Cloud Security

Security Monitoring of Cloud Platform and Cloud Applications

CHALLENGE:  Protecting confidential data in cloud environment

Enterprises are rapidly adopting cloud technologies, resulting in more and more data being pushed to the cloud environment. The traditional on premise security controls are no longer applicable, as enterprises are challenged with controlling access and movement of sensitive data to and from the cloud environment. Some of the key security concerns with adoption of cloud technologies include identify sensitive data movement in cloud, access control, unauthorized activities, privilege misuse or compromise, unauthorized sharing and data exfiltration.

SOLUTION:  Context-aware analytics and detection

Securonix cloud security analytics solution extends security monitoring to cloud infrastructure and applications. Securonix has built in API’s for all major cloud infrastructure and application technologies that enables the solution to analyze user entitlements and events to look for malicious activity. The solution correlates the cloud data with data from on premise devices to add entity context information and analyze end-to-end activities of the entity to detect actionable threat patterns.

In addition to detection of threat patterns, Securonix is only UEBA solution that also provides data classification and privileged access governance capabilities. With data classification, you can scan your cloud environment for sensitive data. The privileged access governance capability enables you to do dynamic access management using techniques such as peer group analysis. The solution also provides enterprises the ability to do periodic access reviews to sensitive data in cloud and manage access proactively to avoid data breaches.

BENEFITS: Proactive Not Reactive

Securonix gives organizations visibility into the highest risk activities in their environment and the tools to monitor, manage, report and investigate them

→  Predictive threat detection

→  Qualification of alerts through cross correlation with on premise log sources

→  Identification and reduction in sensitive data exposure

→  Access management and governance

→  Dynamic access controls to prevent authorized activities

→  Comprehensive threat response and investigation

→  Quantified threat and risk reporting

→  Compliance dashboards and visualization

Solution Tour

  • User Risk &Threat Monitoring

  • High Privileged Account (HPA) Monitoring

  • Application & Data Risk Monitoring

Securonix continuously builds a comprehensive risk profile of a user based on identity/employment, security violations, IT activity and access, physical access, and even phone records. All identity, activity, and access characteristics are compared to their baseline, their peers, and known threat indicators to identify true areas of risk. All results are scored and presented in interactive scorecards.

HPAs are a primary source of insider misuse and a platform for their attacks. Securonix automatically identifies HPAs such as administrator, service, and shared accounts then monitors them for abnormal behavior associated with an attack while linking the high-risk behavior back to a real user and their risk profile to give the potential threat full context.

Insiders attack sensitive data, transactions, or the systems that host them. Securonix addresses this threat by monitoring critical applications and systems at the transaction, data set, and sensitive user record level. Similar to a user, Securonix continuously builds a risk profile for all applications and systems identifying all high-risk users, access, and activity associated with their sensitive data and transactions. All results are scored and presented in application risk scorecards.