The CloudKnox Cloud Security Platform

Introducing a revolutionary way to manage identity privileges across hybrid cloud environments

OUR MISSION

To provide a single platform for managing the identity privilege lifecycle across your clouds, enabling significant reduction in risk against compromised credentials, accidents and malicious insiders.

VISIBILITY

Know your organization’s risk profile with a single metric based on your identities’ activity

INSIGHT

Gain insights into your identities’ – privileges, performed actions, and impacted resources

CONTROL

Right-size identity privileges based on day-to-day operational needs (revoke, grant, read-only)

VISIBILITY

Know your organization’s risk profile with a single metric based on your identities’ activity

INSIGHT

Gain insights into your identities’ – privileges, performed actions, and impacted resources

CONTROL

Right-size identity privileges based on day-to-day operational needs (revoke, grant, read-only)

CloudKnox provides an extensible platform that supports all private and public clouds including:

Gain access to a unique set of capabilities, that support identity authorization administration across your cloud infrastructure

  • Immediate visibility and insight into identities, privileges, actions and resources across your cloud infrastructure
  • Activity-based Authorization for any identity that touches your infrastructure including service accounts, bots, third parties or employees
  • JEP (Just Enough Privileges) Controller lets you automatically right size over-provisioned identity privileges and prevent privilege creep
  • ML-based anomaly detection and identity activity analytics to detect malicious identities across private and public cloud infrastructure
  • Forensic-quality activity data for easy compliance reporting and a powerful query interface to investigate security issues

Gain access to a unique set of capabilities that support identity authorization administration, across your cloud infrastructure

  • Immediate visibility and insight into identities, privileges, actions and resources across your cloud infrastructure
  • Activity-based access controls for any identity that touches your infrastructure including service accounts, bots, third parties or employees
  • JEP (Just Enough Privileges) Controller lets you automatically right size privileges of over-provisioned identities to significantly reduce your threat surface
  • ML-based anomaly detection and identity activity analytics to detect malicious identities across private and public cloud infrastructure
  • Forensic-quality activity data for easy compliance reporting and a powerful query interface to investigate any security issues

RISK ASSESSMENT AND CONTINUOUS COMPLIANCE MONITORING

The CloudKnox platform continuously monitors the activity to assess risk and behavior and provides a single metric, the CloudKnox Risk Score, to track the risk. The score is a function of unused high-risk privileges by each identity. An identity with unused high-risk privileges will have a high-risk score.

Once you discover your initial risk score you can reduce it within a few hours. Ensure that your score remains low with CloudKnox’s risk monitoring capability which continuously collects the privileges and activity details of all unique identities and updates the risk score hourly.

ACTIVITY-BASED ACCESS CONTROLS

The inflexible nature of role-based access controls (RBAC) inevitably leads to identities acquiring more privileges than they will actually use. This default over-provisioning creates a significant yet avoidable risk. There is a better way – with activity-based access controls.

Activity-based access controls give you continuous granular insight into the tasks (activity) that each identity is using or not using. With this level of visibility, it becomes possible to accurately grant or revoke privileges for all identities with access to your infrastructure.

PRIVILEGE RIGHT SIZING WITH THE CLICK OF A BUTTON

Proprietary JEP (Just Enough Privileges) Controller gives you the ability to reduce your risk profile by revoking the unused high-risk privileges for each unique identity with the click of a button.

CloudKnox’s JEP Controller allows you to automate and simplify the management of identity privileges across any of your private or public cloud platforms, and immediately implement measures to improve your security posture against insider threats.

AUDIT, REPORTING AND FORENSICS

Out-of-the-box, fully customizable reports, based on audit-quality logs, make it easy to demonstrate compliance to your auditors at any point in time.

Integrated report generation allows you to quickly show auditors:

WHICH

privileges have been granted but not used

WHAT

identity has performed an action on which resource

HOW

privileges have been right-sized to mitigate risk

REPORTING MADE EASY

Creating or editing a report can be done in minutes through an intuitive dashboard. No scripting knowledge is required to create new reports, which can easily be exported to .CSV or .PDF files and saved. Reports can also be scheduled to run and distributed via email on a daily, weekly, monthly or custom basis.

Create new reports without scripting

Easily export to .CSV or .PDF files

Schedule reports daily, weekly, monthly or custom basis

Search engine-like functionality

Rapidly search and investigate incidents, changes or anomalies. Type-ahead technology automatically assists search across any characteristic – Identity, Resource, and Privilege.

IDENTITY (USER)

Examine each identity by activity and resource impact. Monitor login times, client type and location.

RESOURCE (SCOPE)

Inspect a specific resource and all related activity along with the identities that have touched it.

PRIVILEGE (TASK)

Analyze specific high-risk privileges such as “destroy” or “snapshot” and access a comprehensive list of identities that have used them.

Rapid Time-to-Value

Most IT teams have their hands full just keeping up with the basic infrastructure so CloudKnox developed a product that is easy to install and simple to manage.  With no proxy required, CloudKnox customers are able to move from deployment to operations in less than a day.   

CloudKnox Architecture

CloudKnox FortSentry – FortSentry is multi-tenant SaaS service hosted in a cloud. It is the central portal from where CloudKnox is administered.

CloudKnox Sentry – Sentry is responsible for collecting the privileges and activity data from the respective authentication system and authorization system. Sentry uploads all the data to the FortSentry system where the data is further processed by ML algorithms to generate data analytics. Sentry is packaged as a virtual machine and deployed within the authorization system.

Get our Solution Document now

Download the CloudKnox Security Solution Brief and learn about how CloudKnox delivers a non-intrusive path to managing the identity privilege lifecycle across any cloud, anytime without impacting productivity and trust.