Sift SecurityDemo
Sift SecurityTrial
Sift SecurityContact
CloudHunter
Sift Security

Next Generation Security
for Cloud Infrastructure

  • Enhanced Visibility Enhanced Visibility
  • Advanced Analytics Advanced Analytics
  • Cloud Forensics Cloud Forensics
  • APIs and Automation APIs and Automation
  • Continuous Compliance Continuous Compliance
30 DAY Free Trial
IONIC
"Sift Security reduces the time to investigate from days to minutes"
trip.com
"CloudHunter makes it easy to identify, investigate and address risks in cloud infrastructure"
Rombus
"CloudHunter helps us to stay in compliance with security best practices in our cloud infrastructure"

Problem:

Visibility, Compliance, and Security Gap for Public Cloud

As organizations move more of their infrastructure to the public cloud, they need the same visibility, compliance, detection & response capabilities as they have for their traditional infrastructure. Furthermore, public cloud infrastructure can seem more complex and challenging for organizations due to its dynamic nature, automation and new terminology which makes detection and investigation more challenging.


Compliance
Compliance
  • Lack of visibility creates compliance risks
  • GDPR will drive higher costs (up to 4% of sales)
Detection
Detection
  • Public cloud breaches are increasing
  • Traditional rules-based approach is inefficient
  • Lack of known signatures
Response / Hunting
Response hunting
  • Root cause analysis takes hours or days
  • Taking action on threats is complicated
  • Lots of time wasted on low value activities



What is Sift Security CloudHunter?

Scalable Cloud Platform
Scalable Cloud Platform
Advanced Analytics
Advanced Analytics
Visualization
Visualization
API Integrations
API Integrations

Benefits: Proactive Cloud Security

Cloud Visibility
Cloud Visibility
  • Multi-Cloud
  • Containers
  • Network
  • Instances
  • Configurations
  • Vulnerabilities
  • Users
  • Things
+
Advanced Analytics
Advanced Analytics
  • Machine Learning
  • Anomaly Detection
  • Graph Clustering
  • Entity Risk Scoring
  • Custom Rules Engine
  • CIS Benchmarks
  • Threat Intelligence
=
Protection Against
Protection Against
  • Misconfigurations
  • Compliance Gaps
  • Vulnerabilities
  • Insider Threats
  • External Hacking
  • Malware
  • Lateral Movement
  • Privilege Escalation
  • Data Exfiltration

Product Overview

Monitoring, Compliance, Detection, & Response for Cloud Infrastructure

Want to hear more about cloud hunter and the product benefits click here.



 

Compliance with Cloud Best Practices

Sift Security customizable rules-based detection with out of the box support for key uses cases such as CIS AWS Benchmark monitoring guidelines


Cloud Compliance Dashboards & Reports

Compliance

Example: CIS AWS Benchmark Alerting

3.1 Unauthorized API calls
3.2 Management Console sign-in without MFA
3.3 Usage of "root" account
3.4 IAM policy changes
3.5 CloudTrail configuration changes
3.6 AWS Management Console authentication failures
3.7 Disabling or deletion of customer created CMKs
3.8 S3 bucket policy changes
3.9 AWS Config configuration changes
3.10 Security group changes
3.11 Changes to Network Access Control Lists (NACL)
3.12 Changes to network gateways
3.13 Route table changes
3.14 VPC changes
3.15 Ensure security contact information is registered
3.16 Ensure appropriate subscribers to each SNS topic

  

Detection: Summarize Threats and Most Risky Entities

Sift Security has a suite of detection tools to identify known bad and help identify unknown bad efficiently while minimizing alert fatigue

Detection
  • Import / export alerts to / from 3rd parties
  • Customizable rules engine with out of the box detections
  • Anomaly detection
  • Graph algorithms (alert prioritization)
 

CloudHunter Detection: Machine Learning

Sift Security utilizes anomaly detection as a more scalable approach to detection, and a way to help detect unknown threats


AWS Behaviors

  • User logs in from unusual location
  • User accesses unusual resources
  • Unusual access patterns to data stored
  • Unusual changes to ACLs
  • Usual changes to Security groups
  • Etc

Entities

Detection
  • Rare events
  • Spikes
  • Seasonality
  • Out of context
  • Unsupervised ML
  • Feedback loop
 

CloudHunter Detection: Alert Prioritizer

And our patent pending graph prioritization algorithms identify clusters of risk to identify serious threat faster, and reduce alert fatigue


From

CloudHunter Detection

To

CloudHunter Detection
 

Robust API Layer to Enable Seamless Action and Automation

Sift Security includes an API layer that can connect to cloud services and 3rd party products to enable seamless, or even automated action

Robust API Layer to Enable Seamless Action and Automation

Easy, Self Service Deployment

Interested? We can set up a pilot in under 15 minutes and send you a link to log in and start reviewing the security posture of your cloud.


CloudHunter Detection

Can be deployed in minutes via a private AMI

CloudHunter Detection

Can be deployed in minutes as a hosted service