Increased cloud visibility and security

1 October 2020 Cyber Security

Sophos recently announced that Intercept X for Server Advanced with EDR has been enhanced with cloud visibility features from Cloud Optix. This integration gives customers critical insights into their wider cloud environments, including security groups, hosts, shared storage, databases, serverless, containers, and more in addition to the details on AWS, Azure, and GCP cloud workloads.

“Intercept X Advanced for Server with EDR and Intercept X Advanced with EDR give organisations visibility and protection across their cloud, on-premises, and virtual estates. Cloud Optix shines a spotlight on complete cloud environments, showing what’s there, what needs securing, and making sure that everything stays safe and secure,” said Richard Beckett, public cloud senior product marketing manager at Sophos. “The dynamic nature of cloud environments – with assets being spun up and down as and when necessary to meet changing demands – can make security and compliance assessments time-consuming. In many cases, organisations need to log into multiple consoles and manually collate information to get a full picture. With Sophos, it’s easy as organisations get details about the entire cloud infrastructure across different public cloud providers on one screen, in a single management console and can dive directly into assets to get more detail about the organisation’s asset inventory and cloud security posture.”

Key features

• Cloud asset inventory – see a detailed inventory of your entire cloud infrastructure (e.g. cloud hosts, serverless functions, S3 buckets, databases, and cloud workloads), eliminating the need for time-consuming manual collation.

• Access and traffic anomaly detection – unusual login attempts and suspicious traffic patterns are automatically detected and blocked or flagged to the admin as appropriate.

• Security scans – daily and on-demand scans monitor your cloud environment to ensure its ongoing security. Issues are automatically resolved where possible, with admin notification if manual intervention is required.

• Configuration guardrails – stop accidental or malicious tampering with configurations that could negatively impact security posture.

• Compliance policies – ensure that your cloud environment conforms to the Centre for Internet Security (CIS) best practices, helping keep your security posture at its best.

• Alert management integrations – receive email notifications when manual intervention is required.

For more information go to www.sophos.com




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Why security integration is important
Issue 9 2020 , Cyber Security
Adrienne Campbell says the integration of physical and network security is important and offers eight reasons why.

Read more...
Ensure cybersecurity at the edge
Issue 9 2020 , Cyber Security
Organisations must be aware of the increased need to protect the edge of the network and prioritise cybersecurity before an attack happens.

Read more...
Protecting ICS and SCADA systems
Issue 9 2020 , Cyber Security
Check Point Software´s new rugged gateway secures industrial control systems and critical infrastructures against the most advanced cyber-threats.

Read more...
Cyber defence in an era of digital dependency
Issue 9 2020 , Cyber Security
Businesses across the globe have typically taken an immature approach to cybersecurity, believing that a firewall is an adequate fortress to defend their intellectual property.

Read more...
Improved resilience and simplicity
Issue 9 2020 , Cyber Security
Cisco helps its customers and partners to reimagine the way they work, with security innovations across its portfolio designed to offer greater agility, simplicity and resilience.

Read more...
Internet of threats
Issue 9 2020 , Cyber Security
Internet-connected devices can make us more efficient, save time and money, and allow us connectivity from almost anywhere, but they also require that we share more information than ever.

Read more...
New privacy protocol
Issue 9 2020 , Cyber Security
The @ Company is creating a more human-centric Internet built on people owning and controlling their personal data.

Read more...
Behaviour is the key
Issue 9 2020, J2 Software , Cyber Security
When it comes to behaviour, visibility into human and system behaviour is key to spotting problems before they turn nasty.

Read more...
Securing the public sector
Issue 9 2020 , Cyber Security
The public sector is under threat, facing multiple attacks from multiple vectors that threaten security and systems.

Read more...
Mitigating the human risk in cybersecurity
Issue 9 2020, Technews Publishing , Cyber Security
Technology can only do so much. Humans are still the biggest cyber risk, putting organisations in jeopardy through careless or even malicious actions.

Read more...