Introducing
Holistic AWS Security Analysis &
Visualization Service from Foghorn
Speak to an AWS Security Expert
THREAT DETECT
A: Foghorn has built a proven and trusted off-the-shelf solution to analyze all IaaS layers to identify vulnerabilities before they can be exploited.
FOG 360 ROADMAP TO DESIRED STATE
Design Intent
Design Reality
Design Fix
Design Intent
Discovery session with engineers and architects
to understand business and technical requirements
that drove architecture
Design Reality
We deploy our automated discovery tool to document
and visualize Network, Firewall Rules, IAM, Storage,
and Account Settings.
Design Fix
We deliver a consultative analysis of findings to
call out risk areas andremediation
recommendations.
RIGHT-SIZED ENGAGEMENT
Your Fog360 security analysis price is based on the size and complexity of your AWS environment.
Small | Medium | Large | XLarge | XX Large | |
---|---|---|---|---|---|
CSP ACCOUNTS | 3 | 4 - 9 | 10 - 25 | 25 - 99 | 100+ |
VPCS / VNETS | 6 | 20 | 50 | 200 | 200+ |
COMPUTE INSTANCES | 25 | 75 | 500 | 2000 | 2000+ |
STORAGE BUCKETS | 50 | 150 | 500 | 2000 | 2000+ |
IAM POLICIES | 10 | 50 | 200 | 500 | 500+ |
PRICE | $9,900 | $14,900 | $19,900 | $29,900 | Call For Pricing |
Accelerate security posture understanding
Improve the security posture of cloud environments
Enhanced decision making, analysis of current state
Identify vulnerabilities before security fails
Position security as known strength to speed innovation
Give regulators head start with compliance obligations
Fog 360
Deliverables
After Foghorn’s
Fog360 analysis is
complete, customers
receive a comprehensive
report and supporting
data, including:
TOPOLOGY
DIAGRAMS
1
> VPC’s
> Subnets
> NACLS
> Route Tables
> Security Groups
Permission
Document
2
> S3 Bucket
Policies
> IAM Policies
> Permission
Settings
Assessment
Document
3
> Summary of
Findings
> Areas of Risk
> Remediation
Recommendations
Fog 360
Deliverables
After Foghorn’s Fog360 analysis is complete, customers receive a comprehensive
report and supporting data, including:
1
TOPOLOGY
DIAGRAMS
> Subnets
> NACLS
> Route Tables
> Security Groups
2
Permission
Document
> IAM Policies
> Permission Settings
3
Assessment
Document
> Areas of Risk
> Remediation Recommendations
“Foghorn is absolutely my go-to consulting resource and
trusted partners for cloud and other strategic technologies.”