Holistic Security Analysis &
Visualization Service from Foghorn
THREAT DETECT
downtime, and reputation loss so high, organizations are eager to harden
their cloud infrastructure.
Q: Is your organization employing best practices to maximize security architecture in all layers?
A: Foghorn has built a proven and trusted off-the-shelf solution to analyze all IaaS layers to identify vulnerabilities before they can be exploited.
FOG 360 ROADMAP TO DESIRED STATE
Design Intent
engineers and architects
to understand business and
technical requirements
that drove architecture
Design Reality
discovery tool to document
and visualize Network,
Firewall Rules, IAM, Storage,
and Account Settings.
Design Fix
analysis of findings to
call out risk areas
andremediation
recommendations.
Design Intent
Discovery session with engineers and architects
to understand business and technical requirements
that drove architecture
Design Reality
We deploy our automated discovery tool to document
and visualize Network, Firewall Rules, IAM, Storage,
and Account Settings.
Design Fix
We deliver a consultative analysis of findings to
call out risk areas andremediation
recommendations.
RIGHT-SIZED ENGAGEMENT
Your Fog360 security analysis price is based on the size and complexity of your cloud environment.
Small | Medium | Large | XLarge | XX Large | |
---|---|---|---|---|---|
CSP ACCOUNTS | 3 | 4 - 9 | 10 - 25 | 25 - 99 | 100+ |
VPCS / VNETS | 6 | 20 | 50 | 200 | 200+ |
COMPUTE INSTANCES | 25 | 75 | 500 | 2000 | 2000+ |
STORAGE BUCKETS | 50 | 150 | 500 | 2000 | 2000+ |
IAM POLICIES | 10 | 50 | 200 | 500 | 500+ |
PRICE | $9,900 | $14,900 | $19,900 | $29,900 | Call For Pricing |
Fog 360
Deliverables
After Foghorn’s
Fog360 analysis is
complete, customers
receive a comprehensive
report and supporting
data, including:
TOPOLOGY
DIAGRAMS
1
> VPC’s
> Subnets
> NACLS
> Route Tables
> Security Groups
Permission
Document
2
> S3 Bucket
Policies
> IAM Policies
> Permission
Settings
Assessment
Document
3
> Summary of
Findings
> Areas of Risk
> Remediation
Recommendations
Fog 360
Deliverables
After Foghorn’s Fog360 analysis is complete, customers receive a comprehensive
report and supporting data, including:
1
TOPOLOGY
DIAGRAMS
> Subnets
> NACLS
> Route Tables
> Security Groups
2
Permission
Document
> IAM Policies
> Permission Settings
3
Assessment
Document
> Areas of Risk
> Remediation Recommendations
“Foghorn is absolutely my go-to consulting resource and
trusted partners for cloud and other strategic technologies.”