Hybrid Environment

Security for Hybrid Cloud

Visualization

  • Continuously discovers all public/private cloud native infrastructure objects.
  • Continuously discovers virtualized and bare metal servers as well.
  • Includes Workloads, services, existing security controls, data flows, etc.
  • Visual, searchable maps are created in the User Interface that are updated minute by minute.

Control

  • Auto-provisions native controls based on discovered data flows, tags, attributes and/or infrastructure memberships.
  • Automates granular micro-segmentation across providers for superior security
  • As workloads spin up, down or even move providers, Control automatically calculates and adjusts the necessary Security Policy changes.

Enforcement

  • Monitors real-time data flows between workloads and compares to deployed Security policies for compliance.
  • Monitors the amount of data transferred between the workloads to detect illegal activities.
  • Alerts on any violations, blocks them and can quarantine offending workload.
  • Monitors native enforcement points. Any accidental or malicious changes to native controls are immediately identified and rolled back.
  • Real-time maps that can be filtered for risk and compliance to security policies.