SYS-CON MEDIA Authors: Elizabeth White, Pat Romanski, Liz McMillan, Zakia Bouachraoui, William Schmarzo

News Feed Item

RedLock Enhances Visibility, Compliance Assurance, and Threat Detection Capabilities With Microsoft Azure

RSA Conference – RedLock, an industry leader in Cloud Threat Defense, today announced enhanced capabilities to help Microsoft Azure customers identify security and compliance risks in their cloud environments. RedLock’s recent integration with Azure Network Watcher provides a richer understanding of network traffic patterns and is another valuable data source for the RedLock Cloud 360™ platform.

Azure Network Watcher is a network monitoring and diagnostic service that collects Network Security Group (NSG) Flow Logs. The integration enables customers to monitor virtual machines, network security and security group views, as well as topologically visualize their network traffic in their Azure environment to detect advanced threats such as cryptojacking, lateral movement, and data exfiltration. RedLock serves the needs of enterprises seeking to ensure compliance, govern security, and enable security operations across Azure environments.

With the integration of Azure Network Watcher, the RedLock Cloud 360 platform now provides a comprehensive set of features for Azure environments that include:

  • Asset Discovery and Inventory: Discover all assets in an environment such as Azure Virtual Machines, Azure SQL Databases and Azure Storage, and view them in one place.
  • Compliance Reporting: Assess and report on compliance against industry standards such as CIS, NIST, SOC 2, and PCI.
  • Policy Guardrails: Leverage custom and out-of-the-box policies to rapidly detect and respond to risky configurations and sensitive user activities.
  • Threat Detection: Detect network intrusions, account compromises, and insider threats by establishing behavior baselines and flagging any deviations.
  • Incident Investigation: Investigate current threats or past incidents and quickly determine the root cause.
  • Contextual Alerts: Prioritize and respond to issues based on context about all the risk factors associated with a resource.
  • Enterprise Integrations: Integrate with popular vulnerability management solutions, threat intelligence feeds, and Security Incident and Event Monitoring (SIEM) platforms.

“Microsoft Azure has experienced a tremendous surge in customers and revenue,” said Varun Badhwar, CEO and co-founder of RedLock. “Azure’s success is more proof that enterprises are accelerating their journey to public cloud. The RedLock Cloud 360 platform enables Chief Information Security Officers (CISOs) within those enterprises to confidently support those efforts by offering unprecedented visibility and control in the cloud. RedLock is honored to be an early technology partner for Azure Network Watcher and participate in the Microsoft One Commercial Partner Program.”

“Microsoft Azure delivers enterprise-grade cloud services to the world’s most demanding enterprises,” said Vijay Tinnanur, principal program manager, Microsoft Azure Networking at Microsoft Corp. “By augmenting its existing threat defense capabilities for Azure with network monitoring visualization, RedLock is supplementing security and compliance protections for Azure customers, helping their resources stay safe, secure and uncompromised.”

Read more about RedLock’s support for Azure Network Watcher at https://blog.redlock.io/increasing-azure-visibility-with-network-watcher-and-redlock, and more about how RedLock enables deeper visibility into risks within Azure environments at https://redlock.io/platform/microsoft-azure-security-compliance.

MORE

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
Your job is mostly boring. Many of the IT operations tasks you perform on a day-to-day basis are repetitive and dull. Utilizing automation can improve your work life, automating away the drudgery and embracing the passion for technology that got you started in the first place. In this presentation, I'll talk about what automation is, and how to approach implementing it in the context of IT Operations. Ned will discuss keys to success in the long term and include practical real-world examples. Ge...
ClaySys Technologies is one of the leading application platform products in the ‘No-code' or ‘Metadata Driven' software business application development space. The company was founded to create a modern technology platform that addressed the core pain points related to the traditional software application development architecture. The founding team of ClaySys Technologies come from a legacy of creating and developing line of business software applications for large enterprise clients around the ...
Organize your corporate travel faster, at lower cost. Hotailors is a next-gen AI-powered travel platform. What is Hotailors? Hotailors is a platform for organising business travels that grants access to the best real-time offers from 2.000.000+ hotels and 700+ airlines in the whole world. Thanks to our solution you can plan, book & expense business trips in less than 5 minutes. Accordingly to your travel policy, budget limits and cashless for your employees. With our reporting, int...
Crosscode Panoptics Automated Enterprise Architecture Software. Application Discovery and Dependency Mapping. Automatically generate a powerful enterprise-wide map of your organization's IT assets down to the code level. Enterprise Impact Assessment. Automatically analyze the impact, to every asset in the enterprise down to the code level. Automated IT Governance Software. Create rules and alerts based on code level insights, including security issues, to automate governance. Enterpr...
The benefits of automated cloud deployments for speed, reliability and security are undeniable. The cornerstone of this approach, immutable deployment, promotes the idea of continuously rolling safe, stable images instead of trying to keep up with managing a fixed pool of virtual or physical machines. In this talk, we'll explore the immutable infrastructure pattern and how to use continuous deployment and continuous integration (CI/CD) process to build and manage server images for any platfo...
DevOpsSUMMIT at CloudEXPO, to be held June 25-26, 2019 at the Santa Clara Convention Center in Santa Clara, CA – announces that its Call for Papers is open. Born out of proven success in agile development, cloud computing, and process automation, DevOps is a macro trend you cannot afford to miss. From showcase success stories from early adopters and web-scale businesses, DevOps is expanding to organizations of all sizes, including the world's largest enterprises – and delivering real results. Am...
ICC is a computer systems integrator and server manufacturing company focused on developing products and product appliances to meet a wide range of computational needs for many industries. Their solutions provide benefits across many environments, such as datacenter deployment, HPC, workstations, storage networks and standalone server installations. ICC has been in business for over 23 years and their phenomenal range of clients include multinational corporations, universities, and small busines...
The current environment of Continuous Disruption requires companies to transform how they work and how they engineer their products. Transformations are notoriously hard to execute, yet many companies have succeeded. What can we learn from them? Can we produce a blueprint for a transformation? This presentation will cover several distinct approaches that companies take to achieve transformation. Each approach utilizes different levers and comes with its own advantages, tradeoffs, costs, risks, a...
This session describes how Professional Services organisations can deliver within Technology-as-a-Service (IaaS) constructs, in private and public enterprise cloud scenarios. See how professional services can be packaged and funded by IaaS cash flows, based upon consumption of technology services. Learn how significant, IT infrastructure transformations can be funded through OPEX spending models with multi-year As-a-Services based contracts. Understand how the automation of repeatable services c...
This sixteen (16) hour course provides an introduction to DevOps, the cultural and professional movement that stresses communication, collaboration, integration and automation in order to improve the flow of work between software developers and IT operations professionals. Improved workflows will result in an improved ability to design, develop, deploy and operate software and services faster.
Enterprises are universally struggling to understand where the new tools and methodologies of DevOps fit into their organizations, and are universally making the same mistakes. These mistakes are not unavoidable, and in fact, avoiding them gifts an organization with sustained competitive advantage, just like it did for Japanese Manufacturing Post WWII.
Most modern computer languages embed a lot of metadata in their application. We show how this goldmine of data from a runtime environment like production or staging can be used to increase profits. Adi conceptualized the Crosscode platform after spending over 25 years working for large enterprise companies like HP, Cisco, IBM, UHG and personally experiencing the challenges that prevent companies from quickly making changes to their technology, due to the complexity of their enterprise. An accomp...
Cloud computing is a goal aspired to by all organizations, yet those in regulated industries and many public sector organizations are challenged in adopting cloud technologies. The ability to use modern application development capabilities such as containers, serverless computing, platform-based services, IoT and others are potentially of great benefit for these organizations but doing so in a public cloud-consistent way is the challenge.
The digital transformation is real! To adapt, IT professionals need to transform their own skillset to become more multi-dimensional by gaining both depth and breadth of a wide variety of knowledge and competencies. Historically, while IT has been built on a foundation of specialty (or "I" shaped) silos, the DevOps principle of "shifting left" is opening up opportunities for developers, operational staff, security and others to grow their skills portfolio, advance their careers and become "T"-sh...
"Calligo is a cloud service provider with data privacy at the heart of what we do. We are a typical Infrastructure as a Service cloud provider but it's been designed around data privacy," explained Julian Box, CEO and co-founder of Calligo, in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.