Skip to main content

How Cloud Monitor Works

Updated over 6 months ago

Overview:

ManagedMethods "Cloud Monitor" app is used to provide visibility into Cloud environments. Our platform obtains data for monitoring, taking actions and triggering alerts.


Details:

Cloud Monitor utilizes API's to obtain data from cloud environments. This provides our platform access to domain activity such as logins, files, emails, apps and more. Activity notifications provided by the connected service are evaluated for risk, threat and policy violations. All data and alerts are captured within one user friendly interface.

API:

Application Programming Interface is a set of protocols, definitions and tools for communication with an application. Simply allows connected service to send requests and receive answers.


Limitations:

Security solutions can be "In-Line" or "Out of Band". Cloud Monitor is "Out of Band".

In-Line:

Appliance or gateway where networking traffic is directly routed through. In-line appliances work as network filters to block activity. These can have in depth setup processes and configuration is often necessary on all devices used for environment connection.

Pros include Blocking Traffic in Flight, Full Packet Visibility and Decryption. Cons relate to Setup Time, Application Cost and potential User or Network Disruptions.

Out of Band:

Doesn't apply to direct network traffic. Out of Band solutions work by connecting to environments then capturing event data after it occurs. Retroactive action is taken instead of blocking. The advantage comes from minimal setup and zero user or network disruptions. Event notifications are captured in near real time to allow for optimal alerting, investigating and actions needs.

Pros include Simple Setup, Avoided Appliance Cost and no User or Network Disruptions. Cons relate to being limited API data events, lacking Blocking Traffic and no Decryption.

Did this answer your question?