Palo Alto Systems (New york stock exchange: PANW), the worldwide leader in cybersecurity, announced today the combination of RedLock® and VM-Series for AWS® Security Hub, a brand new security service from Amazon . com Web Services, Corporation.
Palo Alto Systems emblem (PRNewsFoto/Palo Alto Systems, Corporation.) (PRNewsfoto/Palo Alto Systems, Corporation.)
Palo Alto Systems helps organizations with confidence move their applications and knowledge to AWS with inline, API-based and host-based protection technologies that actually work together to reduce chance of loss of data and business disruption. Building on native AWS security abilities, these protection technologies integrate in to the cloud database integration lifecycle, making cloud security frictionless for development, security and compliance teams.
AWS Security Hub is made to provide users having a comprehensive look at their high-priority security alerts and compliance status by aggregating, organizing and prioritizing alerts, or findings, from multiple AWS services, for example Amazon . com GuardDuty™, Amazon . com Inspector, and Amazon . com Macie™ in addition to using their company APN security choices. The findings will be visually summarized on integrated dashboards with actionable graphs and tables. Our joint customers may use these collaborative efforts to assist verify their applications and knowledge feel at ease.
- RedLock integration: RedLock by Palo Alto Systems further protects AWS deployments with cloud security analytics, advanced threat recognition and compliance monitoring. RedLock continuously collects and correlates log data and configuration information from AWS Config, AWS CloudTrail®, Amazon . com Virtual Private Cloud (Amazon . com VPC®) flow logs, AWS Inspector and Amazon . com GuardDuty to discover and send security and compliance alerts towards the AWS Security Hub console. The RedLock integration with AWS Security Hub provides additional context and centralized visibility into cloud security risks, allowing people to gain actionable insights, identify cloud threats, reduce risk and remediate occurrences, without impeding DevOps.
- VM-Series integration: The VM-Series next-generation firewall complements AWS security groups beginning with lowering the attack surface through application control policies, after which stopping threats and knowledge exfiltration within permitted traffic. The VM-Series integration with AWS Security Hub uses an AWS Lambda function to gather threat intelligence and send it towards the firewall being an automatic security policy update that blocks malicious activity. Because the Ip information changes, the safety policy is updated without administrative intervention.
"The Palo Alto Systems product integrations help customers verify their users, applications, and knowledge feel at ease via a single pane of glass. The RedLock integration enables people to monitor advanced threats because of common cloud misconfigurations, stolen credentials, and malicious user and network activities, as the VM-Series integration automates policies to bar malicious activity," stated Varun Badhwar, senior v . p . of merchandise and engineering for public cloud security at Palo Alto Systems. "With increased companies relocating to the cloud, it's vital the alert data they receive offers them with actionable insights to effectively combat cyberattacks."
About Palo Alto Systems
We're the worldwide cybersecurity leader, noted for always challenging the safety established order. Our mission would be to safeguard our method of existence within the digital age by stopping effective cyberattacks. It has provided us with the privilege of securely enabling thousands of organizations as well as their customers. Our pioneering Security Operating Platform emboldens their digital transformation with continuous innovation that seizes the most recent breakthroughs in security, automation, and analytics. By delivering a real platform and empowering an increasing ecosystem of change-makers like us, we offer impressive and innovative cybersecurity across clouds, systems, and cellular devices.
No comments:
Post a Comment