• AWS Control Tower
  • AWS Control Tower

    AWS Control Tower is an automated cloud governance solution that helps organizations set up and manage secure, multi-account AWS environments. It streamlines compliance, security enforcement, and workflow automation, providing centralized visibility and control

Relevant Sub categories Relevant Products
Infor CloudSuite Public Sector Infor CloudSuite Public Sector
Boston WorkStation Boston WorkStation
Exabeam Exabeam
Fetch Robotics Fetch Robotics
WinActor WinActor
Wipro Holmes Wipro Holmes
PayScale (All Products) PayScale (All Products)
MotioPI MotioPI
Apache Mesos Apache Mesos
AWS Batch AWS Batch
Bandit Bandit
Brakeman Brakeman
CoreOS flannel CoreOS flannel
CoreOS Ignition CoreOS Ignition
Docker Swarm Docker Swarm
Flexera Software Vulnerability Management Flexera Software Vulnerability Management
JFrog Xray JFrog Xray
Metasploit Metasploit
OpenVAS OpenVAS
OWASP Zed Attack Proxy (ZAP) OWASP Zed Attack Proxy (ZAP)
Test Data Manager Test Data Manager
BMC Control-M BMC Control-M
HyperScience HyperScience
Neuroph Neuroph
NVIDIA DIGITS NVIDIA DIGITS
Spotler Spotler
Apache Oozie Apache Oozie
Ascent Business Systems (All Products) Ascent Business Systems (All Products)
AssistEdge RPA AssistEdge RPA
Aviatrix Aviatrix
AWS IoT 1-Click AWS IoT 1-Click
AWS Trusted Advisor AWS Trusted Advisor
BMC Control-O BMC Control-O
BMC Helix Discovery BMC Helix Discovery
BMC Remedy ARS BMC Remedy ARS
CA Automic One Automation Platform CA Automic One Automation Platform
CA Identity Governance CA Identity Governance
Dollar Universe Workload Automation Dollar Universe Workload Automation
ExtendSim ExtendSim
Function Point Function Point
Google Cloud Composer Google Cloud Composer
HelpSystems (All Products) HelpSystems (All Products)
IBM Sterling B2B Integrator IBM Sterling B2B Integrator
IBM WebSphere Business Integration IBM WebSphere Business Integration
IBM WebSphere ILOG JRules IBM WebSphere ILOG JRules
Intellibot Intellibot
IT Process Automation Manager IT Process Automation Manager
K2 Cloud K2 Cloud
Knet Knet
Kryon RPA Kryon RPA
Micro Focus Discovery and Dependency Mapping Advanced Edition (DDMA) Micro Focus Discovery and Dependency Mapping Advanced Edition (DDMA)
Micro Focus Discovery and Dependency Mapping Inventory (DDMI) Micro Focus Discovery and Dependency Mapping Inventory (DDMI)
Micro Focus Silk Micro Focus Silk
Moab HPC Suite Moab HPC Suite
NetApp Data Infrastructure Management NetApp Data Infrastructure Management
NetSuite SuiteFlow NetSuite SuiteFlow
Nintex Nintex
Oracle Teleservice Oracle Teleservice
PBS Professional PBS Professional
PeopleSoft Product Configurator PeopleSoft Product Configurator
SLURM Workload Manager SLURM Workload Manager
Sonatype Nexus Platform Sonatype Nexus Platform
Stonebranch Stonebranch
TFLearn TFLearn
Tidal Automation Tidal Automation
Tray.io Tray.io
WebJaguar WebJaguar
Honeywell Pro-Watch Honeywell Pro-Watch
IBM Security Privileged Identity Manager IBM Security Privileged Identity Manager
McAfee Enterprise Security Manager McAfee Enterprise Security Manager
Microsoft Defender ATP Microsoft Defender ATP
Netwrix (All Products) Netwrix (All Products)
Tenable.io Tenable.io
VMware Carbon Black Cloud Endpoint Standard VMware Carbon Black Cloud Endpoint Standard
VMware Carbon Black EDR VMware Carbon Black EDR
Doodle Doodle
Google Calendar Google Calendar
Traction TeamPage Traction TeamPage
TSheets TSheets
Fujitsu ScanSnap Fujitsu ScanSnap
Lumen Cloud Application Manager Lumen Cloud Application Manager
Now Platform Now Platform
Adabas for zIIP Adabas for zIIP
Altiris Deployment Solution Altiris Deployment Solution
Amazon FSx for Lustre Amazon FSx for Lustre
Menlo Security Menlo Security
ProxySQL ProxySQL
Accertify Accertify
BeyondTrust Remote Support BeyondTrust Remote Support
Bot Management Bot Management
Castle Castle
Deltek Maconomy Deltek Maconomy
Allgress Allgress
AWS Artifact AWS Artifact
Bottomline Fraud and Financial Crime Management Bottomline Fraud and Financial Crime Management
CA Risk Authentication CA Risk Authentication
ControlPanelGRC ControlPanelGRC
Fastpath Assure Fastpath Assure
Fusion Framework System Fusion Framework System
HighBond HighBond
JupiterOne JupiterOne
LexisNexis InstantID LexisNexis InstantID
LogicManager LogicManager
McAfee Risk Advisor McAfee Risk Advisor
MetricStream IT Risk Management App MetricStream IT Risk Management App
OneTrust DataGovernance OneTrust DataGovernance
OneTrust GRC OneTrust GRC
Oracle Risk Management Cloud Oracle Risk Management Cloud
Prevalent Prevalent
Privacera Privacera
Resolver GRC Resolver GRC
SafePaaS SafePaaS
SAP GRC SAP GRC
Security Weaver Security Weaver
SureCloud SureCloud
Vanguard Analyzer Vanguard Analyzer
Venminder Venminder
Veritas Data Insight Veritas Data Insight
Veritas Risk Advisor Veritas Risk Advisor
Brinqa Brinqa
15Five 15Five
Kronos Workforce HR Kronos Workforce HR
Taleo Analytics Taleo Analytics
Avast Managed Workplace Avast Managed Workplace
Datto RMM Datto RMM
NinjaRMM NinjaRMM
SolarWinds RMM SolarWinds RMM
Anixter Anixter
Gremlin Gremlin
IBM QRadar Vulnerability Manager IBM QRadar Vulnerability Manager
Nmap Nmap
Nikto Nikto
Brainwave Identity GRC Brainwave Identity GRC
LeaseTerm LeaseTerm
ConnectWise Automate ConnectWise Automate
Graylog Graylog
Amazon GuardDuty Amazon GuardDuty
Armis Armis
AWS Shield AWS Shield
Badger Software Badger Software
BlackStratus BlackStratus
Cofense Cofense
CyberGRX CyberGRX
Cygilant Cygilant
Frontline VM Frontline VM
GardaWorld GardaWorld
Gurucul Gurucul
HIAB HIAB
IBM QRadar SIEM IBM QRadar SIEM
InsightIDR InsightIDR
InsightVM InsightVM
Kerio Control Kerio Control
LogRhythm NextGen SIEM Platform LogRhythm NextGen SIEM Platform
ManageEngine Log360 ManageEngine Log360
MITRE ATT&CK MITRE ATT&CK
Nexpose Nexpose
NopSec NopSec
RedSeal RedSeal
RiskIQ RiskIQ
RSA enVision RSA enVision
SAP Enterprise Threat Detection SAP Enterprise Threat Detection
SecurityScorecard SecurityScorecard
Securonix Next-Gen SIEM Securonix Next-Gen SIEM
ServiceNow Security Operations ServiceNow Security Operations
Splunk Enterprise Security Splunk Enterprise Security
Suricata Suricata
Symmetry Security Platform Symmetry Security Platform
Tenable.sc Tenable.sc
ThreadFix ThreadFix
ThreatSim ThreatSim
Trustwave (All Products) Trustwave (All Products)
Uptycs Uptycs
Cygilant SOCVue Cygilant SOCVue
41st Parameter 41st Parameter
Alienvault OSSIM Alienvault OSSIM
Arctic Wolf Arctic Wolf
Authentify Authentify
Autonomy Enterprise Archive Solution (EAS) Autonomy Enterprise Archive Solution (EAS)
AWS Single Sign-On AWS Single Sign-On
BetterCloud BetterCloud
BlueVoyant BlueVoyant
BMC TrueSight Vulnerability Management BMC TrueSight Vulnerability Management
Broadcom Advanced Authentication Broadcom Advanced Authentication
CompliancePro CompliancePro
CoreOS Clair CoreOS Clair
Coupa Risk Aware Coupa Risk Aware
CrowdStrike Falcon X CrowdStrike Falcon X
Dahua Dahua
Dell SecureWorks Dell SecureWorks
DNSFilter DNSFilter
Enablon Enablon
ePrism Email Security ePrism Email Security
ExtraHop Reveal(x) ExtraHop Reveal(x)
Fidelis Cybersecurity Fidelis Cybersecurity
GBS Permessa GBS Permessa
GFI LanGuard GFI LanGuard
Google Cloud Security Scanner Google Cloud Security Scanner
Greenbone Greenbone
IDaptive IDaptive
JFrog Bintray JFrog Bintray
Lookout Lookout
ManageEngine ADAudit Plus ManageEngine ADAudit Plus
McAfee MVISION Cloud McAfee MVISION Cloud
Micro Focus Operations Manager Micro Focus Operations Manager
Micro Focus Secure Messaging Gateway Micro Focus Secure Messaging Gateway
Nexus Vulnerability Scanner Nexus Vulnerability Scanner
Nutanix Xi Beam Nutanix Xi Beam
One Identity Defender One Identity Defender
Optiv Security Optiv Security
Oracle Adaptive Access Manager Oracle Adaptive Access Manager
Oracle API Gateway Oracle API Gateway
Orbcom Orbcom
PowerTech PowerTech
Proofpoint Essentials Proofpoint Essentials
Protegrity Protegrity
Quad9 Quad9
Recorded Future Recorded Future
RiskSense RiskSense
RSA SecurID Suite RSA SecurID Suite
SafeBreach SafeBreach
SAP Ariba Supplier Risk SAP Ariba Supplier Risk
Security Key Enforcement Security Key Enforcement
ServiceNow Vulnerability Response ServiceNow Vulnerability Response
Sift Sift
SilverSky SilverSky
Splunk App for Infrastructure Splunk App for Infrastructure
Splunk Insights Splunk Insights
Splunk User Behavior Analytics Splunk User Behavior Analytics
Symantec Cloud Workload Protection Symantec Cloud Workload Protection
Tenable Nessus Tenable Nessus
Tripwire Tripwire
Tripwire IP360 Tripwire IP360
TrustArc TrustArc
Trustwave AppDetectivePRO Trustwave AppDetectivePRO
Verimatrix Verimatrix
WireWheel WireWheel
X-Ways X-Ways
ActiveBatch ActiveBatch
AppWorx AppWorx
AutoSys Workload Automation AutoSys Workload Automation
Azure Batch Azure Batch
CA FAQS Automated System Operation CA FAQS Automated System Operation
Cray CS-Storm Cray CS-Storm
Docker EE Docker EE
Flux Flux
Google Knative Google Knative
IBM Spectrum LSF IBM Spectrum LSF
IBM Z Workload Scheduler IBM Z Workload Scheduler
JAMS JAMS
Maui Cluster Scheduler Maui Cluster Scheduler
Net Optics Net Optics
OPCon OPCon
OpenLava OpenLava
Oracle Exalogic Oracle Exalogic
Quartz Scheduler Quartz Scheduler
Vinzant Vinzant

User list of AWS Control Tower

Get the customer list of AWS Control Tower from our dataset by location, vertical, size or persona filters