Sign in
Categories
Your Saved List Become a Channel Partner Sell in AWS Marketplace Amazon Web Services Home Help
ProServ

Overview

Description:

Cybercrime and cheating threats, secure scaling, data capture and storage are all growing concerns for players and vendors alike in the gaming industry. Fog360 Security comprehensively scans and examines your AWS environment to protect you and your customers alike, as the threats come from more and more diverse tactics.

This 360-degree analysis tool lets you understand from a quantitative perspective what is actually running in your accounts. With Evoque Cloud Engineering powered by Foghorn’s help, a customized solution can be deployed quickly to analyze your AWS infrastructure, gain real-time visibility, and incorporate best practices. Fog360 Security allows AWS GameTech customers to realize powerful security improvements around workload partitioning, role-based access, least permission, network security visualization, and overall security posture.

As the gaming industry continues to grow as expected, the target on the back of the companies will grow to see more unauthorized users relentlessly poking the perimeter. The cost of breach, downtime, and reputation loss is so high, organizations are eager to harden their infrastructure running on AWS. Fog360 Security is a comprehensive security analysis and visualization service for gametech companies that takes a once complex and manual process and puts it in the hands of Evoque Cloud Engineering powered by Foghorn’s experienced engineers, who can update and automate your analysis.

Inclusions:

The cost of the Fog360 security service is based on your cloud environment’s complexity and number of accounts, instances, buckets and policies in place.

Fog360 starts with a personal review and understanding of your cloud infrastructure layers and environment as a whole and how the current architecture fits with the business needs. From there, we deploy proprietary discovery tools to review and expose potential security weaknesses to finally deliver an analysis that is complete with remediation suggestions.

Deliverables:

  • A comprehensive report, detailing you current IaaS layers
  • Topology diagrams of VPC’s, subnets, NACLS, route tables, security groups
  • Permission diagrams of S3 bucket policies, IAM policies, permission settings
  • Summary of findings
  • Areas of Risk
  • Remediation Recommendations

Cost:

T-Shirt size pricing table available based on number of CSP Accts, VPCS/VNETs, Compute Instances, Storage Buckets, IAM Policies/roles, etc

Sold by Foghorn
Categories
Fulfillment method Professional Services

Pricing Information

This service is priced based on the scope of your request. Please contact seller for pricing details.

Support

Support will be delivered directly via our shared slack channel.

For more information, please email us at info@foghornconsulting.com