The Cloudvisory Security Platform (CSP) delivers simple, single‑pane‑of‑glass management for multi‑cloud, multi‑account & multi‑tenant environments.


Wherever possible, CSP performs discovery, compliance & governance functions via cloud-native API integrations. Though the technical details of discovery, compliance & governance operations are specific to each cloud provider (e.g. AWS, Azure, Kubernetes, OpenStack, VMware) – CSP abstracts away the complexities of managing multiple cloud accounts spread across multiple cloud providers, providing deep visibility and drill-down audit capabilities within minutes of on-boarding new cloud provider accounts. Since CSP focuses on cloud-native integrations and security automation, on-boarding new cloud provider accounts is simple and easy. Choose between a SaaS offering or an on-premise deployment of CSP to meet your business requirements and start improving and tracking your cloud security posture with intelligence and speed.

Easy, centralized security management is extended to baremetal and other legacy datacenter deployments via a workload agent, but – unlike many competitors – Cloudvisory is agentless by default and provides agent-based approaches (for Linux and Windows operating systems) as a line of last resort.
aws azure openstack kubernetes data center google compute engine VMware

Cloudvisory groups product features into three categories:


Visibility builds upon automatic discovery of all cloud assets, security controls & security events. For the next level of cloud security maturity.

CSP empowers users to audit security controls and visualize security events for all cloud assets within scope for their organization and/or business unit(s). Mature multi-tenancy controls limit the scope for a given user/role to specific Business Unit(s) and/or Organization configured within CSP.
View Use Cases

Ad-hoc Audits
Drill-down on Risk Analysis and Multi-cloud Inventory; Pivot to actions that improve your security posture

Continuous Security Analytics
Customizable, historical data analytics built on a foundation of automatic asset discovery & configured Compliance Checks

Single-pane-of-glass Cloud Security
One user-interface unifies security activities across cloud providers, accounts, regions & deployments

Network Flow Visualization
Leverage deep visibility into the actual network behavior of all cloud workloads (without agents) to inform Compliance and Governance activities

Compliance automatically detects risks via configurable checks against known assets, controls & events while providing options (i.e. alert, report, remediate) for manual or automated responses.

CSP provides over 1,100 built-in Compliance Checks and makes it easy to customize existing checks and add new custom checks. Quickly convert (ad-hoc) Audit findings into continuous Compliance Guardrails (i.e. Compliance Checks that recur at some configurable interval) through a simple, point-and-click user interface. CSP tracks the complete history of Compliance Checks associated with Cloud Assets and provides rich reporting capabilities to meet internal and/or external requirements for Compliance Assurance. Easily generate and export CSP Reports in various formats (e.g. PDF, XLS, CSV) for all compliance checks (i.e. CSP Comprehensive Report) as well as for supported compliance standards, which include:
  • AWS CIS Benchmark
  • AWS NIST 800-53 Revision 4
  • AWS PCI DSS 3.2
  • Azure CIS Benchmark
  • Azure GDPR
  • Azure HIPAA
  • Azure NIST 800-53 Revision 4
  • Azure PCI DSS 3.2
  • CentOS CIS Benchmark
  • Kubernetes CIS Benchmark
  • OpenStack Security Checklist
  • Redhat CIS Benchmark
  • Ubuntu 16.04 CIS Benchmark
  • Ubuntu 18.04 CIS Benchmark
View Use Cases

Compliance Guardrails
Establish sensible limits on cloud self-service; Choose the desired response(s) to violations (e.g. alert, manual-remediation, auto-remediation)

Extendable Compliance Framework
Enable and customize over 1100 built-in Compliance Checks; Convert ad-hoc queries into recurring Compliance Checks; create new Compliance Checks with ease

Risk Analysis & Remediation
Assess and report-on historical trends in risks associated with multi-cloud assets; Remediate risks (manual or automatic) and track the effect(s) on your security posture

Vulnerability Management
Automatically detect, map & rank vulnerabilities throughout the cloud landscape; analyze and report-on the complete history of vulnerabilities, risks & remediations

Supported Compliance Standards


Governance goes beyond Compliance to continuously enforce "golden state" and/or least-privilege (e.g. microsegmentation) security policies throughout your cloud landscape.

Cloud security practices – and maturity levels – vary from one Organization to the next, and sometimes differ between Business Units within the same Organization. Cloudvisory allows Organizations and Business Units to implement cloud security governance according to their unique requirements and practices. Mature cloud security teams may use CSP to learn and enforce existing "golden state" cloud security policies, automatically detecting changes and generating corresponding alerts without interfering with existing business automation processes. Less mature cloud security teams may see "Automated Policy Governance" – including network microsegmentation – as the desired (i.e. "nirvana") state at the end of their cloud security journey. Building on the Visibility and Compliance features provided by CSP, all cloud security teams benefit from Machine Learning (AI) recommendations for improved Cloud Security Posture Management, where CSP Users may choose how to act on the actionable intelligence provided by CSP.
View Use Cases

Automated Policy Governance
Configure automatic remediation for "enforced" Compliance Guardrails; achieve and maintain zero-trust access controls (i.e. microsegmentation)

Cloud Security Policy Management
Continuously orchestrate the enforcement of desired-state policies throughout your cloud (and threat) landscape

Intelligent Microsegmentation
Machine Learning automatically recommends least privilege cloud-native firewall policies to protect workloads

Threat Detection & Response
Detect & isolate active threats in near-real-time, preventing the threat from spreading while recommending cloud security posture improvements

Related Materials