Cloud Native Threat Detection

Fire up Your Cloud Threat Detection Program

There are two types of companies: those that have been hacked, and those who don't know they have been hacked.
- John Chambers
cloud siem devices and sensors

See Everything

Comprehensively monitor events irrespective of cloud provider or service.

Cloud Native

An architecture that's born on the cloud, built on server-less infrastructure and integrates seamlessly with cloud native sources.

cloud native architecture

Threat Response

Integrate with SOAR platforms or write playbooks to mitigate threats in near realtime.

threat orchestration and response automation

Further Reading


16 AWS IAM Best Practices You Should Know

Before we get started with best practices around using AWS IAM, let’s get our head around some underlying concepts and risks associated with “not getting IAM right”.  Though this post uses AWS IAM as a reference point, readers & security

Read More »
aws security group

AWS Security Group Best Practices

What is a Security Group? An AWS security group is a virtual firewall which can be applied to one or more AWS resources to control its inbound  traffic. One thing to keep in mind is that AWS security groups are all permissive

Read More »
cert in 70b regulation

A Practical Approach to CERT-In 70B Compliance

CERT (Computer Emergency Response Team) India is a national nodal agency that’s been around since 2004 and responsible for responding to cyber security incidents as they occur. India has faced an increasing level of cyber attacks over the last few

Read More »

Ready to try?