Join the 1500 companies using G2 Track to manage SaaS spend, usage, contracts & compliance.

AWS Security Hub

3.7
(4)

AWS Security Hub gives you a comprehensive view of your high-priority security alerts and compliance status across AWS accounts.

Work for AWS Security Hub?

Learning about AWS Security Hub?

We can help you find the solution that fits you best.

AWS Security Hub Reviews

Chat with a G2 Advisor
Write a Review
Filter Reviews
Filter Reviews
  • Ratings
  • Company Size
  • User Role
  • Industry
Ratings
Company Size
User Role
Industry
Showing 4 AWS Security Hub reviews
LinkedIn Connections
AWS Security Hub review by User
User
Validated Reviewer
Review Source
content

"Keeps You at Ease "

What do you like best?

I like that this security hub is easy to use and keeps me at ease. The large range allows to me have a good eye on security alerts. I am also able to have one central area that will prioritize my security alerts. It is easy to monitor the program and identify any threats.

What do you dislike?

I think it is beneficial that the findings are summarized but it can also be a con because you do not receive as much information. It can also be a bit confusing to read and understand the graphs and tables sometimes.

Recommendations to others considering the product

This will be very helpful and will definitely help solve multiple security problems that you will encounter.

What business problems are you solving with the product? What benefits have you realized?

I am able to make sure all of my devises remain secure

Sign in to G2 to see what your connections have to say about AWS Security Hub
AWS Security Hub review by Stephen N.
Stephen N.
Validated Reviewer
Review Source
content
Business partner of the vendor or vendor's competitor, not included in G2 scores.

"Great Experience using this servise"

What do you like best?

WS Security Hub provides a comprehensive view of your high-priority security alerts and compliance status across AWS accounts.

What do you dislike?

I wasn't too sure what to expect when taking up services, but the professionalism from the site to the customer services is the slickest i have ever experienced.

What business problems are you solving with the product? What benefits have you realized?

range of powerful security tools at your disposal, from firewalls and endpoint protection to vulnerability and compliance scanners.

What Other IT Security solution do you use?

Thanks for letting us know!
AWS Security Hub review by User
User
Validated Reviewer
Review Source
content

"My 1 year Experience"

What do you like best?

The features that are provided by AWS Security Hub are very useful to my organization. I am able to save a lot of time through the security findings that this service provides.

What do you dislike?

Sometimes the security alerts are delayed by 30 min which I would recommend Amazon to fix as soon as possible.

Recommendations to others considering the product

Be thorough with the pricing before you actually purchase the subscription.

What business problems are you solving with the product? What benefits have you realized?

I handle quite sensitive data for my organization, to secure it and my other programs I use this service.

AWS Security Hub review by User
User
Validated Reviewer
Review Source
content

"Organize your security alerts"

What do you like best?

This is a valuable tool to prioritize and organize all of your security alerts/compliance.

What do you dislike?

I have nothing bad to say about this. This makes security easy.

What business problems are you solving with the product? What benefits have you realized?

It organizes all of your security tools in one place and eliminates the need to switch back and forth.

There are not enough reviews of AWS Security Hub for G2 to provide buying insight. Below are some alternatives with more reviews:

1
Darktrace Logo
Darktrace
4.1
(24)
The enterprise immune system
2
Esker on Demand Logo
Esker on Demand
4.6
(16)
Esker on Demand is a cloud-based document process and information exchange service that enables companies to automate the processing and exchange of crucial business documents it include rapid project go live, increased profitability, pay only for what you use, and low risk.
3
Apple Support Number Logo
Apple Support Number
4.4
(14)
Apple Support Number offers Apple customer service for MacBook, iPad, iPhone and iTunes.
4
Prey Logo
Prey
4.6
(9)
Prey is an Anti-Theft and management application that helps you keep track and secure your laptop, phone and tablet.
5
Outlook Password Recovery Logo
Outlook Password Recovery
3.7
(7)
Outlook Password Recovery software is a software that can to reset forgotten Outlook PST password, support to recover longer and multilingual password and unlock protected PST file within seconds and get data from protected PST file without any data defeat.
6
Palo Alto Networks URL Filtering PAN-DB Logo
Palo Alto Networks URL Filtering PAN-DB
4.8
(6)
The majority of attacks and exposure to malicious content occurs during the normal course of web browsing activities, which requires the ability to allow safe, secure web access for all users. URL Filtering with PAN-DB automatically prevents attacks that leverage the web as an attack vector, including phishing links in emails, phishing sites, HTTP-based command and control, malicious sites and pages that carry exploit kits.
7
Palo Alto Networks Wildfire Logo
Palo Alto Networks Wildfire
4.1
(6)
WildFire cloud-based threat analysis service is the industrys most advanced analysis and prevention engine for highly evasive zero-day exploits and malware. The cloud-based service employs a unique multi-technique approach combining dynamic and static analysis, innovative machine learning techniques, and a groundbreaking bare metal analysis environment to detect and prevent even the most evasive threats.
8
Stellar Phoenix Mac Data Recovery Logo
Stellar Phoenix Mac Data Recovery
4.4
(4)
This is a rescue application which retrieves deleted data from a Mac hard drive. A number of storage devices it can support ranges from SSDs, USB, external hard drives, Time Machine and password protected media. Compatible with macOS Sierra 10.12.
9
Rocket Servergraph Logo
Rocket Servergraph
5.0
(3)
Rocket Servergraph reduces the cost and complexity of monitoring/reporting of backup environment across heterogeneous platforms and applications.
10
mSpy Logo
mSpy
4.7
(3)
mSpy is a computer security for parental control. Helps parents to give attention to their children online activities. It checks WhatsApp, Facebook, massage and snapchat messages.
Show more
Kate from G2

Learning about AWS Security Hub?

I can help.
* We monitor all AWS Security Hub reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. Validated reviews require the user to submit a screenshot of the product containing their user ID, in order to verify a user is an actual user of the product.