Sophos has announced the enhancement of Intercept X for Server Advanced powerful cloud visibility features from Cloud Optix.
This integration gives customers critical insights into their wider cloud environments, including security groups, hosts, shared storage, databases, serverless, containers, and more in addition to the details on AWS, Azure, and GCP cloud workloads.
“Intercept X Advanced for Server with EDR and Intercept X Advanced with EDR gives organisations unparalleled visibility and protection across their cloud, on-premises, and virtual estates. Cloud Optix shines a spotlight on complete cloud environments, showing what’s there, what needs securing, and making sure that everything stays safe and secure,” said Richard Beckett, Public Cloud Senior Product Marketing Manager, Sophos.
The dynamic nature of cloud environments – with assets being spun up and down as and when necessary to meet changing demands – can make security and compliance assessments time-consuming. In many cases, organisations need to log into multiple consoles and manually collate information to get a full picture.
“With these enhancements, organisations will get details about the entire cloud infrastructure across different public cloud providers on one screen, in a single management console, and can dive directly into assets to get more detail about the organization’s asset inventory and cloud security posture,” he added.
Some of its key features are:
- Cloud asset inventory– see a detailed inventory of your entire cloud infrastructure (e.g. cloud hosts, serverless functions, S3 buckets, databases, and cloud workloads), eliminating the need for time-consuming manual collation.
- Access and traffic anomaly detection– unusual login attempts and suspicious traffic patterns are automatically detected and blocked or flagged to the admin as appropriate.
- Security scans– daily and on-demand scans monitor your cloud environment to ensure its on-going security. Issues are automatically resolved where possible, with admin notification if manual intervention is required.
- Configuration guardrails– stop accidental or malicious tampering with configurations that could negatively impact the security posture.
- Compliance policies– ensure that your cloud environment conforms to Center for Internet Security (CIS) best practices, helping keep your security posture at its best.
- Alert management integrations– receive email notifications when manual intervention is required.
Do you have a story that you think would interest our readers? write to us firstname.lastname@example.org