facebook logolinkedin logoyoutube logo

Important information for former Skybox customers. Please click here to learn about FireMon’s migration programs

Learn More
Cloud Defence hero image
FIREMON PRODUCTS

Cloud Defense

Real-time cloud security compliance, inventory, misconfiguration, and threat detection. Now with Just-In-Time IAM defense at an industry-best price.

Instantly detect misconfigurations and threat activity

Cloud Defense immediately assesses and communicates risks to security and the cloud team via ChatOps, enriches alerts with a fully updated configuration inventory and activity history, and even enables secure, break glass access.

Features

Features

Learn More
Pricing

Pricing

Learn More
resources

Resources

Learn More

Misconfiguration and Vuln Management

Track and attribute changes to resources in real-time. Identify misconfigurations, vulnerabilities, compliance, and risks. Alert across silos via Chatops for faster remediation. Prioritize better with intuitive dashboards and the Cloud Security Maturity Model.

get a demo

Cloud Incident Response

Detect threats and speed up analysis and investigations with powerful prioritization, enrichment, and an identity-attributed change history. Coordinate responses with cloud deployment owners and DevOps using ChatOps and workflow integrations.

View Pricing

Just-in-Time Privileged Access

Easily request and approve access to cloud accounts via Chatops, CLI or web. Use your existing identity provider. Robust and instant approval options. Eliminate lost or stolen credential risks. Support secure DevOps without friction with out-of-band notifications.

Try Pro free for 30 days! Get daily reports for life, no account limits. AWS & Azure supported.

start free trial
Real-Time Cloud Posture

Cloud Defense Features

Real-Time Cloud Posture, Inventory, and Change Tracking

FireMon Cloud Defense natively monitors API activity in your cloud deployments, updates inventory and runs security and compliance assessments in real-time to ensure nothing falls through the cracks.

  • A searchable cloud asset inventory with a full change history including which IAM entity made the change
  • Highly customizable real-time security assessments to detect misconfigurations based on the classification of the environment
  • Continuous compliance tracking and reporting with environment filtering and compensating controls
  • An intelligent issues feed integrated with inventory to direct you to the problems and resources that matter most
Cloud Native Threat

Cloud Native Threat Detection and Response

Instantly detect potential malicious activity and generate enriched alerts to help discern between external attacks, malicious insiders, or innocent mistakes.

  • Cloud threat detectors that monitor real-time API activity to enhance your SIEM/monitoring
  • Automatic enrichment, including resource and posture information, to speed up analysis and investigation
  • Filter issues and alerts for different projects, deployments, and environments to reduce false positives and alert fatigue
  • Improves your cloud provider’s native security alerts with integrated enrichment, filtering, and routing
Automated Cloud Security

Automated Cloud Security Maturity Model Assessments

Discover and quickly assess your cloud security readiness and identify steps to strengthen your security fortifications using Key Performance Indicators.

  • Utilize the Cloud Security Maturity Model 2.0, developed by the Cloud Security Alliance, IANS, and Securorsis to automatically assess your cloud deployments
  • Measure the maturity of your cloud security with automated assessments
  • Insight into strengths, weaknesses, and opportunities for improvement across various security domains and categories
  • Provides maturity ratings, control objectives, and KPIs to help you assess your maturity level and create a roadmap for improvement
  • Compare different teams’ level of security maturity and prioritize areas that need attention
Authorization Control

Authorization Control to Reduce Identity Risks

Eliminate the need for static credentials or long-term permissions with just-in-time approvals, out-of-band visibility, and session restrictions.

  • Integrates with your existing identity provider. FireMon has no access to identities or credentials.
  • Users request authorization using ChatOps or a web console for frictionless approvals.
  • Advanced options for single or multiple approvers, and self or automatic approvals to balance speed and security.
  • Supports multiple policies, source IP restrictions, variable session length, and other variables to reduce IAM risks.
  • All activity is logged and feeds into ChatOps for high visibility and accountability.
Deep ChatOps Integration

Deep ChatOps Integration to Bridge Silos

Bridge the communication gap between decentralized cloud operations teams, ensuring effective security across teams for rapid assessment, response, and remediation of misconfigurations and attacks.

  • Full Slack and Teams support for notifications and actions
  • Advanced routing so teams only see the issues regarding their deployments, while security still monitors everything
  • Notifications are enriched with enhanced information and options for 1-click remediations right in the channel
  • Security can easily coordinate with cloud teams in ChatOps for rapid investigation and response
Event-Driven Automation

Event-Driven Automation and Assisted Remediation

FireMon Cloud Defense uses an advanced, event-driven, serverless architecture to send notifications and take actions at the speed of your cloud platform.

  • Alerts route instantly, appearing in less than 30 seconds on AWS or GCP and within 2 minutes on Azure
  • Support for fully automated remediations that apply only to the deployments you designate
  • All ChatOps notifications can include defined or recommended 1-click remediations to let an administrator make the decision
  • Integrate with third-party systems to create tickets or trigger external workflows

See FireMon Cloud Defense in Action

The real-time cloud security operations platform for defenders and DevOps. Now with Just-In-Time cloud access at an industry-best price.

Cloud Defense Pricing

Simplified base pricing. FireMon also offers resource-based and other pricing models to align with customer preferred patterns.

Features

Pro

Enterprise

Asset Inventory

check icon
check icon

Posture Checks

All

All

Assessment Frequency

Real-Time

Real-Time

Compliance Reports

All Supported

All Supported

Real-Time Threat Detection

check icon
check icon

Automated Response

check icon
check icon

Authorization Control for IAM

check icon
check icon

Inventory and Configuration History

90 Days

90 Days

Filter and Customize Checks/Detectors

check icon
check icon

OKTA Integration (SSO)

check icon
check icon

Slack/ MS Teams

check icon
check icon

API Access

check icon
check icon

Knowledge Base

check icon
check icon

In-App Support Chat

check icon
check icon

Prioritized/Direct Support

check icon

Custom Checks

check icon

Custom Threat Detectors

check icon

Pricing

$200 / Cloud Account / Month

Call for Pricing

Learn More About Cloud Defense

  • Webinar

    Reducing Risk While In the Cloud

    Risk

    We understand that cloud migration has its own challenges and risks, but the benefits gained easily outweigh the risks when managed properly. These in

    Watch webinar Reducing Risk While In the Cloud
  • Blog

    On Least Privilege, JIT, and Strong Authorization

    Cloud Defense, Cloud Defense, IAM, JIT

    I’ve been employed as a security professional for over 20 years. I cannot possibly count the number of times I have uttered the words “least pri

    Read more On Least Privilege, JIT, and Strong Authorization
  • Explore

    Cloud Security Operations

    Monitor, Alert, and Respond to Security Risk in Your Cloud Infrastructure With thousands (or tens of thousands) of resources across multiple cloud

    Learn more Cloud Security Operations