Artificial Intelligence | News | Insights | AiThority
[bsfp-cryptocurrency style=”widget-18″ align=”marquee” columns=”6″ coins=”selected” coins-count=”6″ coins-selected=”BTC,ETH,XRP,LTC,EOS,ADA,XLM,NEO,LTC,EOS,XEM,DASH,USDT,BNB,QTUM,XVG,ONT,ZEC,STEEM” currency=”USD” title=”Cryptocurrency Widget” show_title=”0″ icon=”” scheme=”light” bs-show-desktop=”1″ bs-show-tablet=”1″ bs-show-phone=”1″ custom-css-class=”” custom-id=”” css=”.vc_custom_1523079266073{margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}”]

Armor, Adds Azure Native Logs to Its Industry-Leading Threat Detection and Response Product

Armor Secures Workloads Across Multi-Cloud, Hybrid and Private Cloud Environments

Armor, a leading global cloud security software company, announced that Azure native logs have been added to the list of data sources the Armor Anywhere security platform will ingest and correlate against cyberthreats.

Armor Anywhere provides organizations with unparalleled workload protection by analyzing and correlating data from hundreds of log sources against current and emerging threats. These data sources not only include cloud native logs from AWS, Azure and other cloud platforms, but logs from security devices and network appliances.

Recommended AI News: Affinitiv Announces New CEO to Lead the Company’s Next Phase of Transformative Growth

Equally as important to Armor’s customers is the ability to view and manage all of the cyber events across their environment from one central location. Armor enables this “single pane of glass” capability through its management portal.

Related Posts
1 of 9,214

Ingesting and correlating Azure native log sources:

  • Enhances Armor’s ability to detect and respond to threats targeting a customer’s Azure workloads.
  • Helps organizations manage the security of their hybrid and multi-cloud deployments from one central location (a single pane of glass) via the Armor Management Portal.
  • Accelerates the customer’s adherence to key compliance mandates such as the requirement to monitor and log security events generated by a customer’s Intrusion Detection or Intrusion Prevention System.

Recommended AI News: TTEC Announces New EMEA CX Service for Volkswagen Group UK

“Every day we are seeing more of our customers move their workloads to multi-cloud environments.  In order to continue to provide them with the very best security we needed to add cloud native logs to the data sources our platform consumes and analyzes,” said Mark Woodward, Armor CEO. “We started with AWS logs and have now added Azure logs. The response from our customers and partners, such as Crayon, has been tremendous. With our robust technology, combined with Crayon’s exceptional skill at designing and managing multi-cloud and hybrid cloud deployments, we can  future-proof the security and optimization of any workload anywhere.“

“Armor’s decision to support Azure native logs could not come at a better time. Just as Armor is seeing companies migrate their workloads to multi-cloud environments, we too are seeing a spike in the number of customers seeking help in designing, implementing, securing and managing a hybrid cloud or multi-cloud IT environment,” said Regina Manfredi, Senior Vice President, U.S. Sales for Crayon. “If a cloud environment is not secure and/or does not meet required compliance regulations, then this exposes a company to great risk. Robust and comprehensive security is a must, and we are delighted to have Armor as our security partner.”

Comments are closed, but trackbacks and pingbacks are open.