We are a multi-cloud service provider that leverages all major cloud providers, such as AWS, Azure, GCP, and OfficeLab, for our internal consumption and for our customers. Managing and monitoring the compliance of the platform across hundreds of accounts can be challenging, especially without a solution like Check Point CloudGuard Posture Management, which continuously scans and alerts us against policy violations. If the policy is violated, we are alerted, the issue is identified, and we are assisted in resolving it.
It is easy to write custom rules and policies using the GSL Builder. We do not need to learn any programming language or structured query language to write back queries. GSL Builder enables us to click and drag to build our own rules. For example, if we want to fetch all the servers that are accessed publicly, we can simply put down the servers where access is public. GSL Builder creates an easy-to-use interface so that administrators no longer need to know a specific language to make this happen. Therefore, once the query is ready, we can quickly test it to check its effectiveness, modify it quickly, and then start using it.
Non-technical people can learn to use the GSL Builder in less than ten hours.
We have reduced human error using GSL Builder by 20 percent. For example, if I have to write a query, I could make a typo or omit spaces, which could cause the query to be structured incorrectly. With GSL Builder, the only thing humans need to do is drag and drop logic from existing utilities. This means that I can simply click and select when to perform an action, and the system will generate the query for me. This reduces the amount of human input required and, consequently, the likelihood of human error.
The GSL Builder has saved us a significant amount of time. What used to take several hours now only takes a few minutes to complete.
Automatic remediation is very helpful. When an alert is raised, it allows us to trigger bots that can automatically fix the issue. For example, if I'm granting server access to the public, I can create a remediation rule to monitor this. If the rule is violated, the bot will automatically disable public access. This has been very efficient for us.
We have created custom policy checks for our organization, leveraging industry standards such as CIS and SIPAA. We also perform custom assessments against the policy based on our regulatory requirements. Overall, this helps us to mitigate risks and ensure compliance integrity. It also helps us to build cloud solutions correctly and detect and respond to unauthorized authentication changes and security compromises.
Unified Security Management provides a single pane of glass view, eliminating the need to toggle between different consoles and service providers to get a complete picture of our security landscape. The solution provides all the answers we need on a single dashboard. Simply connect to the portal to get all the information we need. For example, if we need to understand the details of a specific cloud, such as its name, configuration, and additional attributes, we don't need to log in to the cloud or another service provider. We can simply look up the server within the Unified Security Management dashboard.
Check Point CloudGuard Posture Management has helped our organization achieve almost 100 percent compliance from zero visibility. I'm proud to say that we upgraded hundreds of thousands of tools and assets against the policy set, and we are now close to 99.6 percent compliant. CloudGuard Posture Management has been very effective for us. In an ever-changing landscape, we ensure that we meet our compliance requirements. Once we have achieved compliance, we can change our policies to make them more stable, and then we strive to meet those standards again.
We have strong in-house capabilities and a team of developers who have a deep understanding of CloudGuard Posture Management. Using the solution's APIs, we can automate our security. We have been able to segregate workloads, accounts, and assets by department, business, cloud provider, and responsible stakeholders. We can then secure these assets according to our internal business requirements. All of this has been achieved and made possible by the CloudGuard Posture Management platform.
The best thing about agentless workload posture is that it doesn't impact our production workloads. Other solutions install agents on our system and continuously scan them, which can sometimes cause performance problems. CloudGuard Posture Management, on the other hand, takes a snapshot of our current workloads and scans it offline, which is a more efficient process.
The solution has helped us reduce our compliance and audit activities. I used to spend a week capturing all the data required for an audit and now I can do it in a couple of hours. With a click of a button, we can run reports to show auditors our compliance for anything in the last run mode. We can also download, share, and view all the details, including how many views are assessed against an account, the outcomes, and the current posture. All of this information is clearly presented in black and white, so we don't have to manage any data ourselves. If we want to report against certain clients, such as those covered by HIPAA, we can get a comprehensive report that we can easily share with our auditors.
CloudGuard Posture Management has reduced a lot of effort. Before implementing the solution, I had to write a separate script for each platform. Once I had the data, I needed to spend time understanding the output of the scripts and identifying the compliance aspects of compliant assets. I also had to segregate the data for all clouds and then work on it. Finally, I had to repeat the same exercise to see if things had remained secure. This was a very tedious process, but CloudGuard Posture Management has saved us a lot of time.
CloudGuard Posture Management has saved our SecOps team time. It is connected to our alerting systems and is accessible to all of our security teams. This includes the security team, the operations team, and the backend team. All of these teams have access to the solution and can see the changes that they are implementing and whether or not they are segregating properly. They are also constantly monitoring the alerts that are raised to take corrective action.