Hi [[ session.user.profile.firstName ]]

Monitoring your Infrastructure with Alerts and Triggers

The CloudKnox Cloud Permissions Management Platform can help you monitor your infrastructure by setting up Alerts and Alert Triggers. Learn more about your cloud security vulnerabilities with our complimentary Cloud Identity Risk Assessment: https://hubs.ly/H0FpPQH0
Recorded Jan 25 2021 4 mins
Your place is confirmed,
we'll send you email reminders
Presented by
CloudKnox
Presentation preview: Monitoring your Infrastructure with Alerts and Triggers

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Resolving Key New Cloud Infrastructure Security Risks to Achieve Zero Trust Jun 24 2021 5:00 pm UTC 60 mins
    CloudKnox
    Regardless of where your organization is in the cloud journey, it is critical to have proper cloud infrastructure security measures and policies in place – especially when it comes to managing cloud identities and permissions. To emphasize this point, CloudKnox Security recently released the industry's first State of Cloud Entitlements Report uncovering several new cloud security risk findings across the four key cloud infrastructures (AWS, Microsoft Azure, GCP, VMware vSphere).
    The report validates the importance of automating the rightsizing permissions across public, hybrid, or multi-cloud environments with a new approach: Cloud Infrastructure Entitlement Management (CIEM). Without CIEM, it’s nearly impossible to achieve Zero Trust compliance.

    On June 24th at 10 am PST, join Raj Mallempati, COO and Neil Walker, Cloud Solutions Architect of CloudKnox, as they discuss the State of Cloud Entitlement Report findings and what this means to enterprises across the world.
  • Taking a least privilege approach to manage identities in your AWS environment Recorded: May 26 2021 54 mins
    Nam Le, Sr. Solutions Architect - AWS Marketplace and Raj Mallempati, COO of CloudKnox Security
    Enterprises across the world continue to accelerate their digital transformation by rapidly adopting public cloud infrastructure. However, concerns about security and compliance remain the greatest barriers to cloud adoption. A major pillar of this is the ability to limit excessive user entitlements in order to reduce the risk exposure. As a result, the problem of Cloud Infrastructure Entitlement Management (CIEM) has become mission critical for organizations. CloudKnox and AWS are collaborating to enable you to protect your AWS resources and identities by providing comprehensive visibility, enabling continuous monitoring and automated remediation of permissions (granted versus used).

    Join AWS and CloudKnox on Wednesday, May 26th at 8am PT / 11am ET as we discuss the best practices in managing human and machine identities across your AWS environment.
  • Mind the "Permissions Gap" using CloudKnox, AWS Control Tower and AWS Config Recorded: May 4 2021 44 mins
    Kanishk Mahajan, ISV Solution Architecture Lead at AWS and Maya Neelakandhan, Head of Customer Success & Support at CloudKnox
    The delta between permissions granted to identities in the public cloud and those actually used is what we are calling the "Permissions Gap". We need to "mind the gap" to deliver on the promise of business agility in the cloud that balances developer freedom and velocity with security best practices.

    In this webinar we provide innovative approaches for automated permissions management in AWS using CloudKnox based on the integrations with AWS services specifically AWS Control Tower and AWS Config. The integration of CloudKnox SaaS with AWS Config continuously records and evaluates user access in AWS and then automates the rightsizing of IAM permissions in real time for the user. The integration of CloudKnox with AWS Control Tower is also available for download from the AWS Marketplace, and extends this automated permissions management and rightsizing to multi account AWS environments.

    Join us on May 4th at 10am PT / 1pm ET as we dive into how these integrations helps enterprises achieve their goal of automated right-sized permissions management in AWS.
  • How Pearson reduces their “Permissions Creep” in their AWS environment Recorded: Apr 28 2021 52 mins
    Muthu Meyyappan, VP, Security Engineering & Product Security Officer at Pearson; Raj Mallempati, COO at CloudKnox
    Organizations increasingly expand their cloud infrastructure operations and developers continue to increase their pace of innovation. As a result, Identity and Access Management and other security teams are stretched thin. Allowing for permissions creep to easily proliferate throughout the enterprise, increasing the attack surface. This is compounded by the fact that all of the cloud providers are adding new cloud services and functionality—and thus, new permissions—at a nearly daily frequency.

    Without properly managing all human and non-human identities and right-sizing permissions, permissions / privilege creep will remain a problem. This challenge is what Pearson set out to solve by gaining a level of holistic visibility of who can do what in the environment, and whether the status quo “what” is too permissive; and if so, how should they right-size permissions?

    Join Pearson and CloudKnox Security on Wednesday, April 28th at 10am PT / 1pm ET to hear how one of the leading media companies in the education world, uses CloudKnox’s PRIVILEGE CREEP INDEX™️ technology to automate the right-sizing of permissions across their AWS environment.
  • How to Evaluate Cloud Migration Milestones Recorded: Mar 30 2021 71 mins
    CloudKnox Security, Tugboat Logic
    In an ever-growing and evolving virtual landscape, cloud computing and storage are more vital than ever. The process of cloud migration can seem daunting. Knowing how to keep your cloud infrastructure secure during this process is even more of a challenge.

    Join CloudKnox Security, Tugboat Logic, and others as we walk through the best ways to help you hit your cloud migration milestones.
  • CloudKnox Compliance Dashboard and Reports Recorded: Mar 25 2021 6 mins
    CloudKnox
    The CloudKnox Cloud Permissions Management Platform can run reports to asses your cloud environment across multiple compliance standards. Learn more about your cloud security vulnerabilities with our complimentary Cloud Identity Risk Assessment: https://hubs.ly/H0FpPQH0
  • Mitigating Cloud Infrastructure Identity Risks – Strategies and Best practices Recorded: Mar 24 2021 58 mins
    Raj Mallempati, COO of CloudKnox Security and Jay Modh, Founder & CEO, IntuitiveVC & Intuitive Technology Partners
    Enterprises across the world continue to accelerate their digital transformation by rapidly adopting multi/hybrid-cloud infrastructure. Adoption of these technologies offers organizations opportunities to modernize services and transform operations. However, security and compliance risks remain the greatest barriers to cloud adoption. Combine this with the complexity of hybrid and multi-cloud environments and a shortage of skills; and you arrive at major roadblocks to achieving a Zero Trust framework. A major pillar of the Zero Trust model is the ability to limit excessive user entitlements in order to reduce the risk exposure. As a result, the problem of Cloud Infrastructure Entitlement Management (CIEM) has become critical.

    Join CloudKnox and Intuitive Technology Partners as we walk through the best ways to break down the barriers and map out how enterprises can achieve Zero Trust.
  • The CloudKnox Platform Deployment Architecture Recorded: Mar 15 2021 1 min
    CloudKnox
    The CloudKnox Cloud Security Platform is comprised of two components: Sentry & FortSentry

    Sentry is a Linux virtual machine that is installed in the customer environment. Our solution requires one Sentry appliance per cloud platform. Sentry collects the privileges and activity data of all unique identities that can touch the infrastructure from each cloud platform and uploads the data to the SaaS portal – FortSentry. If there is an external directory configured, the identity data will be pulled directly from the directory.

    Learn more about your cloud security vulnerabilities with our complimentary Cloud Identity Risk Assessment: https://hubs.ly/H0FpPQH0
  • The CloudKnox Platform Privilege On-Demand Workflow Recorded: Mar 15 2021 7 mins
    CloudKnox
    The CloudKnox Cloud Permissions Management Platform Privilege On-Demand workflow can help you temporarily grant privileges to identities on an as-needed basis.
    Learn more about your cloud security vulnerabilities with our complimentary Cloud Identity Risk Assessment: https://hubs.ly/H0FpPQH0
  • Protect your Infrastructure by Right sizing your Identities' Privileges Recorded: Mar 15 2021 7 mins
    CloudKnox
    The CloudKnox Cloud Permissions Management Platform can help you protect your infrastructure by right-sizing your Identities' Privileges with our JEP (Just Enough Privileges) Controller.
    Learn more about your cloud security vulnerabilities with our complimentary Cloud Identity Risk Assessment: https://hubs.ly/H0FpPQH0
  • Monitoring Privilege Creep across your Cloud Infrastructure Recorded: Mar 15 2021 9 mins
    CloudKnox
    As the leader in Cloud Infrastructure Entitlement Management (CIEM), the CloudKnox Cloud Permissions Management Platform offers continuous protection of your critical cloud resources from accidental misuse and malicious exploitation of permissions.
    Learn more about your cloud security vulnerabilities with our complimentary Cloud Identity Risk Assessment: https://hubs.ly/H0FpPQH0
  • The Future of Cyber & Cloud Identities Recorded: Mar 11 2021 62 mins
    Raj Mallempati, COO of CloudKnox & Josey George – Practice Head, Strategic Initiatives, Wipro
    Digital transformation in a post COVID world needs to be built on a foundation built on Cyber Resilience. Wipro’s State of Cybersecurity Report (SOCR) brings out key trends on nation state attacks, cyber weapons and measures that enterprises are gravitating towards for increasing confidence in cyber resilience. Organizations are increasingly willing to scale their applications and business data into various types of cloud environments to become nimble and address business needs. 86% of organizations are prioritizing Secure Cloud Migration to scale up quickly post COVID 19 situation. As consumption and migration to the cloud increases, a new problem looms large around managing over-permissioned identities.

    In this webinar we will discuss the key findings from SOCR and challenges faced in a cloud-native world. With evolution of cloud security, ongoing permissions and entitlements management is fundamental to protecting your organization from next generation of cloud security threats. Tune in for a live session with Wipro and CloudKnox to dive into insights from the State of Cybersecurity Report on future trends and predictions pertaining to the cybersecurity landscape.
  • Fireside Chat: A Zero Trust approach to Cloud Infrastructure Recorded: Feb 10 2021 23 mins
    CloudKnox Security and Horsley Bridge Partners
    Join Jon Roller, CIO of Horsley Bridge Partners, and Joshua Kirkes, Director of Technology and
    Cybersecurity at Horsley Bridge Partners as they speak with CloudKnox Security on the latest cloud infrastructure security trends and predictions for 2021. Topics include,:Cloud Infrastructure Entitlement Management (CIEM), and Zero Trust Access, amongst others.
  • Monitoring your Infrastructure with Alerts and Triggers Recorded: Jan 25 2021 4 mins
    CloudKnox
    The CloudKnox Cloud Permissions Management Platform can help you monitor your infrastructure by setting up Alerts and Alert Triggers. Learn more about your cloud security vulnerabilities with our complimentary Cloud Identity Risk Assessment: https://hubs.ly/H0FpPQH0
  • The Magic Behind Cloud Infrastructure Security Recorded: Jan 12 2021 43 mins
    Mike Raggo: Cloud Security Expert at CloudKnox, Mario Campisano: Sr. Security Engineer at GuidePoint, Mark Byrne: Magician
    Be dazzled by a brilliant magician while CloudKnox Security and GuidePoint Security discuss:

    - How to minimize your risk of exposing your organization to permissions misuse and abuse
    - What the top 5 cloud permissions risks are and how to remediate them to avoid mass destruction
    - How to uncover your cloud identity and access management risks to avoid insider threats and external attacks
  • Fast facts: Over-permission identities in the Cloud Recorded: Jan 6 2021
    CloudKnox
    Less than 1% of permissions granted are actually used, thus creating a huge delta and leaving cloud infrastructures vulnerable to attacks. We call this the Cloud Permissions Gap. Check out cloudknox.io to learn more.
  • Three steps to achieving TRUE cloud security Recorded: Dec 17 2020 49 mins
    Mike Raggo, CISSP, NSA-IAM, ACE, CSI: Cloud Security Expert at CloudKnox
    Achieving security in the cloud is an ever-moving target, making it challenging for security and cloud infrastructure teams to keep up with current risks, much less learn about new approaches. Over the past few years, too many global enterprises have fallen victim to hacks, attacks, and breaches, in many cases attributable to poor implementation of security policies and to the rise of human and non-human identities with excessive high-risk cloud permissions.

    Current approaches, such as traditional Role-based Access Controls (RBAC) and other labor-intensive manual processes were early attempts to stay one step ahead of breaches due to accidental misuse and malicious exploitation of permissions. But they simply don’t work in the cloud!

    In this webinar Michael Raggo of CloudKnox, will take a look at Gartner’s newly defined category called Cloud Infrastructure Entitlements Management (CIEM). CIEM defines the next generation of solutions for managing access to permissions and enforcing least privilege in the cloud.

    In this webinar, you will learn how to:

    • Discover who (identities) is doing what, where (resources) and when across your cloud infrastructure
    • Manage risk by giving identities just-enough and just-in-time permissions to perform their daily tasks and nothing more
    • Monitor identity activity changes and prioritize alerts based on risk level associated with anomalous behavior
  • Uncover 5 Hidden Risks that Can Expand Your Cloud Infrastructure Attack Surface Recorded: Oct 7 2020 30 mins
    Mora Gozani, Head of Marketing at CloudKnox, Jim Nowak, Cloud Security Expert, Neil Walker Cloud Security Expert
    You know your cloud environment is only as secure as your ability to properly assign, manage, and monitor your machine and human identity permissions. But, did you know that the delta between permissions granted and permissions used is sometimes as high as 99%? CloudKnox Security calls this the Cloud Permissions Gap, and sufficiently addressing the gap means tackling the hidden risks that are creating it or making it worse.
Your Cloud Permissions Management Content in ONE Place
Learn how to continuous protect of your critical cloud resources from accidents and malicious insiders.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Monitoring your Infrastructure with Alerts and Triggers
  • Live at: Jan 25 2021 4:30 pm
  • Presented by: CloudKnox
  • From:
Your email has been sent.
or close