Introducing

Fog360

Holistic AWS Security Analysis &
Visualization Service from Foghorn

AWS Partner Security Services Competency

Speak to an AWS Security Expert

THREAT DETECT

Q: Is your organization employing best practices to maximize security architecture in all layers? A: Foghorn has built a proven and trusted off-the-shelf solution to analyze all IaaS layers to identify vulnerabilities before they can be exploited.
Architecture Diagram for Fog360 on AWS

FOG 360 ROADMAP TO DESIRED STATE

Fog360 Design Intent

Design Intent

Interactive discovery session with the key engineers and architects.
Fog360 Design Reality

Design Reality

Automated discovery to document and visualize Amazon VPC, IAM, Amazon S3, and security group configurations.
Fog360 Design Fix

Design Fix

Consultative analysis of findings to call out risk areas, remediation, and recommendations.

Design Intent

Discovery session with engineers and architects
to understand business and technical requirements
that drove architecture

Design Reality

We deploy our automated discovery tool to document
and visualize Network, Firewall Rules, IAM, Storage,
and Account Settings.

Design Fix

We deliver a consultative analysis of findings to
call out risk areas andremediation
recommendations.

RIGHT-SIZED ENGAGEMENT

Your Fog360 security analysis price is based on the size and complexity of your AWS environment.

Small Medium Large XLarge XX Large
CSP ACCOUNTS 3 4 - 9 10 - 25 25 - 99 100+
VPCS / VNETS 6 20 50 200 200+
COMPUTE INSTANCES 25 75 500 2000 2000+
STORAGE BUCKETS 50 150 500 2000 2000+
IAM POLICIES 10 50 200 500 500+
PRICE $9,900 $14,900 $19,900 $29,900 Call For Pricing

AWS Security Case Studies

Fog360 Advantage

Accelerate security posture understanding

Improve the security posture of cloud environments

Enhanced decision making, analysis of current state

Identify vulnerabilities before security fails

Position security as known strength to speed innovation

Give regulators head start with compliance obligations

Fog 360 Deliverables

Fog360 Deliverables List

After Foghorn’s
Fog360 analysis is
complete, customers
receive a comprehensive
report and supporting
data, including:

TOPOLOGY DIAGRAMS

1

  > VPC’s > Subnets > NACLS > Route Tables > Security Groups

Permission Document

2

  > S3 Bucket Policies > IAM Policies > Permission Settings

Assessment Document

3

  > Summary of Findings > Areas of Risk > Remediation Recommendations
Fog360 Deliverables List

Fog 360 Deliverables

After Foghorn’s Fog360 analysis is complete, customers receive a comprehensive report and supporting data, including:

1

TOPOLOGY DIAGRAMS

> VPC’s > Subnets > NACLS > Route Tables > Security Groups

2

Permission Document

> S3 Bucket Policies > IAM Policies > Permission Settings

3

Assessment Document

> Summary of Findings > Areas of Risk > Remediation Recommendations

“Foghorn is absolutely my go-to consulting resource and
trusted partners for cloud and other strategic technologies.”

DAVE SWAN, VP, IT & APPLICATIONS NATERA

SUCCESSFUL CLIENT PARTNERSHIPS

Ellie Mae
Chronicled
Clear Factr
Natera