Armis, a global security provider of web-based visibility and security solutions, has chosen Radware’s Cloud Native Protector to protect its Amazon Web Services (AWS) environment. The “born-in-the-cloud” company uses Radware’s solution to strengthen its cloud security and identify potential vulnerabilities before they develop into threats.
Armis’ security platform enables companies to securely use and control IoT and other unmanaged devices without fear of being compromised by cyber attacks. Armis was looking for a solution that would give its DevOps team full visibility and control over its public cloud environment. The company turned to Radware to make it easier for their team to monitor assets and access sensitive resources, as well as detect suspicious activity.
“The Radware team knows that we are a dynamic company whose requirements are constantly changing,” says Roi Amitay, Head of DevInfra at Armis. “Radware’s Cloud Native Protector plays an important role in securing our cloud environment. It helps us to have an overview of our entire cloud and to concentrate on the essentials.”
Radware’s solution improves Armis’ visibility and control over its public cloud environment. It automates the analysis and notifies Armis of all exposed assets and potential cyberattacks to help the company prioritize its work.
“Cloud-native companies like Armis have security requirements that require special solutions,” says Gilad Barzilay, Director of Public Cloud Sales at Radware. “Our Cloud Native Protector not only secures Armis’ cloud workloads, but also continuously assesses the risks and improves the transparency and governance of your cloud.”
Cloud Native Protector
Radware’s Cloud Native Protector is an agentless solution that provides comprehensive visibility and centralized reporting for workloads and accounts on AWS and Microsoft Azure. Its intuitive 360-degree dashboard displays alerts across accounts and clouds, with alerts prioritized by risk. This way, security employees know which warning they need to focus on first. Using a multi-layered approach that covers both the cloud itself and threats to individual workloads, the solution also identifies and prevents unwanted exposure of assets, misconfigurations, excessive permissions and malicious activity in the cloud.