BotFactory

for Security

Bots that identify security risks in real-time and take autonomous, user-defined action to fix problems before they are exploited.

Common Cloud Problem:

Cloud security remains the a critical barrier to initial and ongoing adoption of public cloud technologies.

Audit and close non-compliant ports open to unauthorized networks (e.g. non-compliant security rules.)

Identify API Root Access accounts and ensure two factor authentication is enabled

Report and terminate instances running unauthorized images or password policies

Audit and close non-compliant ports open to unauthorized networks (e.g. non-compliant security rules.)

Identify API Root Access accounts and ensure two factor authentication is enabled

Report and terminate instances running unauthorized images or password policies

“It was really easy to turn on a Bot to ensure use of two-factor authentication across multiple AWS accounts…saving a lot of time and worry.”

Jeff Lesperance

Jeff Lesperance

Manager Cloud Services, Discovery Communications

“The Bot Army is a way to deploy policy, minimize blast radius and give developers freedom to operate within the guide rails of safety.”

Thomas Martin

Thomas Martin

Head of Application Modernization, GE Digital

“Two risks I see everyday with enterprise cloud adoption are loss of control over data and loss of control over who can access it.”

Bob Bigman

Robert Bigman

President 2BSecure and Retired CISO, CIA

Cost Resources

Available Security Bots

  • Clouds with Active Root Accounts
  • Clouds with Weak Password Policy
  • Clouds without Global API Audit Service
  • Instance Using Unauthorized Root Key Pair
  • Load Balancer Access Logging Disabled
  • Security Rule Audit
  • Orphaned Security Groups
  • Expired SSL Certificates
  • SSL Certificate Heart-bleed Vulnerability
  • Cloud User Policy/Activity/API Key Audit
  • S3 Bucket Permissions Audit
  • Databases without Encryption enabled
  • Volumes without Encryption enabled
  • Clouds with Active Root Accounts
  • Clouds with Weak Password Policy
  • Clouds without Global API Audit Service
  • Instance Using Unauthorized Root Key Pair
  • Load Balancer Access Logging Disabled
  • Security Rule Audit
  • Orphaned Security Groups
  • Expired SSL Certificates
  • SSL Certificate Heart-bleed Vulnerability
  • Cloud User Policy/Activity/API Key Audit
  • S3 Bucket Permissions Audit
  • Databases without Encryption enabled
  • Volumes without Encryption enabled

Take a deeper technical dive? View all of our Bot Templates on GitHub  GitHub

Get Started with an Enterprise Trial

Deploy an enterprise version of BotFactory
Request Trial