Audience

DevOps, DevSecOps, IT Security, Cloud Security, Data Security, Audit, Governance & Compliance Teams, AWS, Amazon Web Services, Microsoft Azure, Google Cloud, GCP

About Sonrai Security

Identity and Data Protection for AWS, Azure, Google Cloud, and Kubernetes. Sonrai’s public cloud security platform provides a complete risk model of all identity and data relationships, including activity and movement across cloud accounts, cloud providers, and 3rd party data stores. Uncover all identity and data relationships between administrators, roles, compute instances, serverless functions, and containers across multi-cloud accounts and 3rd-party data stores. Inside the platform, our critical resource monitor continuously monitors your critical data sitting inside object stores (e.g. AWS S3, Azure Blob) and database services (e.g. CosmosDB, Dynamo DB, RDS). Privacy and compliance controls are monitored across multiple cloud providers and 3rd party data stores. Resolutions are coordinated with relevant DevSecOps teams.

Pricing

Pricing Details:
Contact us for pricing information.

Integrations

API:
Yes, Sonrai Security offers API access

Ratings/Reviews

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Company Information

Sonraí Security
Founded: 2017
United States
sonraisecurity.com

Videos and Screen Captures

Other Useful Business Software
Our Free Plans just got better! | Auth0 Icon
Our Free Plans just got better! | Auth0

With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
Try free now

Product Details

Platforms Supported
Cloud
Training
Documentation
Live Online
Webinars
In Person
Videos
Support
Phone Support
24/7 Live Support
Online

Sonrai Security Frequently Asked Questions

Q: What kinds of users and organization types does Sonrai Security work with?
Q: What languages does Sonrai Security support in their product?
Q: What kind of support options does Sonrai Security offer?
Q: What other applications or services does Sonrai Security integrate with?
Q: Does Sonrai Security have an API?
Q: What type of training does Sonrai Security provide?
Q: What pricing for support is available for Sonrai Security?

Sonrai Security Product Features

Cloud Security

Application Security
Behavioral Analytics
Incident Management
Intrusion Detection System
Two-Factor Authentication
Vulnerability Management
Antivirus
Encryption
Endpoint Management
Threat Intelligence

Cloud Workload Protection

Cloud Gap Analysis
Cloud Registry
Asset Discovery
Governance
Logging & Reporting
Data Security
Data Loss Prevention (DLP)
Security Audit
Anomaly Detection
Workload Diversity
Machine Learning

Container Security

Container Stack Scanning
View Container Metadata
Image Vulnerability Detection
Application Performance Tracking
Centralized Policy Management
Access Roles / Permissions
Testing
Reporting

Cybersecurity

Behavioral Analytics
Incident Management
Vulnerability Scanning
AI / Machine Learning
Endpoint Management
IOC Verification
Tokenization
Whitelisting / Blacklisting

Data Loss Prevention

Policy Management
Sensitive Data Identification
Whitelisting / Blacklisting
Web Threat Management
Incident Management
Compliance Reporting

Data Security

Sensitive Data Compliance
At-Risk Analysis
Identity / Access Management
Secure Data Transport
Audits
Antivirus/Malware Detection
Data Masking
Database Security
Data Center Security
Data-Centric Security
Data Loss Prevention
Logging / Reporting
Alerts / Notifications
Mobile Data Security
Encryption
Policy Management
Data Discovery
Monitor Abnormalities
Data Classification

DevOps

Approval Workflow
Dashboard
Policy Management
Prioritization
Timeline Management
Troubleshooting Reports
KPIs
Portfolio Management
Release Management

IT Security

Event Tracking
IP Protection
Anti Spam
Anti Virus
Email Attachment Protection
Internet Usage Monitoring
Intrusion Detection System
Spyware Removal
Two-Factor Authentication
Vulnerability Scanning
Web Threat Management
Web Traffic Reporting

Log Management

Archiving
Audit Trails
Compliance Reporting
Consolidation
Data Visualization
Event Logs
Network Logs
Remediation
Syslogs
Thresholds
Web Logs

Policy Management

Policy Creation
Policy Library
Audit Trails
Workflow Management
Approval Process Control
Policy Training
Reporting / Analytics
Attestation
Version Control
Policy Metadata Management

Privileged Access Management

Application Access Control
Behavioral Analytics
Credential Management
Granular Access Controls
Least Privilege
Multifactor Authentication
Policy Management
Remote Access Management
Threat Intelligence
User Activity Monitoring
Endpoint Management
For MSPs
Password Management

SIEM

Application Security
Behavioral Analytics
Compliance Reporting
Endpoint Management
File Integrity Monitoring
Forensic Analysis
Log Management
Network Monitoring
Real Time Monitoring
Threat Intelligence
User Activity Monitoring

Sonrai Security Additional Categories