SlideShare a Scribd company logo
Visibility
Get full visibility into activity
in all your cloud environments
and accounts. Let your teams
develop while having confidence
there are no unknown risks.
Policy Monitoring
Apply best practice controls to
your configuration and usage of
cloud services. Arm your teams
with best practices to quickly
find misconfigurations.
Anomaly Detection
Detect malicious use from inside
or outside your organization. Use
advanced analytics to detect
inappropriate use of resources
from internal or external attacks.
Cloud Security Monitoring
Get the people, process, and technology you need so you can focus on moving
to the cloud instead of worrying about security.
Most organizations are rapidly adopting SaaS applications like Office365, Google
Apps, Salesforce and more to run their business. Many are also leveraging AWS,
Azure, or Google Cloud Platform to do research, develop new applications, or scale
production workloads. Although businesses are benefiting from expanded IT
capabilities, there’s been an increase in data breaches due to misconfiguration of
cloud services. Configuring these services often falls to developers and application
owners who lack an understanding of best practices for cloud security.
To successfully adopt cloud and enable your teams to move at competitive speed,
you need visibility into who is accessing your key enterprise cloud services, what
activity is taking place, and how these services are being administered. You need a
security partner with deep cloud security expertise and CenturyLink has you covered
with Cloud Security Monitoring.
ABC
<XML><XML><XML>*J&! abcd 4%SF
*J&!
*J&!4%SF
abcdABC
REPORT
Discover Protect
Controls Analysis
Best Practices
Compliance Map
Enrich Data +
Machine Learning
24x7 Expert
Monitoring & Response
SIEM Integration
Scheduled Reporting
Detect Respond
Simple
Deployment
10 minutes to full visibility,
just a simple connection to
cloud services via API
Integrate with
Existing Security
Integrate simply with
existing security SIEM for a
complete view
24x7 Ops Support from
Our Global Team of
Security Experts
Our global SOC teams monitor
activity around the clock
Suspicious Logon
Evaluation of device
information, IP, location,
and service accessed
Bruteforce Logon
Attempt
Failed attempts over
time, evaluation MFA
failure vs PW
API Commands
API execution from
known malicious IP
Attempted
Privilege Escalation
Excessive attempts to
access unapproved
resources
Unusual Velocity
of File Access
Access or downloads that
violate user or peer norms
Communication with
Known Malicious IP
File transfer or API access
from known malicious IP
Unusual
Administration
Unusual commands
issued by administrators
Unusual
Instance Start
Use of resources in a
way not typical for a
given admin
Disable Logging
Disabling of logging on
compute or database
instance
Command and
Control
Communication
outbound to known
malicious IP
Use of Sensitive
External Ports
Two-way connections
over SSH, RDP, FTP
Unusual Traffic
Pattern
Traffic flows that deviate
from typical patterns
About CenturyLink
CenturyLink (NYSE: CTL) is the second largest U.S. communications provider to global enterprise
customers. With customers in more than 60 countries and an intense focus on the customer experience,
CenturyLink strives to be the world’s best networking company by solving customers’ increased demand
for reliable and secure connections. The company also serves as its customers’ trusted partner, helping
them manage increased network and IT complexity and providing managed network and cyber security
solutions that help protect their business.
Analytic Examples
ACCESS ADMINISTRATION USER ACTIVITY NETWORK
Is Cloud Security Monitoring Right for You?
Do you need to know if stolen user credentials are used to access your Office365 applications?
Should you identify when a user downloads an unusual number of files from Google Drive?
Do you need to ensure security configurations in AWS accounts follow best practices?
Should you be able to identify bitcoin mining servers started in an unused Azure region?

More Related Content

PDF
Azure Information Protection
PDF
How to protect your corporate from advanced attacks
PPTX
00. introduction to app sec v3
PDF
Bleeding Servers – How Hackers are Exploiting Known Vulnerabilities
PDF
6 ways to manage IT Security
PDF
Top Five Security Must-Haves for Office 365
PDF
BeyondCorp Seattle Meetup: Closing the Adherence Gap
PDF
More Databases. More Hackers. More Audits.
Azure Information Protection
How to protect your corporate from advanced attacks
00. introduction to app sec v3
Bleeding Servers – How Hackers are Exploiting Known Vulnerabilities
6 ways to manage IT Security
Top Five Security Must-Haves for Office 365
BeyondCorp Seattle Meetup: Closing the Adherence Gap
More Databases. More Hackers. More Audits.

What's hot (20)

PDF
How to get deeper administration insights into your tenant
PPT
Owasp top 10 & Web vulnerabilities
PDF
Azure Security Center
PPTX
Owasp top ten 2017
PPTX
Security Testing Training With Examples
PPTX
Website Security
PDF
Splunk for f5
PDF
SOC-as-a-Service - comSpark 2019
PDF
The Anatomy of Comment Spam
PDF
Microsoft Cloud App Security
PDF
BeyondCorp New York Meetup: Closing the Adherence Gap
PPTX
OWASP Top 10 Vulnerabilities 2017- AppTrana
PDF
BeyondCorp and Zero Trust
PPT
Webhawk as-software
PPTX
Importance of Identity Management in Security - Microsoft Tech Tour @Towson
PDF
The Complete Web Application Security Testing Checklist
PDF
Protect your business with identity and access management in the cloud
PPTX
How to Secure Your IaaS and PaaS Environments
PDF
Remote Workforces Secure by Barracuda
PDF
Decriminalize Your Colleagues - How to Address Shadow IT in the Enterprise
How to get deeper administration insights into your tenant
Owasp top 10 & Web vulnerabilities
Azure Security Center
Owasp top ten 2017
Security Testing Training With Examples
Website Security
Splunk for f5
SOC-as-a-Service - comSpark 2019
The Anatomy of Comment Spam
Microsoft Cloud App Security
BeyondCorp New York Meetup: Closing the Adherence Gap
OWASP Top 10 Vulnerabilities 2017- AppTrana
BeyondCorp and Zero Trust
Webhawk as-software
Importance of Identity Management in Security - Microsoft Tech Tour @Towson
The Complete Web Application Security Testing Checklist
Protect your business with identity and access management in the cloud
How to Secure Your IaaS and PaaS Environments
Remote Workforces Secure by Barracuda
Decriminalize Your Colleagues - How to Address Shadow IT in the Enterprise
Ad

Similar to Cloud security monitoring (20)

PPSX
Are You Leveraging the Cloud? Or is it Leveraging You?
PDF
Today's Cyber Challenges: Methodology to Secure Your Business
PDF
Healthcare It Security Necessity Wp101118
PDF
Detecting Malicious Cloud Account Behavior: A Look at the New Native Platform...
PPTX
093049ov4.pptx
PPTX
Cyberlink Deck
PDF
Unified Protection for Multi-Cloud Infrastructure
PPTX
Cloud security From Infrastructure to People-ware
PDF
Cyber Security and Cloud Computing
PPTX
ITExpertUS Corporate (CyberSecurity) 2023.pptx
PPTX
CyberKnight capabilties
PPTX
Karunia Wijaya - Proactive Incident Handling
PDF
Cybersecurity Challenges - Identifying Key Threats and Trends.pdf
PPTX
Cloud Security Zen: Principles to Meditate On
PDF
Wl security-solutions
PDF
The 10 best performing cloud solution providers 2018
PDF
MONITORING PPT.pdf
PDF
How We Protect Our Business in the Cloud (The Smart Way)
PDF
The Secure Path to Value in the Cloud by Denny Heaberlin
PPTX
Containers At-Risk: A Review of 21,000 Cloud Environments
Are You Leveraging the Cloud? Or is it Leveraging You?
Today's Cyber Challenges: Methodology to Secure Your Business
Healthcare It Security Necessity Wp101118
Detecting Malicious Cloud Account Behavior: A Look at the New Native Platform...
093049ov4.pptx
Cyberlink Deck
Unified Protection for Multi-Cloud Infrastructure
Cloud security From Infrastructure to People-ware
Cyber Security and Cloud Computing
ITExpertUS Corporate (CyberSecurity) 2023.pptx
CyberKnight capabilties
Karunia Wijaya - Proactive Incident Handling
Cybersecurity Challenges - Identifying Key Threats and Trends.pdf
Cloud Security Zen: Principles to Meditate On
Wl security-solutions
The 10 best performing cloud solution providers 2018
MONITORING PPT.pdf
How We Protect Our Business in the Cloud (The Smart Way)
The Secure Path to Value in the Cloud by Denny Heaberlin
Containers At-Risk: A Review of 21,000 Cloud Environments
Ad

More from Gabe Akisanmi (10)

PDF
SaaS company in north america
PDF
Netscout threat report 2018
PDF
VMware Validated Design
PDF
Should we fear the cloud?
PDF
Hybrid cloud- driving a business
PDF
Is your infrastructure holding you back?
PDF
The shortest path to cloud success - your roadmap
PDF
Clustered data ontap_83_physical_storage
PDF
Alert logic cloud security report
PPTX
Windows 2008 R2 &amp; Windows7
SaaS company in north america
Netscout threat report 2018
VMware Validated Design
Should we fear the cloud?
Hybrid cloud- driving a business
Is your infrastructure holding you back?
The shortest path to cloud success - your roadmap
Clustered data ontap_83_physical_storage
Alert logic cloud security report
Windows 2008 R2 &amp; Windows7

Recently uploaded (20)

PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Machine learning based COVID-19 study performance prediction
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Modernizing your data center with Dell and AMD
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PPTX
MYSQL Presentation for SQL database connectivity
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PPT
Teaching material agriculture food technology
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
KodekX | Application Modernization Development
DOCX
The AUB Centre for AI in Media Proposal.docx
Reach Out and Touch Someone: Haptics and Empathic Computing
Machine learning based COVID-19 study performance prediction
Dropbox Q2 2025 Financial Results & Investor Presentation
“AI and Expert System Decision Support & Business Intelligence Systems”
NewMind AI Weekly Chronicles - August'25 Week I
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
Mobile App Security Testing_ A Comprehensive Guide.pdf
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Modernizing your data center with Dell and AMD
Digital-Transformation-Roadmap-for-Companies.pptx
MYSQL Presentation for SQL database connectivity
The Rise and Fall of 3GPP – Time for a Sabbatical?
20250228 LYD VKU AI Blended-Learning.pptx
Teaching material agriculture food technology
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
KodekX | Application Modernization Development
The AUB Centre for AI in Media Proposal.docx

Cloud security monitoring

  • 1. Visibility Get full visibility into activity in all your cloud environments and accounts. Let your teams develop while having confidence there are no unknown risks. Policy Monitoring Apply best practice controls to your configuration and usage of cloud services. Arm your teams with best practices to quickly find misconfigurations. Anomaly Detection Detect malicious use from inside or outside your organization. Use advanced analytics to detect inappropriate use of resources from internal or external attacks. Cloud Security Monitoring Get the people, process, and technology you need so you can focus on moving to the cloud instead of worrying about security. Most organizations are rapidly adopting SaaS applications like Office365, Google Apps, Salesforce and more to run their business. Many are also leveraging AWS, Azure, or Google Cloud Platform to do research, develop new applications, or scale production workloads. Although businesses are benefiting from expanded IT capabilities, there’s been an increase in data breaches due to misconfiguration of cloud services. Configuring these services often falls to developers and application owners who lack an understanding of best practices for cloud security. To successfully adopt cloud and enable your teams to move at competitive speed, you need visibility into who is accessing your key enterprise cloud services, what activity is taking place, and how these services are being administered. You need a security partner with deep cloud security expertise and CenturyLink has you covered with Cloud Security Monitoring. ABC <XML><XML><XML>*J&! abcd 4%SF *J&! *J&!4%SF abcdABC REPORT Discover Protect Controls Analysis Best Practices Compliance Map Enrich Data + Machine Learning 24x7 Expert Monitoring & Response SIEM Integration Scheduled Reporting Detect Respond Simple Deployment 10 minutes to full visibility, just a simple connection to cloud services via API Integrate with Existing Security Integrate simply with existing security SIEM for a complete view 24x7 Ops Support from Our Global Team of Security Experts Our global SOC teams monitor activity around the clock
  • 2. Suspicious Logon Evaluation of device information, IP, location, and service accessed Bruteforce Logon Attempt Failed attempts over time, evaluation MFA failure vs PW API Commands API execution from known malicious IP Attempted Privilege Escalation Excessive attempts to access unapproved resources Unusual Velocity of File Access Access or downloads that violate user or peer norms Communication with Known Malicious IP File transfer or API access from known malicious IP Unusual Administration Unusual commands issued by administrators Unusual Instance Start Use of resources in a way not typical for a given admin Disable Logging Disabling of logging on compute or database instance Command and Control Communication outbound to known malicious IP Use of Sensitive External Ports Two-way connections over SSH, RDP, FTP Unusual Traffic Pattern Traffic flows that deviate from typical patterns About CenturyLink CenturyLink (NYSE: CTL) is the second largest U.S. communications provider to global enterprise customers. With customers in more than 60 countries and an intense focus on the customer experience, CenturyLink strives to be the world’s best networking company by solving customers’ increased demand for reliable and secure connections. The company also serves as its customers’ trusted partner, helping them manage increased network and IT complexity and providing managed network and cyber security solutions that help protect their business. Analytic Examples ACCESS ADMINISTRATION USER ACTIVITY NETWORK Is Cloud Security Monitoring Right for You? Do you need to know if stolen user credentials are used to access your Office365 applications? Should you identify when a user downloads an unusual number of files from Google Drive? Do you need to ensure security configurations in AWS accounts follow best practices? Should you be able to identify bitcoin mining servers started in an unused Azure region?