Wiz Defend is Here: Threat detection and response for cloud

    Integration overview

    Illumio CloudSecure provides Zero Trust Segmentation to public cloud applications and workloads. Together, Wiz Cloud Security Platform with Illumio CloudSecure ensures enhanced visibility into cloud environments and robust threat detection capabilities.

    The integration facilitates proactively mapping detected misconfigurations and vulnerabilities to the cloud object metadata, application deployments, and traffic flow telemetry data between workloads to apply Zero Trust Segmentation policies. This means organizations can implement granular access controls based on real-time threat intelligence, thereby minimizing the attack surface and automatically containing potential breaches. 

    Challenge

    Security leaders must constantly ensure their teams can quickly contain attacks in fast-changing cloud environments where attackers try every trick in the book to gain access and move around. However, organizations need more visibility into the traffic flows and threats because applications and workloads constantly spin up and down.

    Integration Benefits

    Enhanced visibility: Organizations benefit from leveraging visibility and context into security issues across cloud environments to apply proactive segmentation controls

    • Improved vulnerability management: The integration improves vulnerability management by detecting misconfigurations and vulnerabilities and adding application deployment and traffic flow telemetry data between workloads

    • Faster breach containment: The ability to implement granular access controls based on real-time threat intelligence minimizes the attack surface and automatically contains potential breaches

    Better Together

    Wiz will scan cloud resources for vulnerabilities and other issues. When it finds a critical security issue, it applies tags to identify the risk on the resource. Illumio CloudSecure will then import that tag and map it to an Illumio label. If a tag is marked as a “vulnerability,” it will trigger Illumio to map “vulnerability” to an Illumio label and apply policy based on that label to isolate the device. Illumio CloudSecure maps detected misconfigurations and vulnerabilities from Wiz to the cloud object metadata, application deployments, and traffic flow telemetry data. Illumio can create deny rules whenever a “vulnerability” label applies to a host. These deny rules will kick in and isolate that workload from, for example, being able to connect via HTTP or SSH to anything else. Illumio CloudSecure automatically applies a security policy to mitigate risk and close security gaps before malicious actors can exploit them. 

    cloud security provider?

    Become a Wiz Technology Partner

    WIN with us Already a partner?Log in

    Get a personalized demo

    Ready to see Wiz in action?

    “Best User Experience I have ever seen, provides full visibility to cloud workloads.”
    David EstlickCISO
    “Wiz provides a single pane of glass to see what is going on in our cloud environments.”
    Adam FletcherChief Security Officer
    “We know that if Wiz identifies something as critical, it actually is.”
    Greg PoniatowskiHead of Threat and Vulnerability Management