RedLock is now a part of Palo Alto Networks - READ MORE
RedLock for Government

Securing Federal Public Cloud Environments

The Department of Defense and global brands trust RedLock to secure their public cloud environments.

Enabling Mission Critical Applications in the Cloud

RedLock enables agencies to confidently and seamlessly operate mission critical applications in public cloud environments.

RedLock - compliance assurance

Monitor, auto-remediate, and report on compliance using out-of-the-box policies for standards such as CIS, NIST CSF, SOC 2, PCI, and HIPAA.

RedLock - security governance

Get a real-time inventory of all assets, monitor for policy violations, and automatically remediates issues to maintain a clean security posture.

Security Operations

Prioritize vulnerabilities, detect threats, investigate incidents, and automatically remediate issues across your entire public cloud environment in minutes.

Security & Compliance is a Shared Responsibility

Cloud Security Shared Responsibility Model

The shared responsibility model of public cloud security clearly outlines the respective responsibilities of cloud service providers (CSP) and organizations. CSPs such as Amazon, Google, and Microsoft have rigorous security measures in place to address their obligations. Unfortunately, a vast majority of cloud security incidents to date have resulted from failures by organizations to implement proper in-cloud visibility tools, controls, and processes. To ensure security, agencies must address the following obligations in the shared responsibility model:

  • — Monitoring and remediating resource misconfigurations
  • — Detecting and remediating anomalous user activities
  • — Detecting and remediating suspicious network traffic
  • — Identifying vulnerable hosts

RedLock enables effective cloud threat defense across Amazon Web Services (AWS), Microsoft Azure, and Google Cloud environments. The RedLock Cloud 360™ platform leverages native cloud provider APIs to continuously aggregate volumes of configuration, user activity, host vulnerability and network traffic data without impeding DevOps. It applies artificial intelligence to correlate the data and enables you to address your obligations in the shared responsibility model.

Resource Configurations

While the cloud enables agility by allowing users to create, modify, and destroy resources on-demand, this often occurs without any security oversight. RedLock provides hundreds of out-of-the-box policies for common security and compliance standards such as CIS, NIST CSF, SOC 2, PCI, and HIPAA to monitor public cloud environments. You can rest assured that any misconfigurations of cloud resources such as Amazon S3, Azure Network Security Groups, and Google Compute Engine will be immediately detected and remediated.

resource configuration monitoring

User Activities

In cloud environments, multiple users have privileged access which enables productivity but creates greater risk of exposure. It is imperative to monitor users across your entire public cloud environment for anomalous activities. Unfortunately, the distributed nature of the cloud consisting of multiple accounts and regions makes this difficult. RedLock consumes audit logs from across your entire environment, enabling you to detect account compromises and insider threats.

user monitoring

Network Traffic

The absence of a physical network boundary to the internet increases the attack surface in the cloud by orders of magnitude. Monitoring network traffic is necessary for detecting nefarious activity such as cryptojacking. However, traditional tools create security blind spots since they cannot be deployed for monitoring traffic to API-driven services. RedLock surfaces intrusions and enables you to investigate and respond to threats in your public cloud environment.

network intrusion detection

Host Vulnerabilities

As is the case in on-premise environments, unpatched hosts in cloud computing environments are also vulnerable to attack. Relying on standalone vulnerability management tools is ineffective. These tools perform periodic scans of an environment to identify hosts with missing patches based on IP address. However, cloud environments are constantly changing and IP addresses are elastic, which makes the results unreliable. RedLock integrates with external vulnerability services to continuously scan your environment for unpatched hosts, especially those exposed to the internet.

Host Vulnerability Detection

RedLock Platform Security

The RedLock Cloud 360 platform is protected with multiple layers of security.

SOC 2 type II compliant
SOC 2 type II compliant

Runs on AWS which is SOC 2 type II, ISO 27001, HIPAA, and FedRAMP compliant
Runs on AWS which is SOC 2 type II, ISO 27001, HIPAA, and FedRAMP compliant

User behavior, network, and configuration monitoring with RedLock Cloud 360
User behavior, network, and configuration monitoring with RedLock Cloud 360

Continuous vulnerability management with AWS Inspector and other tools
Continuous vulnerability management with AWS Inspector and other tools

Identity and access management best practices (least privilege access, MFA, audit logging, etc.)
Identity and access management best practices (least privilege access, MFA, audit logging, etc.)

Data encrypted in transit and at rest (AES-256)
Data encrypted in transit and at rest (AES-256)

Want to Learn More?

Cloud Security Buyer's Guide

20+ tips based on the NIST Cybersecurity Framework to secure your AWS, Azure, and Google Cloud environments.

RedLock Cloud 360 Platform Demo

Get a demo of the RedLock Cloud 360 platform.

Securing Federal Public Cloud Environments

Learn how to defend against security and compliance risks across your AWS, Azure, and Google Cloud environments.

Get Started Today

Learn more about the RedLock platform or contact us for a free risk assessment.

Learn More Get a Free Risk Assessment