Who we are
CloudKnox provides a Cloud Identity Permissions Management platform transforming the way enterprises protect their critical cloud resources from insider threats (accidental or intentional). We empower IAM, security operations, and cloud infrastructure teams to continuously monitor and enforce the principle of least privilege across hybrid and multi-cloud environments. This is achieved through our patented activity-based authorization protocol.
The platform delivers both detection and remediation with our Just Enough Privileges Controller, empowering enterprises to uncover and fix over-provisioning of identities within the same platform.
CloudKnox deploys in minutes providing granular visibility, actionable insights, and control of machine and human identities with excessive high-risk privileges from day one.
Key benefits of the platform are:
• Reduced cloud security and infrastructure operations costs by up to 80%
• Simplified multi-cloud permissions management by enforcing least privilege policies across multi cloud environments.
• Immediate time-to-value as platform can be deployed in less than 30 minutes and is fully operational within 24 hours.
• Simple non-intrusive deployment which has no impact on DevOps and IT team productivity.
Key features of the platform also give the platform a competitive advantage including:
• Privilege Creep Index (PCI)
• Activity-Based Authorization
• JEP (Just-Enough-Privileges) Controller
• Cross-Cloud Dashboard
• Anomaly Detection
• Compliance Engine
• Hybrid/Multi-Cloud support
What people are saying?
Gartner Names CloudKnox Security a 2020 Cool Vendor in IAM and Fraud Detection Cloudknox is recognised for patented technology and innovative approach to multi cloud permissions management through activity-based authorization and automated remediation.
To learn more click here
How does our solution work?
The CloudKnox solution supports continuous, adaptive risk-based decision making as defined by Gartner’s Continuous Adaptive Risk and Trust Assessment (CARTA) framework. Our cloud security platform continuously monitors, assesses, adapts and responds to IAM risk as needed in real-time. The CloudKnox Cloud Security Platform is comprised of two components: Sentry & FortSentry. Sentry is a Linux virtual machine that is installed in the customer environment. Sentry collects the privileges and activity data of all unique identities that can touch the infrastructure from each cloud platform and uploads the data to the SaaS portal which is called FortSentry.
Telstra Ventures invests in market leading, high growth technology companies with exceptional products and leaders.