Id Genius - Public Cloud Protecion

Executive Summary

IdGenius public cloud protection enables threat defense and continuous compliance assurance. IdGenius TotalCloud Protection Platform leverages next generation AI and machine learning to identify, correlate, and monitor and audit security and compliance activity. With IdGenius, organizations are empowered to govern security and enable security operations across public cloud environments such as Amazon Web Services, Microsoft Azure, and GoogleCloud Platform.

IdGenius is a cloud native Software-as-a-Service (SaaS) solution that addresses cloud security scenarios relating toVisibility, Security Governance, Compliance Assurance. The business value derived from IdGenius include reduced financial risk due to security breaches, reduced cost of compliance reporting as well as reduced security operations associated with manual and redundant activity.

IdGenius Benefits

Security and Compliance Operations

  • Avoid manual one-time cloud security assessments
  • Eliminate manual log analysis
  • Eliminate need for home-grown or 3rd party SIEM integration
  • Enable security and compliance teams with continuous visibility and monitoring of public cloud environments

Cost Avoidance

  • Reduce the probability of financial and brand impact due to a security breach of public cloud resources
  • Reduce time and resources related to meeting compliance mandates such as NIST, PCI, SOC 2, HIPAA, GDPR,CIS and more
  • Reduce time and resources associated with application development security
  • Reduce security and compliance operations overhead

Total Public Cloud Protection

Organizations have shifted more than $30B (USD) into public cloud infrastructure over the past 5 years according Gartner. Public Cloud Computing is continuing to grow at a incredible pace that has become difficult for organizations to identify and manage public cloud resources, accounts and access activity. The growing shift to server-less computing introduces a new realm of application development security as it relates to managing and controlling access to computing resources. Protecting public cloud environments is unlike on-premises security where there’s
a physical network boundary that acted as a safeguard to a known perimeter. Instead cloud application migration and net new development is extremely decentralized and fraught with risk of accidental data exposure, leakage and credential misuse.

Public Cloud Providers operate with a shared responsibility model that holds organizations responsible and accountable for:

  • Proper Resource Configuration
  • Monitoring and Remediating Resources
  • Detect and remediate anomalous and suspicious account activity
  • Detect and remediate anomalous suspicious network activity
  • Identify and remediate host vulnerabilities

IdGenius Total Cloud Protection Platform leverages next generation AI and machine learning to identify, correlate, and monitor and audit security and compliance activity. With IdGenius, organizations are empowered to govern security and enable security operations across public cloud environments such as Amazon Web Services, Microsoft Azure, andGoogle Cloud Platform.

Visibility and Management of all Cloud Resources, Configuration and Access

Because the cloud affords increased agility by allowing users to create modify and scale infrastructure such as storage, network and computing resources with any IT or Security oversight, the risk of accidental misconfiguration is dramatically higher while the threat vector for malicious activity is easily exploitable.

Leverage pre-existing policies that align configurations with industry best practices such as NIST, CIS and PCI. New policies can be quickly configured for any organization’s requirements. IdGenius policies are continuously monitored for violations. Events are captured and alerts are triggered if policy violations are detected.

Identity and Access Governance

Cloud computing environments promote fluid de-centralized access grants. The distributed nature of cloud computing often leads to application developers requiring access to multiple accounts and regions. Access is granted in various methods including Account Permissions, Administrative Groups and Policies as well as IAM Roles.The growing number of legitimate cloud credentials creates security and compliance blind spots. By not properly managing the process for granting, changing and revoking access, an organization increases its risk for credential misuse and potential breach.

IdGenius correlates access to easily identify how access was granted and, more importantly to whom. Identifying which account is granted access is not enough as accounts can be used by people as well as internal and third-party services (via API). Public cloud environments do not correlate Identities to Accounts and make it difficult to differentiate between people and service accounts (APIs).

Network Threat Visibility and Remediation

A single configuration can expose an organization’s most sensitive data to immediate risk and breach. Logical configuration errors can lead to network to intrusion. Crypto-jacking is one example of how networks can be exposed to malicious activity. Traditional network monitoring ignores Identity Context as well as API activity. Beyond detecting suspicious IP addresses, IdGenius can correlate third party threat intelligent sources to quickly identify suspicious activity.

Host Threat and Vulnerability Management

Because the organization, not the cloud provider, is responsible for host management and patching, organizations are potentially exposed to inadvertent configurations on vulnerable hosts. In on-premise scenarios, static scans run to detect hosts with missing patches and updates based on static IP address assignments. Most organizations struggle with extending on-premise vulnerability management tools for cloud use which drastically more dynamic and de-centralized. IP addresses in public cloud environments are elastic and constantly changing.

IdGenius provides threat context required to identify which host vulnerabilities presents the greatest risk. Risk ranking is performed by correlating security data from your organization’s public cloud with third-party vulnerability management tools to provide effective visibility, monitoring and risk management.

STart your free trial