What is our primary use case?
We have implemented various security solutions from vendors to ensure the safety of our clients and Blue Prism Cloud is one of them. Specifically, for container-related security, our enterprise security solution encompasses email security, domain security, and other manual security measures. This security framework is one of the options we offer for our instances. For instance, when using Azure as our cloud platform, we rely on Azure Security Center and Azure Sentinel. However, we understand that some clients may have their own instances or prefer a hybrid environment, combining cloud and on-premises solutions. In such cases, we can provide a customized security solution tailored to their specific needs.
We use many cloud providers, such as Microsoft Azure, GCP, Amazon AWS, and IBM.
What is most valuable?
The primary focus lies in integrating the three major cloud platforms with Blue Prism Cloud: Microsoft Azure, Amazon AWS, and GCP. This integration goes beyond security measures for the primary template policies. It also includes addressing compliance requirements. For instance, I can incorporate specific compliance templates and policies generated in Blue Prism and integrate them with local templates for ISO 27001 and GDPR, particularly concerning software tools and headsets. This integration eliminates the need for auditing and reviewing technical details individually. Instead, I can simply examine the container report. This approach proves beneficial when clients heavily rely on container environments.
What needs improvement?
We have limited integrations in place, and my objective is to integrate Sentinel. However, there are constraints as some individuals have only one or two options for SIM integration solutions. Given the urgency of quick resolutions in today's landscape, prevention and detection are crucial. While these measures provide significant security, it's equally important to focus on response and recovery. In the case of a ransomware attack, it's not enough to solely prevent and detect. Once detection is in place, a response model should be implemented to automate the process and minimize the time required for tasks, such as creating investigation reports. In the past, it would take approximately seven to eight days to create an investigation report for a specific attack, including writing a case study. This process can be streamlined and improved through the automation of contextual investigation reports. By saving base templates and content, including screenshots and attack details, automation can be achieved. We are currently working on integrating Microsoft WAF and Excel for this purpose, but having a built-in tool would be ideal.
For how long have I used the solution?
I have been using Blue Prism Cloud for approximately one and a half years.
Buyer's Guide
Blue Prism Cloud
November 2024
Learn what your peers think about Blue Prism Cloud. Get advice and tips from experienced pros sharing their opinions. Updated: November 2024.
816,406 professionals have used our research since 2012.
What do I think about the stability of the solution?
I rate the stability of Blue Prism Cloud a ten out of ten.
What do I think about the scalability of the solution?
Our security team of seven is using the solution. The team consists of engineers and security architects.
I rate the scalability of Blue Prism Cloud a nine out of ten.
How are customer service and support?
The support is excellent.
I rate the stability of Blue Prism Cloud a ten out of ten.
How would you rate customer service and support?
Which solution did I use previously and why did I switch?
Within my security product arsenal, I utilize various solutions like Genmap, QRadar, Alien, and others. The solution architecture is designed to accommodate different roles such as individual specialists and engineers. When logging on, one can access around fifteen to twenty different security components. These components cover a wide range of security areas, including ContainerVM security, on-premises security, email security, domain security, internal security, external security, conference-related security, as well as enterprise business and privacy tools.
Our primary suggestion is to leverage the out-of-the-box features when utilizing cloud solutions. If your company is using G Suite, for example, we recommend assessing the current situation and then applying the available out-of-the-box features within the G Suite Security Center. Additionally, we suggest considering the inclusion of quarantine, SPS, and other relevant measures. When dealing with phishing campaigns, we typically employ manual templates and methods tailored to each specific case. However, concerning email-related security solutions, we rely on G Suite's Netium Security.
How was the initial setup?
The initial setup of Blue Prism Cloud is incredibly seamless and smooth. It operates flawlessly. However, when it comes to Kubernetes and containers, our involvement is somewhat limited. We mainly deal with microservices applications that our clients are actively working on. We offer two deployment options for this new product, and we can efficiently deploy the solution within two to three days. The support team is also highly competent and skilled, providing excellent assistance and guidance. Nowadays, deployment models across various solutions tend to be quite similar. However, there are subtle differences in terms of packaging and deployment methods, which may vary among different vendors.
Extending the time frame slightly, typically takes approximately two to three days. During this period, we thoroughly examine fail logs and address any issues encountered. Eventually, we successfully gain access to the system and can proceed with our tasks.
What's my experience with pricing, setup cost, and licensing?
The default configuration does not include large-scale log injection, but if you require, such integration, it may incur additional costs per gigabyte. I don't have the exact pricing information for log injection, but it is possible that it varies depending on the volume of data. While there may be a basic service included, additional features might come at an extra cost. When working with cloud environments like VMs, calculating costs involves considering factors such as usage duration, network traffic, inbound and outbound data transfer, as well as network access control. The pricing structure for cloud coverage solutions follows a similar pattern, although specific pricing details would need to be obtained separately.
What other advice do I have?
I would recommend this solution to others. There are areas to improve,
I rate Blue Prism Cloud a nine out of ten.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Thank you for this review. It provides good incite into the market and your reasons for selection. This is a relatively immature market and direct user evaluations are valuable