Direct Inward Dialing: +1 408 454 4213
Amazon Web Services (AWS) Log Management
Cloud Security Plus retrieves and uses AWS CloudTrail logs and S3 server access logs to detect malicious activity happening in the AWS environment. Reports provide detailed information on IAM activity, user login activity, and events that occur in Amazon S3, EC2, Route 53, Elastic IP, Elastic Network Interfaces, WAF, RDS, STS, VPC, ELB, and Auto Scaling.
Microsoft Azure Log Management
Cloud Security Plus fetches Azure activity logs via the Azure Monitor REST API to generate reports on who conducted what operations on your resources and when. The reports provide insights on changes made to network security groups, virtual networks, traffic manager, application gateways, virtual machines, DNS zones, databases, and storage accounts.