Introducing
Fog360

Holistic Security Analysis &
Visualization Service from Foghorn

Speak to a Security Expert

THREAT DETECT

With hackers relentlessly poking the perimeter and the cost of breach,
downtime, and reputation loss so high, organizations are eager to harden
their cloud infrastructure.

Q: Is your organization employing best practices to maximize security architecture in all layers?

A: Foghorn has built a proven and trusted off-the-shelf solution to analyze all IaaS layers to identify vulnerabilities before they can be exploited.

Foghorn  Fog360 Hacker

FOG 360 ROADMAP TO DESIRED STATE

Fog360 Design Intent

Design Intent

Discovery session with
engineers and architects
to understand business and
technical requirements
that drove architecture
Fog360 Design Reality

Design Reality

We deploy our automated
discovery tool to document
and visualize Network,
Firewall Rules, IAM, Storage,
and Account Settings.
Fog360 Design Fix

Design Fix

We deliver a consultative
analysis of findings to
call out risk areas
andremediation
recommendations.

Design Intent

Discovery session with engineers and architects
to understand business and technical requirements
that drove architecture

Design Reality

We deploy our automated discovery tool to document
and visualize Network, Firewall Rules, IAM, Storage,
and Account Settings.

Design Fix

We deliver a consultative analysis of findings to
call out risk areas andremediation
recommendations.

RIGHT-SIZED ENGAGEMENT

Your Fog360 security analysis price is based on the size and complexity of your cloud environment.

Small Medium Large XLarge XX Large
CSP ACCOUNTS 3 4 - 9 10 - 25 25 - 99 100+
VPCS / VNETS 6 20 50 200 200+
COMPUTE INSTANCES 25 75 500 2000 2000+
STORAGE BUCKETS 50 150 500 2000 2000+
IAM POLICIES 10 50 200 500 500+
PRICE $9,900 $14,900 $19,900 $29,900 Call For Pricing
Fog360 Advantage
Accelerate security posture understanding
Improve the security posture of cloud environments
Enhanced decision making, analysis of current state
Identify vulnerabilities before security fails
Position security as known strength to speed innovation
Give regulators head start with compliance obligations

Fog 360
Deliverables

Fog360 Deliverables List

After Foghorn’s
Fog360 analysis is
complete, customers
receive a comprehensive
report and supporting
data, including:

TOPOLOGY
DIAGRAMS

1

 
> VPC’s
> Subnets
> NACLS
> Route Tables
> Security Groups

Permission
Document

2

 
> S3 Bucket
Policies
> IAM Policies
> Permission
Settings

Assessment
Document

3

 
> Summary of
Findings
> Areas of Risk
> Remediation
Recommendations
Fog360 Deliverables List

Fog 360
Deliverables

After Foghorn’s Fog360 analysis is complete, customers receive a comprehensive
report and supporting data, including:

1

TOPOLOGY
DIAGRAMS

> VPC’s
> Subnets
> NACLS
> Route Tables
> Security Groups

2

Permission
Document

> S3 Bucket Policies
> IAM Policies
> Permission Settings

3

Assessment
Document

> Summary of Findings
> Areas of Risk
> Remediation Recommendations

“Foghorn is absolutely my go-to consulting resource and
trusted partners for cloud and other strategic technologies.”

DAVE SWAN, VP, IT & APPLICATIONS NATERA

SUCCESSFUL CLIENT PARTNERSHIPS

Ellie Mae
Chronicled
Clear Factr
Natera