Sophos Cloud Optix is solving the toughest challenges in public cloud security

Sophos ProductsCloud Optix

You move to the public cloud with the dream of infrastructure cost savings, added agility, and taking full advantage of devOps process to speed up development and product delivery. A move to Amazon Web Services, Microsoft Azure or Google Cloud Platform can bring all that good stuff. But soon you’ll meet your new challenge of increasingly complex attacks targeting a more dispersed multi-cloud network.

That’s exactly what we found in the most recent Sophos research study of 10 cloud honeypots placed worldwide. Once the honeypots were live, it took attackers no time at all to discover the SSH service and for login attempts to start. In one instance, a honeypot was attacked less than one minute after it was deployed. And once the login attempts started, the attacks were relentless and continuous.

Put that smile back on your face

To solve the problem of public cloud security and get you back to spending your time on projects that move your business forward, rather than security worries, we’re pleased to announce the launch of Sophos Cloud Optix.

The latest addition to the Sophos Public Cloud Security line up, Cloud Optix is a powerful new tool that allows you to accurately see what you have running in the cloud at all times, while combining the power of AI and automation to simplify compliance, governance and security monitoring in the cloud. And you can have it up and running in less than 10 minutes.

You can’t secure what you can’t see

Running multiple cloud environments, potentially across multiple providers, you’re going to have a tough time visualizing what your actual cloud network and assets look like. This means you can easily spend days or weeks preparing accurate diagrams to ensure they are configured correctly in order to prepare for audits. Cloud Optix is an agentless solution that does this in seconds with complete network inventory, topology visualization and continuous asset monitoring. But don’t just listen to us, here’s why HubSpot chose Sophos:

Sophos Cloud Optix provides us a comprehensive network topology diagram with real-time traffic of our cloud environment. I have better insight into our cloud network security posture than ever before.

– Jessica Mazzone, Security Engineer, HubSpot Inc.

Changing environments need continuous compliance

In an ever-changing, auto-scaling public cloud environment, automatically detecting changes to your cloud environments in real time is a life saver. Cloud Optix continuously monitors compliance, with custom or out-of-the box templates for standards such as SOC2, HIPAA and GDPR, and reports generated in seconds.

It only takes one open door

The biggest issue in cloud security is not necessarily some new kind of malware, it’s about making sure your architecture is secure and you have the right visibility of it.

In our report, we found that, on average, cloud servers were subjected to 13 attempted attacks per minute, per honeypot. So if you accidentally leave your Amazon S3 storage buckets set to public, or leave a MongoDB database open to the public internet, you’re risking hitting the headlines for the wrong reasons.

Cloud Optix has a range of threat response and alerting capabilities to help. From detection of suspicious traffic patterns on the network (i.e. a data breach in action) and shared access keys to your cloud provider account, to data storage left open to the public internet and more.

For more information on our research findings, please read the full Sophos report, or for the highlights you can read the Naked Security article.

And to learn more about Sophos Cloud Optix and how it can help simplify visibility, compliance and threat response for you, visit www.sophos.com/cloud-optix.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

This site uses Akismet to reduce spam. Learn how your comment data is processed.