arctic wolf managed cloud monitoring solution

2
DATASHEET ©2020 Arcc Wolf Networks, Inc. All rights reserved. | Public Concierge Security Team The CST is your single point of contact for your Arcc Wolf Managed Cloud Monitoring soluon, and serves as your trusted security advisor and an extension of your internal team. The CST: X Customizes the soluon to your needs X Connuously scans your cloud environments for misconfiguraons, vulnerabilies, and indicators of compromise X Provides aconable remediaon guidance X Meets regularly with your team to guide and support strategic cloud security initaves Arctic Wolf Managed Cloud Monitoring Solution Continuous Cloud Monitoring Delivered by Our Concierge Security Team As businesses everywhere move further into the cloud, they face new security challenges. Legacy security tools, such as firewalls, advanced endpoint protecon, or SIEM appliances, cannot defend cloud workloads, and cloud vendors do not take responsibility for many key security areas. Businesses struggle to staff their teams with cybersecurity cloud experts. And the threat to cloud plaorms is rising. “44% of security threats exploit the cloud.” — Netskope Cloud and Threat Report Built on the industry’s only cloud-nave plaorm to deliver security operaons as a concierge service, Arcc Wolf ® Managed Cloud Monitoring lets you detect cloud vulnerabilies and aacks as they occur, across mulple major cloud plaorms. Your security operaons expert from the Concierge Security ® Team (CST) works directly with you, using their cloud security experse to guide implementaon, risk-surface idenficaon, and ongoing cloud monitoring to enhance your cloud security posture. Idenfy Idenfy exposed cloud plaorms and accounts to understand risk surface X Infrastructure Idenficaon X Broad Integraon X Shadow IT Awareness Monitor Watch for aacks across cloud services with tailored monitoring and alerng X SaaS Monitoring X IaaS Config Monitoring X Customized Rules Simplify Streamline cloud security with cloud experts, guided deployment, and ongoing management X CST Deployment X CST Management X Cloud Experse Comprehensive Visibility Into Your Cloud Security See the Big Picture Achieve security visibility across IaaS and SaaS plaorms in order to understand misconfiguraons, vulnerabilies, risks, and aacks. Bridge the Operational Gap Solve the cloud cybersecurity skills shortage with security operaons experts who understand your business and your cloud. Secure the Cloud Future Protect your ongoing cloud strategy with connuous management and expert security guidance.

Upload: others

Post on 16-Jan-2022

7 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Arctic Wolf Managed Cloud Monitoring Solution

DATASHEET

©2020 Arctic Wolf Networks, Inc. All rights reserved. | Public

Concierge Security Team The CST is your single point of contact for your Arctic Wolf Managed Cloud Monitoring solution, and serves as your trusted security advisor and an extension of your internal team. The CST:

XCustomizes the solution to your needs

XContinuously scans your cloud environments for misconfigurations, vulnerabilities, and indicators of compromise

XProvides actionable remediation guidance

XMeets regularly with your team to guide and support strategic cloud security initatives

Arctic Wolf Managed Cloud Monitoring SolutionContinuous Cloud Monitoring Delivered by Our Concierge Security Team As businesses everywhere move further into the cloud, they face new security challenges. Legacy security tools, such as firewalls, advanced endpoint protection, or SIEM appliances, cannot defend cloud workloads, and cloud vendors do not take responsibility for many key security areas. Businesses struggle to staff their teams with cybersecurity cloud experts. And the threat to cloud platforms is rising.

“44% of security threats exploit the cloud.”

— Netskope Cloud and Threat Report

Built on the industry’s only cloud-native platform to deliver security operations as a concierge service, Arctic Wolf® Managed Cloud Monitoring lets you detect cloud vulnerabilities and attacks as they occur, across multiple major cloud platforms. Your security operations expert from the Concierge Security® Team (CST) works directly with you, using their cloud security expertise to guide implementation, risk-surface identification, and ongoing cloud monitoring to enhance your cloud security posture.

Identify

Identify exposed cloud platforms and accounts to understand risk surface

X Infrastructure Identification

XBroad Integration

X Shadow IT Awareness

Monitor

Watch for attacks across cloud services with tailored monitoring and alerting

X SaaS Monitoring

X IaaS Config Monitoring

XCustomized Rules

Simplify

Streamline cloud security with cloud experts, guided deployment, and ongoing management

XCST Deployment

XCST Management

XCloud Expertise

Comprehensive Visibility Into Your Cloud Security

See the Big PictureAchieve security visibility across IaaS and SaaS platforms in order to understand misconfigurations, vulnerabilities, risks, and attacks.

Bridge the Operational GapSolve the cloud cybersecurity skills shortage with security operations experts who understand your business and your cloud.

Secure the Cloud FutureProtect your ongoing cloud strategy with continuous management and expert security guidance.

Page 2: Arctic Wolf Managed Cloud Monitoring Solution

DATASHEET | 2

Contact Us

arcticwolf.com 1.888.272.8429 [email protected]

©2020 Arctic Wolf Networks, Inc. All rights reserved. Arctic Wolf Networks, AWN and the Arctic Wolf Networks logo are trademarks of Arctic Wolf Networks, Inc. in the United States and/or other jurisdictions. Other names used in this document are for identification purposes only and may be trademarks of their respective owners.

SOC2 Type II Certified

©2020 Arctic Wolf Networks, Inc. All rights reserved. | Public

AW_DS_MANAGED CLOUD MONITORING_1120

CloudTrail, CloudWatch GuardDuty Azure Security Center Vulnerability data Config benchmarks

Flow data and IDS AD, DNS, DHCP Vulnerability data Config benchmarks Security event logs

Authentication Resource sharing Mail and file operations User, group permissions Admin activity

Sysmon and event logs Audit and asset data Vulnerability data Config benchmarks Containment

Infrastructure Identification Secure data across major IaaS platforms, with detection rules preconfigured to identify key vulnerabilities such as unsecured AWS S3 buckets.

Broad IntegrationManaged Cloud Monitoring connects to and monitors major IaaS and SaaS services, such as AWS, Azure, Salesforce, and Microsoft 365. Security incidents across cloud services are reviewed by the same security operations experts on the same single-pane security platform, which also extends visibility into networks and endpoints.

Arctic Wolf Managed Cloud Monitoring Capabilities

SaaS MonitoringMonitor SaaS solutions to detect key threats and IOCs, such as phished credentials, impossible travel, or malicious integrations, protecting key business activities and accounts.

IaaS Config MonitoringMonitor IaaS solutions for misconfigurations, vulnerabilities, discovery, remediation, and compliance reporting.