Tradition intrusion detection systems rely on IP addresses and hostnames to identify assets. This approach does not work well in multi-account and multi-cloud environments where there are VPCs with overlapping subnets. Cloudaware IDS pulls inventory data and unique identifiers such as instance ID from CMDB and then reconfigures a host-based IDS agent to apply labels and decorate every single event emanating from the host. All subsequent IDS events then contain relevant metadata about the host, such as tags, account IDs, account names, VPC names, etc.
Unlike other solutions existing on the market, Cloudaware not only pulls the event data but also decorates it with important attributes from Amazon Web Services.
Unlike other solutions existing on the market, Cloudaware not only pulls the event data but also decorates it with important attributes from Amazon Web Services.
Cloudaware IDS audits read and write access to application and operating system files. Each access attempt is assigned a score depending on the identity, type of access and outcome. File integrity monitoring is used to detect malware, rootkits, unauthorized software installations and irregular access or permission changes to sensitive data.
Combined with Intrusion Detection capabilities, FIM helps enterprises meet regulatory standards such as PCI, HIPAA, etc.
Cloudaware IDS monitors the behavior of Docker hosts and containers, detecting any threats, vulnerabilities and anomalies. This brings visibility into containers running in privileged mode, vulnerable applications, a shell running in a container, changes to persistent volumes or images, and other possible threats.
Cloudaware IDS has native integration with the Docker Engine. Cloudaware users can monitor images, volumes, network settings, and running containers.
IDS deployment for enterprise-size environments becomes as easy as 1-2-3 with Cloudaware Breeze. Kit up with a powerful adoption dashboard to view how fast your IDS coverage is growing.