MANAGED CONTAINER & SERVERLESS SECURITY
combined service of Alice&Bob.Company and Lacework
Container and serverless environments are highly dynamic. Compute entities are volatile or even cannot be consumed in a traditional client/server way. Especially Kubernetes is extremely powerful, but also the source of innumerable security breaches. Container security expert know-how is very hard to find and even harder to scale.
Enhance the security of your container and serverless environments, while leveraging all benefits of these technologies.
Alice&Bob.Company provides a managed security solution, based upon Lacework Platform.
As a certified Lacework partner and reseller, Alice&Bob.Company sets up the environment on behalf of the clients and takes over the operational responsibility.
This, on the one hand, gives you the opportunity to free resources to improve your digital product, on the other hand generates continuous insights into your cloud deployment, also across multiple public cloud vendors.
Alice&Bob.Company provides managed full lifecycle security for images, containers and serverless environments.
We perform all the necessary initial configurations. We usually connect the platform to your various cloud accounts and your container platform within one day. We coordinate this with your teams. After that, the system learns the normal behavior of your platforms based on artificial intelligence (AI) algorithms within a few days, sets thresholds on its own and configures the required alerting, evaluates and condenses the alerts and provides the required forensic data on the alerts.
When the platform starts working, Alice&Bob.Company constantly maintains the cloud native security platform for you. Configuration is being tweaked and optimized to minimize your efforts for a high security level of your cloud environments.
A&B takes over the operational responsibility. Therefore, Alice&Bob.Company will be added to the alert and notification chain. This also includes real-time alerting. In collaboration with the client – and taking into account the concrete scope of the contract – Alice&Bob.Company proactively supports you in case of security issues by qualifiying and assessing them and provides you with resolution guides
More complex security incidents are tracked and handled by Alice&Bob.Company’s Security Incident Management process. They are resolved tandem working with the client.
The customer will get direct access to the CSPM tool, can take advantage of the detailed reporting without the hassle and burden to get the platform managed.
The platform comes with the following features enabled:
other products in 04 continuous improvement
Continuous Penetration Testing
Minimize the risk of application vulnerabilities by combining manual and continuously automated penetration testing for your web applications and API’s.
Cloud Security Posture Management
Keeping visibility and enforced security across public cloud accounts – probably across multiple public cloud vendors with the right tools: facilitate a managed Cloud Security Posture Management (CSPM) service by Alice&Bob.Company.
Managed Perimeter Protection
Protect your publicly accessible websites, e-commerce platforms, IoT-, IIoTT-applications and other dynamic web application against abuse of bugs, vulnerabilities and Distributed Denial of Service (DDoS) attacks. The team of A&B and AWS give you a peaceful sleep.
Security Chaos Engineering Program
Transfer the disruptive operational method of chaos engineering, developed initially by Netflix, to cloud security. We accompany your team(s) over the course of 12 month to establish the concepts and culture of Security Chaos Engineering (SCE).
CI/CD Pipeline improvement
Pimp your existing CI/CD pipeline to the next level! Alice&Bob.Company continuously monitors and improves your current CI/CD pipelines.
We continuously integrate automated and scalable Cloud Security into your software development lifecycle.
Security Champions Program
Cloud Security Trainings
Never stop learning! The cloud never stops teaching! In Jan 2021 AWS consists of more than 199 ready to use service. 45+ of those are security related. Let us help to enable and educate you team(s) with an individual training plan over a timeframe of 6 to 24 months.
Custom Tailored Managed Service
Is there anything you need, but we haven’t covered? We are always curious and eager to learn about your requirements. And maybe, we develop a new Cloud Security Managed Service together.