Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


03:55 PM
Dark Reading
Dark Reading
Products and Releases

RedLock Enhances Visibility, Compliance Assurance, and Threat Detection with Azure

Integration with Azure Network Watcher Enriches Context on Risks.

From the RSA Conference in San Francisco, CA (April 17, 2018) -- RedLock, an industry leader in Cloud Threat Defense, today announced enhanced capabilities to help Microsoft Azure customers identify security and compliance risks in their cloud environments. RedLock’s recent integration with Azure Network Watcher provides a richer understanding of network traffic patterns and is another valuable data source for the RedLock Cloud 360™ platform.

Azure Network Watcher is a network monitoring and diagnostic service that collects Network Security Group (NSG) Flow Logs. The integration enables customers to monitor virtual machines, network security and security group views, as well as topologically visualize their network traffic in their Azure environment to detect advanced threats such as cryptojacking, lateral movement, and data exfiltration. RedLock serves the needs of enterprises seeking to ensure compliance, govern security, and enable security operations across Azure environments.

With the integration of Azure Network Watcher, the RedLock Cloud 360 platform now provides a comprehensive set of features for Azure environments that include:

●     Asset Discovery and Inventory: Discover all assets in an environment such as Azure Virtual Machines, Azure SQL Databases and Azure Storage, and view them in one place.

●     Compliance Reporting: Assess and report on compliance against industry standards such as CIS, NIST, SOC 2, and PCI.

●     Policy Guardrails: Leverage custom and out-of-the-box policies to rapidly detect and respond to risky configurations and sensitive user activities.

●     Threat Detection: Detect network intrusions, account compromises, and insider threats by establishing behavior baselines and flagging any deviations.

●     Incident Investigation: Investigate current threats or past incidents and quickly determine the root cause.

●     Contextual Alerts: Prioritize and respond to issues based on context about all the risk factors associated with a resource.

●     Enterprise Integrations: Integrate with popular vulnerability management solutions, threat intelligence feeds, and Security Incident and Event Monitoring (SIEM) platforms.

“Microsoft Azure has experienced a tremendous surge in customers and revenue,” said Varun Badhwar, CEO and co-founder of RedLock. “Azure’s success is more proof that enterprises are accelerating their journey to public cloud. The RedLock Cloud 360 platform enables Chief Information Security Officers (CISOs) within those enterprises to confidently support those efforts by offering unprecedented visibility and control in the cloud. RedLock is honored to be an early technology partner for Azure Network Watcher and participate in the Microsoft One Commercial Partner Program.”

“Microsoft Azure delivers enterprise-grade cloud services to the world’s most demanding enterprises,” said Vijay Tinnanur, principal program manager, Microsoft Azure Networking at Microsoft Corp. “By augmenting its existing threat defense capabilities for Azure with network monitoring visualization, RedLock is supplementing security and compliance protections for Azure customers, helping their resources stay safe, secure and uncompromised.”

Read more about RedLock’s support for Azure Network Watcher at https://blog.redlock.io/increasing-azure-visibility-with-network-watcher-and-redlock, and more about how RedLock enables deeper visibility into risks within Azure environments at https://redlock.io/platform/microsoft-azure-security-compliance.

About RedLock

RedLock enables effective threat defense across Amazon Web Services, Microsoft Azure, and Google Cloud environments. The RedLock Cloud 360™ platform takes a new AI-driven approach that correlates disparate security data sets to provide comprehensive visibility, detect threats, and enable rapid response across fragmented cloud environments. With RedLock, organizations can ensure compliance, govern security, and enable security operations across public cloud computing environments.

Global brands across a variety of verticals trust RedLock to secure their public cloud computing environments. The company is backed by Sierra Ventures, Storm Ventures, Dell Technologies Capital, and other high profile investors. RedLock has received a number of industry accolades including finalist for Most Innovative Startup at RSA 2017, CRN Emerging Vendors in Security 2017, and TiE50 Winner 2017.



Recommended Reading:

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Manchester United Suffers Cyberattack
Dark Reading Staff 11/23/2020
As 'Anywhere Work' Evolves, Security Will Be Key Challenge
Robert Lemos, Contributing Writer,  11/23/2020
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-11-27
In Ericsson BSCS iX R18 Billing & Rating iX R18, MX is a web base module in BSCS iX that is vulnerable to stored XSS via an Alert Dashboard comment. In most test cases, session hijacking was also possible by utilizing the XSS vulnerability. This potentially allows for full account takeover, or e...
PUBLISHED: 2020-11-27
In Ericsson BSCS iX R18 Billing & Rating iX R18, ADMX is a web base module in BSCS iX that is vulnerable to stored XSS via the name or description field to a solutionUnitServlet?SuName=UserReferenceDataSU Access Rights Group. In most test cases, session hijacking was also possible by utilizing t...
PUBLISHED: 2020-11-27
In cPanel before 90.0.17, 2FA can be bypassed via a brute-force approach (SEC-575).
PUBLISHED: 2020-11-27
cPanel before 90.0.17 allows self-XSS via the WHM Transfer Tool interface (SEC-577).
PUBLISHED: 2020-11-27
cPanel before 90.0.17 has multiple instances of URL parameter injection (SEC-567).