Chapter 16
Cloud Security Solutions
IN THIS CHAPTER
Automating security
Inventorying assets
Observing stacks
Protecting your data storage
Analyzing traces and creating data flow maps
Implementing enterprise identity management services
Going the AIOps route
Cloud security, or any kind of cybersecurity, is impossible without the use of technology. This chapter provides glimpses of a variety of applications that provide everything from unified cloud security services and malware detection to AIOps and more. This randomly ordered list of applications is in no way a definitive list but may work as a starting point in your search for the right apps to round out your security platform.
Checkpoint CloudGuard
The Checkpoint CloudGuard (www.checkpoint.com/cloudguard) is a unified cloud security ...