Sift SecurityDemo
Sift SecurityTrial
Sift SecurityContact
Sift Security

Next Generation Security
for Cloud Infrastructure

  • Enhanced Visibility Enhanced Visibility
  • Advanced Analytics Advanced Analytics
  • Cloud Forensics Cloud Forensics
  • APIs and Automation APIs and Automation
  • Continuous Compliance Continuous Compliance
30 DAY Free Trial
"Sift Security reduces the time to investigate from days to minutes"
"CloudHunter makes it easy to identify, investigate and address risks in cloud infrastructure"
"CloudHunter helps us to stay in compliance with security best practices in our cloud infrastructure"


Visibility, Compliance, and Security Gap for Public Cloud

As organizations move more of their infrastructure to the public cloud, they need the same visibility, compliance, detection & response capabilities as they have for their traditional infrastructure. Furthermore, public cloud infrastructure can seem more complex and challenging for organizations due to its dynamic nature, automation and new terminology which makes detection and investigation more challenging.

  • Lack of visibility creates compliance risks
  • GDPR will drive higher costs (up to 4% of sales)
  • Public cloud breaches are increasing
  • Traditional rules-based approach is inefficient
  • Lack of known signatures
Response / Hunting
Response hunting
  • Root cause analysis takes hours or days
  • Taking action on threats is complicated
  • Lots of time wasted on low value activities

What is Sift Security CloudHunter?

Scalable Cloud Platform
Scalable Cloud Platform
Advanced Analytics
Advanced Analytics
API Integrations
API Integrations

Benefits: Proactive Cloud Security

Cloud Visibility
Cloud Visibility
  • Multi-Cloud
  • Containers
  • Network
  • Instances
  • Configurations
  • Vulnerabilities
  • Users
  • Things
Advanced Analytics
Advanced Analytics
  • Machine Learning
  • Anomaly Detection
  • Graph Clustering
  • Entity Risk Scoring
  • Custom Rules Engine
  • CIS Benchmarks
  • Threat Intelligence
Protection Against
Protection Against
  • Misconfigurations
  • Compliance Gaps
  • Vulnerabilities
  • Insider Threats
  • External Hacking
  • Malware
  • Lateral Movement
  • Privilege Escalation
  • Data Exfiltration

Product Overview

Monitoring, Compliance, Detection, & Response for Cloud Infrastructure

Want to hear more about cloud hunter and the product benefits click here.


Compliance with Cloud Best Practices

Sift Security customizable rules-based detection with out of the box support for key uses cases such as CIS AWS Benchmark monitoring guidelines

Cloud Compliance Dashboards & Reports


Example: CIS AWS Benchmark Alerting

3.1 Unauthorized API calls
3.2 Management Console sign-in without MFA
3.3 Usage of "root" account
3.4 IAM policy changes
3.5 CloudTrail configuration changes
3.6 AWS Management Console authentication failures
3.7 Disabling or deletion of customer created CMKs
3.8 S3 bucket policy changes
3.9 AWS Config configuration changes
3.10 Security group changes
3.11 Changes to Network Access Control Lists (NACL)
3.12 Changes to network gateways
3.13 Route table changes
3.14 VPC changes
3.15 Ensure security contact information is registered
3.16 Ensure appropriate subscribers to each SNS topic


Detection: Summarize Threats and Most Risky Entities

Sift Security has a suite of detection tools to identify known bad and help identify unknown bad efficiently while minimizing alert fatigue

  • Import / export alerts to / from 3rd parties
  • Customizable rules engine with out of the box detections
  • Anomaly detection
  • Graph algorithms (alert prioritization)

CloudHunter Detection: Machine Learning

Sift Security utilizes anomaly detection as a more scalable approach to detection, and a way to help detect unknown threats

AWS Behaviors

  • User logs in from unusual location
  • User accesses unusual resources
  • Unusual access patterns to data stored
  • Unusual changes to ACLs
  • Usual changes to Security groups
  • Etc


  • Rare events
  • Spikes
  • Seasonality
  • Out of context
  • Unsupervised ML
  • Feedback loop

CloudHunter Detection: Alert Prioritizer

And our patent pending graph prioritization algorithms identify clusters of risk to identify serious threat faster, and reduce alert fatigue


CloudHunter Detection


CloudHunter Detection

Robust API Layer to Enable Seamless Action and Automation

Sift Security includes an API layer that can connect to cloud services and 3rd party products to enable seamless, or even automated action

Robust API Layer to Enable Seamless Action and Automation

Easy, Self Service Deployment

Interested? We can set up a pilot in under 15 minutes and send you a link to log in and start reviewing the security posture of your cloud.

CloudHunter Detection

Can be deployed in minutes via a private AMI

CloudHunter Detection

Can be deployed in minutes as a hosted service