Product

Your blueprint for reducing cloud risk

See and secure your entire cloud environment through actionable context—so your security and development teams can proactively harden your cloud.

Wiz Security Graph shows the interconnections of every technology running in your cloud environment and visualizes the pathways to a breach.

Wiz Essential

A foundational cloud security product that offers any cloud user a simple way to prevent breaches by minimizing their attack surface through effective risk reduction.

Wiz provides coverage for AWS, Azure, GCP, OCI, Kubernetes, and Openshift.

AWS logoAzure logoGCP logoOCI logoKubernetes logoOpenshift logo

Agentless scanning

Wiz connects in minutes via a single connector (per cloud and Kubernetes environment) and achieves coverage in minutes without disrupting your business operations or requiring ongoing maintenance. It scales to any cloud environment with zero impact on resource or workload performance.

Completely agentless deployment delivers unmatched time to value and eliminates costly overhead or ongoing maintenance.

Foundational risk assessment

Continuously enforce correct configurations across cloud resources and monitor workloads for vulnerabilities (CVEs, end-of-life apps, unpatched OS), malware, and exposed secrets across packages, libraries, and applications. Wiz also calculates the net effective permissions so you can achieve least privilege access. A unified risk engine integrates:

  • Cloud Security Posture Management (CSPM)
  • Kubernetes Security Posture Management (KSPM)
  • Cloud Workload Protection (CWPP) + vulnerability management
  • Infrastructure-as-Code (IaC) scanning 
  • Cloud Infrastructure Entitlement Management (CIEM)
Only Wiz unifies CSPM, KSPM, CWPP, CIEM, and vulnerability management for unmatched risk clarity.

Graph visualization

The Wiz Security Graph shows the interconnections between technologies running in your cloud environment and visualizes the pathways to a breach. Query complex relationships across cloud layers enriched with meaningful context, all from a single console.

Wiz Security Graph shows the interconnection of every cloud resources, across users, accounts, and environments, regardless if it’s AWS, Azure, GCP, OCI, Kubernetes, or Openshift.

Toxic combinations

Focus only on the issues that actually matter. Wiz continuously analyzes configurations, vulnerabilities, network, identities and access, secrets, and more across accounts, users, and workloads to discover the critical issues that combined represent the real risk.

Wiz eliminates noisey alerts that lack context by automatically connecting the critical risk factors together without required specialized expertise or IT analysts.

Threat Center

Immediately identify workload exposure to the latest vulnerabilities sourced from Wiz Research along with numerous third-party threat intelligence feeds. Take remediation action with a single click or via automation rules.

Threat Center is powered by Wiz Research and several other open source vulnerability intelligence feeds to provide immediate insights into the latest threats.

Automations and dev tools

Wiz integrates with numerous messaging and ticketing platforms to easily route issues to the right teams for remediation. It has built-in support for numerous SIEM and SOAR tools, and webhooks for customizable remediation workflows.

Integrate with SIEM tools like Splunk, SOAR tools like Cortex, or leverage the fully exposed Wiz API for unlimited flexibility

Wiz Advanced

This new plan includes everything in Wiz Essential plus runtime threat insights, even deeper risk analysis, and granular customization.

Monitor and query cloud logs like flow logs, cloudtrail, audit logs, and GardDuty to gain runtime threat insights

Cloud Detection and Response

Wiz collects cloud events and alerts from multiple providers, including AWS CloudTrail, Azure Activity Logs, GCP Cloud Audit Logs, and Amazon GuardDuty. It provides context for the risks identified by the Wiz Security Graph and detects suspicious events and threats via rules continuously updated by Wiz Research. You can extend the agentless malware scanning with custom feeds and collect samples, workload logs, and other forensics from cloud workloads. Built-in dynamic scanning validates external exposures, simulating what a potential attacker sees from outside your environment.

Only Wiz offers fully automated attack path analysis to uncover advanced risks like lateral movement paths and privilege escalations

Advanced Control

In addition to the full stack capabilities (CSPM, KSPM, CWPP, CIEM, etc.) provided in Wiz Essential, automated Attack Path Analysis (APA) identifies the end-to-end attack paths that lead to high value assets such as admin accounts or critical data stores. Runtime container scanning is further enhanced with container registry scanning to identify vulnerable and non-compliant container images regardless of whether they are in use or not.

Wiz supports enterprise integrations like Snowflake, RegScale, ServiceNow VR, and Kenna among others

Advanced Workflow

Cloud environments perform optimally when processes are highly automated, which requires numerous points of integration into existing workflows across different teams. In addition to built-in remediation guidance and custom reporting, secure auto-remediation, custom dashboards, rules, and reports can be built per cloud project. Numerous integrations with third-party agents, ServiceNow VR, and managed Wiz Outpost deployment enable specialized customizations for any cloud environment.

“I have not seen anything else right now that can give you as big of an impact as Wiz.”

Igor Tsyganskiy    |    CTO, Bridgewater Associates

“The cloud went from being our least understood to our most understood space, and that was entirely due to Wiz.”

Greg Poniatowski    |    Head of Threat and Vulnerability Management, Mars

“Wiz is not just a point solution that identifies an isolated misconfiguration in a single layer of your cloud environment, but really one that can consolidate information across multiple layers of the cloud.”

Adam Fletcher    |    CISO, Blackstone
Wiz solution brief file

If you had one hour, how would you materially improve your cloud security posture?

Download the solution brief