Amazon Web Services

DivvyCloud protects Amazon Web Services, including AWS GovCloud and AWS China, from misconfigurations, policy violations, threats, and IAM challenges. With automated, real-time remediation you can achieve continuous security and compliance, and can fully realize the benefits of IaaS, PaaS, Serverless, FaaS, and CaaS cloud services.  DivvyCloud protects AWS cloud services, for example, S3, EC2, Elasticsearch, CloudFront, RDS, VPC, SNS, IAM, GuardDuty, AutoScaling, and much more.

When using AWS, security, and compliance is a shared responsibility between Amazon and the customer.  You as the customer are responsible for the secure and compliant configuration and use of these cloud services.

The use of AWS delivers unparalleled ability to rapidly bring new products and services to the market, and flexibly scale these in real-time to meet demand. This agility is often reliant on providing self-service access to developers to cloud and container services and if not approached properly this can create a loss of control. 

It is vitally important for organizations to put in place strategies that secure customer information, protect intellectual property, and safeguard financial transactions and other critical business processes. Many organizations also must adhere to government, industry, legal, or corporate standards.  

Ensuring continuous security and compliance across one or more cloud service providers can be challenging given the rate of change, the scale and speed of cloud adoption, and the increasing number of users provisioning and configuring cloud services.    

Leading companies, like Twilio, Spotify, Fannie Mae, Autodesk, 3M, and GE use DivvyCloud to protect their cloud and container environments from misconfigurations, policy violations, threats, and IAM challenges. With automated, real-time remediation DivvyCloud customers achieve continuous security and compliance, and can fully realize the benefits of AWS. 

Freedom is good.  Chaos is bad

DivvyCloud provides next generation automation, management and insights into our [AWS] cloud infrastructure.”  Chris Borneman, Vice President, Software AG

AWS Resources:

    1. Building on AWS Security Hub for Scalable Enterprise Cloud Security
    2. AWS Landing Zone
    3. Augmenting Native Cloud Service Provider Security
    4. Choosing Between AWS, GCP, or Azure? How About All of Them?
    5. Discovery + AWS Case Study

Google Cloud Platform

DivvyCloud protects Google Cloud Platform (GCP) from misconfigurations, policy violations, threats, and IAM challenges. With automated, real-time remediation you can achieve continuous security and compliance, and can fully realize the benefits of IaaS, PaaS, Serverless, FaaS, and CaaS cloud services.  DivvyCloud protects GCP cloud services, for example,Virtual Private Cloud, Compute Engine, Cloud Storage, Resource Manager, Cloud Functions, and much more.

When using GCP, security, and compliance is a shared responsibility between Google and the customer.  You as the customer are responsible for the secure and compliant configuration and use of these cloud services.

The use of GCP delivers unparalleled ability to rapidly bring new products and services to the market, and flexibly scale these in real-time to meet demand. This agility is often reliant on providing self-service access to developers to cloud and container services and if not approached properly this can create a loss of control. 

It is vitally important for organizations to put in place strategies that secure customer information, protect intellectual property, and safeguard financial transactions and other critical business processes. Many organizations also must adhere to government, industry, legal, or corporate standards.  

Ensuring continuous security and compliance across one or more cloud service providers can be challenging given the rate of change, the scale and speed of cloud adoption, and the increasing number of users provisioning and configuring cloud services.    

Leading companies, like Twilio, Spotify, Fannie Mae, Autodesk, 3M, and GE use DivvyCloud to protect their cloud and container environments from misconfigurations, policy violations, threats, and IAM challenges. With automated, real-time remediation DivvyCloud customers achieve continuous security and compliance, and can fully realize the benefits of GCP. 

Freedom is good.  Chaos is bad.

GCP Supported Services

  • BigQuery
  • Cloud Bigtable
  • Cloud DNS
  • Cloud Dataproc
  • Cloud Filestore
  • Cloud Functions
  • Cloud IAM
  • Cloud Key Management Service
  • Cloud Load Balancing
  • Cloud Memorystore
  • Cloud Pub/Sub
  • Cloud SQL
  • Cloud Spanner
  • Cloud Storage
  • Compute Engine (GCE)
  • Interconnects
  • Kubernetes Engine (GKE)
  • Premptible Instances
  • Resource Manager
  • Virtual Private Cloud

GCP Resources:

  1. Self-Service Your Google Cloud Through Automated Remediation; Without Losing Control
  2. Augmenting Native Cloud Service Provider Security
  3. DivvyCloud Partners with Google to Help Launch Commercial Kubernetes Marketplace
  4. Choosing Between AWS, GCP, or Azure? How About All of Them?

Microsoft Azure

DivvyCloud protects Microsoft Azure, including Microsoft Azure Government, from misconfigurations, policy violations, threats, and IAM challenges. With automated, real-time remediation you can achieve continuous security and compliance, and can fully realize the benefits of IaaS, PaaS, Serverless, FaaS, and CaaS cloud services.  DivvyCloud protects Azure cloud services, for example,Virtual Machines, CosmosDB, Azure Active Directory, Azure Blobs,Web Apps, Security Center, and much more.

When using Microsoft Azure, security, and compliance is a shared responsibility between Microsoft and the customer.  You as the customer are responsible for the secure and compliant configuration and use of these cloud services.

The use of Azure delivers unparalleled ability to rapidly bring new products and services to the market, and flexibly scale these in real-time to meet demand. This agility is often reliant on providing self-service access to developers to cloud and container services and if not approached properly this can create a loss of control. 

It is vitally important for organizations to put in place strategies that secure customer information, protect intellectual property, and safeguard financial transactions and other critical business processes. Many organizations also must adhere to government, industry, legal, or corporate standards.  

Ensuring continuous security and compliance across one or more cloud service providers can be challenging given the rate of change, the scale and speed of cloud adoption, and the increasing number of users provisioning and configuring cloud services.    

Leading companies, like Twilio, Spotify, Fannie Mae, Autodesk, 3M, and GE use DivvyCloud to protect their cloud and container environments from misconfigurations, policy violations, threats, and IAM challenges. With automated, real-time remediation DivvyCloud customers achieve continuous security and compliance, and can fully realize the benefits of Azure. 

Freedom is good.  Chaos is bad.

Azure Resources:

  1. Securing your Microsoft Azure Environment
  2. Augmenting Native Cloud Service Provider Security
  3. Choosing Between AWS, GCP, or Azure? How About All of Them?
  4. DivvyCloud’s Microsoft Azure CIS Insight Pack

Alibaba

It is vitally important for organizations to put in place strategies that secure customer information, protect intellectual property, and safeguard financial transactions and other critical business processes. Many organizations also must adhere to government, industry, legal, or corporate standards.  

Ensuring continuous security and compliance across one or more cloud service providers can be challenging given the rate of change, the scale and speed of cloud adoption, and the increasing number of users provisioning and configuring cloud services.    

Leading companies, like Twilio, Spotify, Fannie Mae, Autodesk, 3M, and GE use DivvyCloud to protect their cloud and container environments from misconfigurations, policy violations, threats, and IAM challenges. With automated, real-time remediation DivvyCloud customers achieve continuous security and compliance, and can fully realize the benefits of Alibaba. 

Freedom is good.  Chaos is bad.

Kubernetes

Developers love containers and DevOps love Kubernetes.  Kubernetes is cloud-agnostic, and you can run your cluster on AWS, GCP, Azure, or any other cloud.  The rise of containers, and especially the popularity and accessibility of Kubernetes creates a new opportunity for companies to now be cloud agnostic, and frankly makes it much easier to be multi-cloud and provides an easier hedge against vendor lock-in. 

The world of ephemeral computing using the cloud, containers, and Kubernetes continues to evolve in ways that are both innovative and challenging. Change happens so fast it’s hard for Security and GRC professionals to keep up. But there is help available. Using CIS Benchmarks combined with the automation capabilities of DivvyCloud will help companies embrace Kubernetes while improving their overall security posture.

DivvyCloud automation allows developers to engage in more experimentation and innovation. It provides the trust and verification that system administrators need to ensure that work is being done according to industry standard security guidelines and well-established best practices. Automated remediation technology is a powerful tool for companies that use Kubernetes to get quality software into the hands of customers at web scale. DivvyCloud and its holistic approach to supporting the CIS Benchmarks for Kubernetes provide a competitive advantage that is unequaled for companies that put Kubernetes at the forefront of their digital infrastructure.

You can learn how to add one or more Kubernetes clusters to DivvyCloud here.

The availability of commercial Kubernetes applications from providers like DivvyCloud is a critical part of extending enterprise investments and can simplify adoption of container-based infrastructure no matter what environment they operate in, either on-premise or in the public cloud.

– Jennifer Lin, Director of Product Management, Google Cloud

Kubernetes Resources:

  1. A Holistic Approach to Securing Kubernetes That Integrates Culture and Technology
  2. Managing the Kubernetes Security Flaw
  3. DivvyCloud Partners with Google to Help Launch Commercial Kubernetes Marketplace
  4. Comparison of Google GKE vs Microsoft AKS vs Amazon EKS
  5. Deploying Kubernetes Across Multiple Clouds

Acquire the freedom to innovate

Request a Demo