Coming October 25: PeerSpot Awards will be announced! Learn more
2021-01-22T23:15:55Z
Miriam Tover - PeerSpot reviewer
Service Delivery Manager at PeerSpot (formerly IT Central Station)
  • 0
  • 1

What do you like most about AWS Security Hub?

Hi Everyone,

What do you like most about AWS Security Hub?

Thanks for sharing your thoughts with the community!

1
PeerSpot user
1 Answer
Ankit-Kumar - PeerSpot reviewer
Engineering Manager Technology at Nykaa
Real User
Top 10
2021-01-22T23:15:55Z
22 January 21

Finding out if your infrastructure is secure is a valuable feature.

Find out what your peers are saying about Amazon, Microsoft, Splunk and others in Security Information and Event Management (SIEM). Updated: September 2022.
632,539 professionals have used our research since 2012.
Related Questions
Jonny Klompas - PeerSpot reviewer
DevSecOps Engineer at OurCrowd LLC
Aug 16, 2022
Hello, Wiz and Ermetic provide an overview of security issues and classify them according to overall risk in a simple dashboard.  AWS Security Hub also has a dashboard that aggregates security issues from other AWS security tools like GuardDuty, IAM Access Advisor, Macie and Inspector but doesn't seem to list the top threats overall. I need to select an appropriate tool and I'm not sure th...
Rony_Sklar - PeerSpot reviewer
Community Manager at PeerSpot (formerly IT Central Station)
Jun 28, 2021
There are many cybersecurity tools available, but some aren't doing the job that they should be doing.  What are some of the threats that may be associated with using 'fake' cybersecurity tools? What can people do to ensure that they're using a tool that actually does what it says it does?
2 out of 12 answers
Javier Medina - PeerSpot reviewer
Cyber Security Officer at Grupo Vision
07 January 21
You should build a lab, try the tools and analyze the traffic and behavior with a traffic analizer like wireshark and any sandbox or edr that shows you what the tools do, but all this should be outside your production environment, use tools that has been released by the company provider and not third party downloads or unknown or untrusted sources.
Basil Dange - PeerSpot reviewer
Senior Manager at a financial services firm with 10,001+ employees
07 January 21
One should 1st have details understanding of what he/she is looking to protect within environment as tool are specially designed for point solution. Single tool will not able to secure complete environment and you should not procure any solution without performing POC within your environment  As there is possibility that tool which works for your peer organisation does not work in similar way for yours as each organisation has different components and workload/use case
Related Solutions
Download Free Report
Download our free Security Information and Event Management (SIEM) Report and find out what your peers are saying about Amazon, Microsoft, Splunk, and more! Updated: September 2022.
DOWNLOAD NOW
632,539 professionals have used our research since 2012.