SECURITY-AS-A-SERVICE BUILT FOR MICROSOFT AZURE

Similar documents
SECURITY-AS-A-SERVICE BUILT FOR AWS

SECURITY-AS-A-SERVICE

SIEMLESS THREAT MANAGEMENT

WITH ACTIVEWATCH EXPERT BACKED, DETECTION AND THREAT RESPONSE BENEFITS HOW THREAT MANAGER WORKS SOLUTION OVERVIEW:

NOTHING IS WHAT IT SIEMs: COVER PAGE. Simpler Way to Effective Threat Management TEMPLATE. Dan Pitman Principal Security Architect

SIEMLESS THREAT DETECTION FOR AWS

Microsoft Networking Academy

PT Unified Application Security Enforcement. ptsecurity.com

SOLUTION BRIEF RSA NETWITNESS SUITE 3X THE IMPACT WITH YOUR EXISTING SECURITY TEAM

TRUE SECURITY-AS-A-SERVICE

CLOUD WORKLOAD SECURITY

Securing Your Microsoft Azure Virtual Networks

DEFINING SECURITY FOR TODAY S CLOUD ENVIRONMENTS. Security Without Compromise

AZURE CLOUD SECURITY GUIDE: 6 BEST PRACTICES. To Secure Azure and Hybrid Cloud Environments

Securing Your Amazon Web Services Virtual Networks

RSA INCIDENT RESPONSE SERVICES

RSA NetWitness Suite Respond in Minutes, Not Months

SOLUTION BRIEF RSA ARCHER IT & SECURITY RISK MANAGEMENT

Privilege Security & Next-Generation Technology. Morey J. Haber Chief Technology Officer

THE ACCENTURE CYBER DEFENSE SOLUTION

Qualys Cloud Platform

RSA INCIDENT RESPONSE SERVICES

SYMANTEC DATA CENTER SECURITY

The Emerging Role of a CDN in Facilitating Secure Cloud Deployments

Network Security Protection Alternatives for the Cloud

Borderless security engineered for your elastic hybrid cloud. Kaspersky Hybrid Cloud Security. #truecybersecurity

A Risk Management Platform

Qualys Cloud Platform

Look Who s Hiring! AWS Solution Architect AWS Cloud TAM

SOLUTION BRIEF RSA NETWITNESS EVOLVED SIEM

Modern Database Architectures Demand Modern Data Security Measures

Pulse Secure Application Delivery

Windows Server The operating system

McAfee Public Cloud Server Security Suite

Unlocking the Power of the Cloud

Protecting Against Modern Attacks. Protection Against Modern Attack Vectors

Security and Compliance Powered by the Cloud. Ben Friedman / Strategic Accounts Director /

Security by Default: Enabling Transformation Through Cyber Resilience

Achieving Digital Transformation: FOUR MUST-HAVES FOR A MODERN VIRTUALIZATION PLATFORM WHITE PAPER

BUILDING SECURITY INTO YOUR DATA CENTER MODERNIZATION STRATEGY

SOC-2 Requirement Solution Brief. EventTracker 8815 Centre Park Drive, Columbia MD SOC-2

ISO/IEC Solution Brief ISO/IEC EventTracker 8815 Centre Park Drive, Columbia MD 21045

Hackproof Your Cloud: Preventing 2017 Threats for a New Security Paradigm

SIEM Solutions from McAfee

Accelerating the Business Value of Virtualization

SECURITY IN MICROSOFT AZURE. Marija Strazdas Sr. Solutions Engineer

BUILT TO STOP BREACHES. Cloud-Delivered Endpoint Protection

Five Essential Capabilities for Airtight Cloud Security

Getting Started with AWS Security

Services solutions for Managed Service Providers (MSPs)

Managed Endpoint Defense

in PCI Regulated Environments

DevOps and Continuous Delivery USE CASE

Security for the Cloud Era

SOLUTION BRIEF RSA NETWITNESS NETWORK VISIBILITY-DRIVEN THREAT DEFENSE

Christopher Covert. Principal Product Manager Enterprise Solutions Group. Copyright 2016 Symantec Endpoint Protection Cloud

Cyber Security Can Also Be a Profit Center

ALERT LOGIC LOG MANAGER & LOG REVIEW

Security Monitoring. Managed Vulnerability Services. Managed Endpoint Protection. Platform. Platform Managed Endpoint Detection and Response

Symantec Network Access Control Starter Edition

Securing the Software-Defined Data Center

Pasiruoškite ateičiai: modernus duomenų centras. Laurynas Dovydaitis Microsoft Azure MVP

to Enhance Your Cyber Security Needs

DEVOPSIFYING NETWORK SECURITY. An AlgoSec Technical Whitepaper

Perfect Balance of Public and Private Cloud

Building Resilience in a Digital Enterprise

RSA Advanced Security Operations Richard Nichols, Director EMEA. Copyright 2015 EMC Corporation. All rights reserved. 1

DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE

Traditional Security Solutions Have Reached Their Limit

PROTECT AND AUDIT SENSITIVE DATA

Product Security Program

Microsoft Security Management

SAP Cybersecurity Solution Brief. Objectives Solution Benefits Quick Facts

Lift and Shift, Don t Lift and Pray: Pragmatic Cloud Migration Strategies

Defense-in-Depth Against Malicious Software. Speaker name Title Group Microsoft Corporation

Overview. Application security - the never-ending story

Best Practices in Securing a Multicloud World

5 Trends That Will Impact Your IT Planning in Layered Security. Executive Brief

Stopping Advanced Persistent Threats In Cloud and DataCenters

SOLUTION BRIEF Fulfill the promise of the cloud

Safeguard Application Uptime and Consistent Performance

ArcSight Activate Framework

Security as Code: The Time is Now. Dave Shackleford Founder, Voodoo Security Sr. Instructor, SANS

FOR FINANCIAL SERVICES ORGANIZATIONS

Microsoft Operations Management Suite (OMS) Fernando Andreazi RED CLOUD

Cisco CloudCenter Use Case Summary

REALIZE YOUR. DIGITAL VISION with Digital Private Cloud from Atos and VMware

Hybrid Cloud 1. ebookiness created by the HPE Europe Division of Ingram Micro

A10 HARMONY CONTROLLER

DevOps Anti-Patterns. Have the Ops team deal with it. Time to fire the Ops team! Let s hire a DevOps unit! COPYRIGHT 2019 MANICODE SECURITY

Development. Architecture QA. Operations

USE CASE - HYBRID CLOUD IZO MANAGED CLOUD FOR AWS

McAfee epolicy Orchestrator

WHITE PAPER. Applying Software-Defined Security to the Branch Office

Continuously Discover and Eliminate Security Risk in Production Apps

We b Ap p A t ac ks. U ser / Iden tity. P hysi ca l 11% Other (VPN, PoS,infra.)

Are we breached? Deloitte's Cyber Threat Hunting

locuz.com SOC Services

Cloud for Government: A Transformative Digital Tool to Better Serve Communities

IBM Spectrum Protect Plus

Transcription:

Alert Logic Virtual Machines are Microsoft Azure Certified to ensure compatibility with the Azure platform. SOLUTION BRIEF: SECURITY-AS-A-SERVICE BUILT FOR MICROSOFT AZURE Alert Logic Security-as-a-Service solutions integrate cloud-based software, analytics and expert services to assess, detect and block threats to your Azure-hosted applications and help you comply with mandates like PCI, HIPAA and SOX COBIT. We focus on threats most relevant to cloud-hosted applications by defending each layer of your application and infrastructure stack against hard-todetect web application attacks such as SQL injection, path traversal and cross-site scripting as well as other server-side threats such as privilege escalation, brute force and advanced malware. Integrated expert services for threat detection, blocking and compliance augment your in-house security while empowering cloud and application professionals to better secure their environments. Reduce your risk by protecting your full application and infrastructure stack Add security experts to your team overnight without hiring staff Accelerate secure application deployments with API-driven automation and elasticity Protect your cloud applications from attacks with technology that doesn t impact performance Simplify and save with one service that works across cloud and on-premises environments Alert Logic has a head start in the cloud, and it shows Alert Logic is an excellent fit for clients looking to secure their current or planned cloud migrations, clients requiring a provider that can span seamlessly between hybrid architectures, and those that demand strong API capabilities for integrations. Forrester 2016 MSSP WAVE Report

SECURITY-AS-A-SERVICE FOR MICROSOFT AZURE 2 FOCUS ON THE MOST CLOUD-RELEVANT THREATS WITH FULL-STACK SECURITY Security in Microsoft Azure is a shared responsibility. Microsoft is responsible for security of the Cloud, such as physical security, instance isolation and protection for foundation services. You are responsible for security in the Cloud, meaning you must secure your applications and data within Azure. When moving from your own data center to cloud computing, your list of security responsibilities may actually be shorter. But that doesn t necessarily make it easier. Microsoft invests over a billion dollars annually in security, much of which is spent to secure their platforms against attacks at the network, infrastructure, and hypervisor layers. Users can implement automation and continuous patch management, to create immutable infrastructure that prevents host-based threats from retaining a foothold. Cloud innovations such as these are making it more difficult and less profitable for adversaries to attack the lower end of your application and infrastructure stack. While the bottom of the stack is hardening, the top is softening. Businesses are increasingly dependent on inherently vulnerable custom web applications. Accelerated by a potent mix of cloud architectures, DevOps practices, platforms and frameworks such as WordPress, Magento, PHP and ASP.NET, web applications are expanding the enterprise attack surface with more inherited vulnerabilities while inviting attacks that are increasingly difficult to detect. Web App Attacks POS Intrusions Miscellaneous Errors Privilege Misuse Cyber-espionage Everything Else Payment Card Skimmers Physical Theft/Loss Crimeware Denial of Service Web app attacks are now the #1 source of data breaches 1 47 74 89 UP 300% SINCE 2014 184 207 222 277 289 But less than 5% of data center security budgets are spent on app security Source: Gartner 571 $23 to $1 10% 20% 30% Web application attacks are the #1 source of breaches.

SECURITY-AS-A-SERVICE FOR MICROSOFT AZURE 3 COMMERCIAL & OPEN SOURCE COMPONENTS PACKAGED APPS Alert Logic invests in research and threat intelligence to understand vulnerabilities, exploits, methods and attack behaviors across each layer of your application and infrastructure stack and the open source and commercial components within them. We integrate these unique full-stack insights with other global sources of threat intelligence and content to continually enrich vulnerability scanning, threat detection analytics and blocking logic. The result: vulnerability scans, incident reports and live consultations that give you context and confidence to know when and where to act. APP FRAMEWORKS DEV PLATFORMS DATABASES MIDDLEWARE SERVER OS CLOUD MANAGEMENT HYPERVISOR NETWORKING REBALANCE YOUR DEFENSES FOR CLOUD THREATS Full-stack security includes continuously updated insights into vulnerabilities of 3rd party frameworks and libraries The Challenge Web applications have long been under-protected. Enterprise spending on network perimeter security has dwarfed application security 23:1, yet 59% of IT security professionals said traditional tools work somewhat or not at all in hyper scale cloud environments 2. Forcing cloud traffic to pass through perimeter appliances like next-generation firewalls and intrusion prevention appliances creates performance choke points and single points of failure that disrupt business and slow down production applications. The reflex to block more and more attacks at the perimeter is also increasingly ineffective. Blocking requires ultrahigh confidence decisions to be made in milliseconds, but a smaller percentage of attacks announce themselves so clearly anymore. Those responsible for the most breaches such as SQL injection and cross-site scripting often hide in plain sight and regularly slip past expensive nextgen firewalls undetected. Our Solution Alert Logic develops and uses multiple technologies to strike the right balance for cloud and hybrid environments. Web Security Manager Premier our managed, in-line Web Application Firewall (WAF) targets attacks that follow patterns consistent enough to trigger high-confidence millisecond blocking decisions. Web application security experts in our SOC continuously tune your blocking and white-listing logic to each of your applications to avoid false positives. The WAF is load-balanced in Azure to support cloud-scale application performance and availability. For the remaining majority of attacks, where there is no immediately clear black or white, we apply the gold standard of effective threat detection: analytics and experts together. The Alert Logic ActiveWatch threat detection service uses multiple layers of analytics, including machine learning and anomaly detection as well as signatures and rules. Analytics are used and enhanced by experts from a variety of disciplines including security research, threat intelligence, data science, and Security Operations Center (SOC) analysts. Together, they act as your virtual security team in the cloud, providing 24x365 monitoring, enriched incident reports, remediation advice and live notification within 15 minutes of critical incidents. Any company who needs to secure their Azure environment needs Alert Logic. There s simply nothing else on the market that can cover it effectively. Jonathan Ranes, CIO at Upsilon Payments

SECURITY-AS-A-SERVICE FOR MICROSOFT AZURE 4 ACCELERATE APPLICATION PRODUCTION WITH API-DRIVEN AUTOMATION AND AGILITY You can see cloud computing s disruptive effect on traditional enterprise security as application, operations and security teams struggle to reconcile opposing security models. The old world: weeks-long, change-controlled, manual releases into IT-controlled data centers guarded by perimeter firewalls. The new world: minutes-long, developer-controlled, automated releases and continuous delivery into cloud platforms where monolithic security gateways inhibit cloud-scale applications. Alert Logic helps bridge these two worlds with a single workload security solution that uses APIs to integrate into cloud, hosted and on-premises environments. For Azure, Alert Logic has designed security from the ground up for agility and scale. Our virtual appliances are Microsoft Azure Certified for use in Azure deployments, and our Azure Resource Manager (ARM) templates and orchestration tool recipes for Chef, Puppet and Ansible make it easy to blend security seamlessly into your production pipeline and dynamic production environment. Our integration with Azure makes it easy: Deploy directly from Azure Marketplace into your Azure VNets or security workgroups Embed security controls into your pipeline automation Ensure applications and data are protected as your Azure environment grows and changes dynamically Launch and monitor within Docker containers Eliminate repetitive manual tasks that can be prone to costly errors Alert Logic has enabled us to protect datacenters in our multi-cloud environment and we appreciate the security continuity we receive from Alert Logic as we move all-in on Azure. - Tom Cibelli, Solutions Engineering Manager at Bentley Systems

SECURITY-AS-A-SERVICE FOR MICROSOFT AZURE 5 SECURITY AS AN AGILE, CLOUD-SCALE SERVICE Deploying Alert Logic Cloud Defender in Microsoft Azure is fast and easy. Our software-as-a-service architecture scales to support large migrations and expanding deployments across multiple regions in Microsoft Azure, AWS and on-premises environments. 1. ActiveWatch is a managed threat detection service that combines anomaly detection and machine learning with 24x365 expert monitoring of Alert Logic deployments within your Microsoft Azure environment. ActiveWatch analysts provide live customer notification within 15 minutes of detecting high and critical priority attacks; providing specific and actionable details. 2. Alert Logic virtual machines are Microsoft Azure Certified and optimized for Azure to: Detect vulnerabilities and configuration issues in operating systems and applications Provide preliminary detection of intrusions, web application attacks and data exfiltration attempts prior to analysis by ActiveWatch service Consolidate and forward log collection data to the Alert Logic ActiveWatch service Deploy quickly and easily from Azure Marketplace or by using our Azure Resource Manager (ARM) templates or orchestration tools like Chef, Puppet and Anisble 3. Alert Logic data collection agents extract data from each layer of your Azure workloads and forward to Alert Logic virtual machines and the ActiveWatch service for further analysis, reporting and alerts. Data collected includes: Distributed network traffic (ingress/egress and lateral east/west traffic) Comprehensive logs (syslog, Windows event log, local flat files) Application HTTP session requests and responses

SECURITY-AS-A-SERVICE FOR MICROSOFT AZURE 6 4. Azure API Integration: Alert Logic integration with Azure APIs automates the collection of log data from Azure Monitor and Azure Storage Accounts (Blobs or Tables) such as Azure SQL or IIS logs from AppServices workloads for custom alerts and reporting. 5. Elastic Web Application Firewall: Web Security Manager Premier (WSMP) is an in-line, proxy-based Web Application Firewall (WAF) designed to stop web application attacks in real-time. WSMP is built to inspect HTTP traffic on Day 1 using out-of-the-box rules and signatures covering more than 10,000 vulnerabilities. Dedicated ActiveWatch experts work directly with customers to integrate, tune and customize each WSMP deployment to optimize detection and blocking protection. Integrated deployment with Azure Load Balancers ensures scalable performance with high availability. Gartner Research G00269825, Joseph Feiman, 2014 1 2016 Cloud Security Spotlight Report, Information Security Linkedin Group Partner, 2016 2 2017 Alert Logic, Inc. All rights reserved. Alert Logic and the Alert Logic logo are trademarks, registered trademarks, or servicemarks of Alert Logic, Inc. All other trademarks listed in this document are the property of their respective owners. 070717US