact.
Highlights
- Embedded runtime security. Secure by default - no installation required
- Save developers time by blocking~70% of unknown and known exploits to reduce the overhead of patching
- Provides security teams with in-depth visibility of exploit attempts and configuration drift.
Details
Unlock automation with AI agent solutions

Features and programs
Financing for AWS Marketplace purchases
Pricing
Dimension | Description | Cost/12 months |
---|---|---|
BlueRock | BlueRock Compute Runtime Security | $50,000.00 |
Vendor refund policy
We do not currently support refunds, but you can cancel at any time.
How can we make this page better?
Legal
Vendor terms and conditions
Content disclaimer
Delivery details
BlueRock EC2 Deployment on AWS
The following AWS services and resources are deployed with the CloudFormation template:
- EC2 instance with EBS storage
- IAM role with S3, logs, and IAM permissions
- VPC with subnets
- S3 bucket for policy storage
- CloudWatch Log Group for events
- Internet Gateway for instance access
CloudFormation Template (CFT)
AWS CloudFormation templates are JSON or YAML-formatted text files that simplify provisioning and management on AWS. The templates describe the service or application architecture you want to deploy, and AWS CloudFormation uses those templates to provision and configure the required services (such as Amazon EC2 instances or Amazon RDS DB instances). The deployed application and associated resources are called a "stack."
Additional details
Usage instructions
Refer to User Guide for more information: https://bluerock-public.s3.us-east-1.amazonaws.com/docs/BlueRock+AWS+CloudFormation+Deployment+-+v1.2.1.pdfÂ
Resources
Vendor resources
Support
Vendor support
Support available Monday through Friday during business hours. Email: customer-support@bluerock.io | Premium support available through request. customer-support@bluerock.ioÂ
AWS infrastructure support
AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.