Request a CloudKnox Identity Risk Assessment Today

Risk Assesment

Have questions?
Our sales team can answer them.

CloudKnox
Cloud Infrastructure
Security Platform

Continuously protects cloud infrastructure from insider threats and poor security hygiene by applying a lifecycle framework to managing identity privileges.

A Lifecycle Approach

The CloudKnox solution supports continuous, adaptive risk-based decision making as defined by Gartner's Continuous Adaptive Risk and Trust Assessment (CARTA) framework. Our cloud security platform continuously monitors, assesses, adapts and responds to IAM risk as needed in real-time.

Discover & Assess

  • Evaluate the risk of your identities and resources with a simple and powerful metric – the Privilege Creep Index and improve your risk posture— instantly.
  • Get a multi-dimensional view of your risk by assessing identities, actions, and resources.
  • Know your access keys –who are they assigned to, when were they used and what actions were performed.
PRIVILEGE
CREEP INDEX
RISK TREND
UNCOVER INACTIVE
IDENTITIES
ASSESS HIGH
RISK IDENTITIES
DISCOVER MACHINE
& HUMAN IDENTITIES
UNUSED PRIVILEGES =
AVOIDABLE RISK
USED PRIVILEGES =
ACTIVITY-BASED AUTHORIZATION
FILTER BY
RISK LEVEL
PRIVILEGE CREEP INDEX
FOR ACCESS KEYS
SET POLICY BASED
ON USAGE PATTERNS

Manage & Protect

  • Simplify privilege right-sizing and least privilege role creation across any cloud – with the click of a button. 
  • Remove unused or high-risk privileges for identities – automatically.
  • Grant privileges on demand for a scheduled period or an as-needed basis. 
CREATE CUSTOM ROLES
BASED ON ACTIVITY
ONE CLICK
REMEDIATIONS
LIMITED DURATION
PRIVILEGE ON DEMAND

Monitor & Alert

  • Continuously monitor identities, actions, and resource changes (the number of unused high-risk privileges, critical resources accessed, and more).
  • Detect and alert on anomalous activity (change in geo-location, client type, or unusual activity).
  • Get alerts through email or integrated third-party SIEM or SOAR tools.
MONITOR HIGH
RISK GROUP
UNUSED PRIVILEGES =
AVOIDABLE RISK
USED PRIVILEGES =
ACTIVITY-BASED AUTHORIZATION
FILTER BY
RISK LEVEL
ALL ACTIVE
RESOURCES
ACTIONS PERFORMED
ON RESOURCES
WHO IS TOUCHING
THE RESOURCE
WHICH POLICIES
APPLY TO RESOURCE
HOW WERE THE
POLICIES INHERITED
HOW WERE THE
POLICIES INHERITED

Incident Response & Forensics

  • Context-rich forensic reports around identities, actions, and resources to support a rapid investigation.
  • Quick access to a timeline of all identity activity and resources accessed.
  • Expedite security event triage with powerful data collection and export capabilities.
CROSS CLOUD
ACTIVITY

Audit & Reporting

  • Incisive out-of-the-box reports – so your team can get ahead of the risk.
  • Fully customizable reports to meet specific compliance reporting requirements. 
  • Scheduled or on-demand reports to be run and distributed by email.

Integrated Audit and Compliance Engine

DOWNLOAD FIXES

Continuously monitors and reports vulnerabilities, misconfigurations, and compliance violations for all private and public cloud infrastructure.

  • Hundreds of up-to-date built-in policies based on industry compliance standards and best practices
  • Download fixes for misconfigured policies or have CloudKnox remediate on your behalf
  • Report on current compliance posture and maintain historical snapshots – so you are always “audit-ready.”

Cloud Security Platform Capabilities

HYBRID/MULTI-CLOUD SUPPORT

CloudKnox supports all key cloud platforms: AWS, Azure, GCP, and VMware (NSX and vSphere).

CROSS-CLOUD DASHBOARD

Single interface with a consolidated multi-cloud view of all identities, actions and resources.

ACTIVITY-BASED AUTHORIZATION

Granular visibility and insights into every action performed by any identity across any resource.

Anomaly Detection

Detect and alert on anomalous activity such as unusual activity, geo-location, and client type.

Compliance Engine

Discover and fix violations against security best practices and compliance standards.