Actionable Audit

”Cloudvisory hardens security, defeats attackers, speeds up cloud operations and keeps us compliant!"

Fortune 100 Healthcare

Continuous Discovery
Automatically and continuously discover,
and identify infrastructure, network
data flows, and existing security policies
Visualization
Generate hybrid/multi-provider visual
maps of enterprise cloud applications
with their data flows and deployed
security rules
Audit Reports
Generate detailed audit reports from
the discovered infrastructure that highlight
critical risks to be remediated

Actionable Audit is a continuous process to identify risk and threat

Audit feeds Compliance Assurance

Actionable audit filters so that identified risks can be immediately turned into Compliance guardrails that run continuously.

Compliance Assurance

”Cloudvisory hardens security, defeats
attackers,speeds up cloud operations
and keeps us compliant!"

Fortune 100 Healthcare

Check System Health
Identify risks through adhoc
audit queries that can be turned
into compliance checks that
run automatically
Create Reports
Create comprehensive custom
reports or use existing frameworks
such as CIS/NIST/PCI Benchmarks.
Alert & Enforce
Compliance reports run
continuously and send alerts when
violations are identified. They can
even be configured to auto-remediate
the errors to keep the system secure.

Compliance guardrails represent a continuous process to identify risk
and threat

Actionable Audit and Compliance guardrails feed the microsegmentation Strategy

The information, risks and threats gained through Audit and Compliance help define the strategic polices for Automated microsegmentation.

Intelligent
Microsegmentation

“Microsegment by default. As a best practice, all security policies should be applied based on tags and memberships.”

Fortune 100 Healthcare

Utilize Discovered Data for Network Policies
The discovered infrastructure Context, actual
network flows, audit data and compliance information
are used to design segmentation policies
Design Security Policies
Security policies definitions are loosely
coupled to workloads through
environmental variables and tags/labels.
In this way, policy control is dynamic
and automatic
Automated Provisioning,
Monitoring and Enforcement

As the environment changes – spins up
additional or reduces number of workloads,
the required microsegmentation policies are
provisioned/de-provisioned immediately
based on workload context

Microsegmentation
prevents lateral
moving attacks

Decrease attack surface across public/private cloud and legacy datacenter environments

Discrete policies allow for powerful management, control, and security in dynamic cloud environments.

Automated Enforcement

“Micro-Segment by default. As a best practice,
all security policies should be applied based on
tags and memberships.”

Gartner

Identify
Continuous monitoring of network flows and native
security controls detects, block and quarantine
threats. Alerts are sent upon detection
of unauthorized change in the native-security rules.
Remediate
Configurable auto-rollback of
non-compliant changes of security policies.
Quarantine
If rogue network data flows are detected, indicating
a malware threat, workloads are quarantined to
protect the underlying deployment from breach.

Automated Enforcement with continuous monitoring to detect, block, and quarantine malicious threats

Remediate with configurable auto-rollback of non-compliant changes of security policies

Once policies are organized, established, and provisioned, environments must be monitored to ensure they are not compromised and confirm security is immutable