Simplify and Strengthen Protection for Workloads, Data, and Infrastructure

Cloud Defender is an integrated suite of managed infrastructure and workload security and compliance controls for the cloud, on-premises, hosted, and hybrid infrastructures.

Shrink Your Attack Surface With One Monthly Subscription

Infrastructure and Software Vulnerability Management

Network & Server-Side Threat Detection

Web Application Protection

User-Driven Threat Detection

Infrastructure and Software Vulnerability Management

  • Insecure Cloud configurations
  • Insecure network settings
  • Insecure OS configurations
  • WordPress, Drupal, Joomla, Magento and other CMS platforms
  • Application platforms such as Java, JavaScript, Microsoft .NET, Node.js, Python, PHP, Ruby on Rails, Apache Tomcat, Apache Struts and many others
  • Linux server OS’s from RedHat, Ubuntu and SUSE
  • Microsoft Operating Systems including Windows Server 2016, 2012, and 2008
  • Virtualization and container platforms including VMware, Xen, Docker and others
  • Database platforms including Microsoft SQL, Oracle, MySQL, PostgreSQL, MariaDB and others
  • Web servers including Apache Tomcat, Microsoft IIS and Ngnix
  • Plug-ins, servlets, platforms and API’s

Network & Server-Side Threat Detection

  • Ransomware
  • Brute force attacks
  • Multi-stage attacks
  • Bot-nets
  • Remote privilege escalations
  • Command and control
  • Lateral movement
  • Privilege escalation
  • Indicators of compromise

Web Application Protection From:

  • SQL injection
  • Remote code execution
  • Arbitrary file upload
  • Cross-site scripting (XSS)
  • Cross-site request forgery (CSRF/SSRF)
  • Path traversal
  • Session hijacking

User-Driven Threat Detection

  • Account compromise
  • Data exfiltration
  • User access policy violations
  • Identity access management misconfigurations
  • Privileged account mis-use
  • Privilege escalation

User-Driven Threat Detection

  • Account compromise
  • Data exfiltration
  • User access policy violations
  • Identity access management misconfigurations
  • Privileged account mis-use
  • Privilege escalation

Web Application Protection From:

  • SQL injection
  • Remote code execution
  • Arbitrary file upload
  • Cross-site scripting (XSS)
  • Cross-site request forgery (CSRF/SSRF)
  • Path traversal
  • Session hijacking

Network & Server-Side Threat Detection

  • Ransomware
  • Brute force attacks
  • Multi-stage attacks
  • Bot-nets
  • Remote privilege escalations
  • Command and control
  • Lateral movement
  • Privilege escalation
  • Indicators of compromise

Infrastructure and Software Vulnerability Management

  • Insecure Cloud configurations
  • Insecure network settings
  • Insecure OS configurations
  • WordPress, Drupal, Joomla, Magento and other CMS platforms
  • Application platforms such as Java, JavaScript, Microsoft .NET, Node.js, Python, PHP, Ruby on Rails, Apache Tomcat, Apache Struts and many others
  • Linux server OS’s from RedHat, Ubuntu and SUSE
  • Microsoft Operating Systems including Windows Server 2016, 2012, and 2008
  • Virtualization and container platforms including VMware, Xen, Docker and others
  • Database platforms including Microsoft SQL, Oracle, MySQL, PostgreSQL, MariaDB and others
  • Web servers including Apache Tomcat, Microsoft IIS and Ngnix
  • Plug-ins, servlets, platforms and API’s

Focus On Your Business While We Monitor Threats For You 24x7x365

Investigating unreliable alerts wastes two-thirds of staff time while actual breaches go undetected an average of 146 days. With ActiveWatch managed detection and response you get actionable insight when it counts with:

  • Full-stack detection analytics
  • Explanatory reports on verified incidents
  • 24x7x365 expert monitoring
  • Live notification and help within 15 minutes of a high-severity incident
Full Stack Assessment
& Detection Analytics
24x7x365
Expert Monitoring
Verified
Reports
Live Notification and
Help Within 15 Minutes
of High-Severity Incident
Full Stack Assessment & Detection Anayltics
24x7x365 Expert Monitoring
Verified Reports
Live notification and help within 15 minutes of a high-severity incident

Contain Multi-Stage Attacks with Supervised Machine Learning

Reduce dwell time and increase response accuracy with algorithmic detection of the leading breach vectors

We use supervised machine learning to develop threat detection algorithms based on mathematical patterns found in network data leading up to previously successful cyber attacks. The first such algorithm now detects multi-stage, multi-vector SQL injection attacks with only 4% false positives, or 96% true positive accuracy.

Contain Multi-Stage Attacks with Supervised Machine Learning

Identify Threats to your Web Applications and Workloads

Cloud Defender Layer 7 inspection includes continuously updated rules and policies to detect millions of Layer 7 threats.  And when adversaries don’t follow a known web attack pattern, anomaly detection can sense when something “just doesn’t look right .”

Identify Threats to your Web Applications and Workloads

Cloud Defender is an Award Winning Managed Cloud Security Solution

  • Info Security Products Guide

    Global Excellence Gold Winner -
    Product Excellence - Cloud Security -
    Alert Logic Cloud Defender v1.5

  • Info Security Products Guide

    Best Products and Services, Cloud Security,
    Alert Logic Cloud Defender
    (with new Supervised Machine Learning)

  • SC Magazine European Awards

    Best Managed Security Service - Cloud Defender

Plug Into Ready-to-Use Services

Get advanced security at a fraction of the time and cost of tool-only and outsourcing approaches.

Plug Into Ready-to-Use Services

Integrated, Modular Controls to Suit Your Workload Security Needs

  • Reduce
    Attack
    Surface

    Assess Vulnerabilities and Misconfigurations

  • Block
    Web
    Attacks

    Prevent Malicious HTTP / SSL

  • Identify
    Suspicious
    Activity

    Network, Web and Log Data

  • Reveal
    Actual
    Threats

    Analytics and Machine Learning

  • Prioritize,
    Explain,
    Notify

    24x7x365
    Global SOC

  • Act On
    Insight(Your Team)

    Contain and Remediate

  • Review,
    Report
    And Attest

    SOC 2, PCI DSS, HIPAA, SOX, GDPR

Reduce Attack Surface

Assess Vulnerabilities and Misconfigurations

Block Web Attacks

Prevent Malicious HTTP / SSL

Identify Suspicious Activity

Network, Web and Log Data

Reveal Actual Threats

Analytics and Machine Learning

Prioritize, Explain, Notify

24x7x365 Global SOC

Act On Insight (Your Team)

Contain and Remediate

Review, Report and Attest

SOC 2, PCI DSS, HIPAA, SOX, GDPR

Schedule Demo

Want to see Alert Logic Cloud Defender in more detail?
Complete this form or call us direct at 844.816.1051, for the UK call +44 (0) 203 011 5533. An Alert Logic representative will contact you soon.