A Single Partner for Everything You Need Optiv works with more than 450 world-class security technology partners. By putting you at the center of our unmatched ecosystem of people, products, partners and programs, we accelerate business progress like no other company can.
We Are Optiv Greatness is every team working toward a common goal. Winning in spite of cyber threats and overcoming challenges in spite of them. It’s building for a future that only you can create or simply coming home in time for dinner. However you define greatness, Optiv is in your corner. We manage cyber risk so you can secure your full potential.
Agile and Proactive Security Assessments of AWS Cloud Deployments Breadcrumb Home Insights Blog Agile and Proactive Security Assessments of AWS Cloud Deployments July 11, 2018 Agile and Proactive Security Assessments of AWS Cloud Deployments Is your company’s AWS environment secure? How would you know? Most companies have security personnel, but their expertise in the cloud may be limited. To have a team of highly trained AWS security experts on staff is a bit of a rarity. Yet, security in the cloud is often paramount to the success of the organization. As a result, organizations often call Optiv to assess the current state of their AWS implementations and report on security findings. We often find that the first hurdle to overcome is not technical in nature but related to developing trusted partnerships within the organization. We and our clients are able to do our best, and better achieve the businesses’ unique objectives, when we are tightly aligned. Here’s a great example. Late last year, Alight Solutions (“Alight”) asked us to assess their AWS security environment and make recommendations based on our findings. Alight was in the early stages of implementation and had just begun laying out their architecture. We had several meetings to determine the scope and understand their objectives. During the process, we developed a great working relationship with the Alight team. This enabled both parties to communicate effectively and to clearly convey expectations. As a result, we were able to marshal the right team of Optiv experts to: Analyze Alight’s AWS architecture; Assess Alight’s third-party proxy and firewall solutions; Provide an automated assessment of AWS configuration settings; and Perform a console-based hands-on evaluation of the security environment. We generated a report that identified areas of concern where security gaps and vulnerabilities existed. Our report also provided a pathway to success by providing visibility into areas that needed the most attention. Alight was pleased with our deliverable and used the information during their development and deployment process. About five months later, Alight called us back in to re-assess their AWS environment. We found that the environment was secured, and the security policy was well developed and aligned with AWS security best practices. Alight was so buttoned up that the company scored 100 percent on a security health metric – a major improvement from their previous assessment. Security has become part of the culture and is now part of everything they do. “We utilized Optiv’s Cloud Security Services to perform a security assessment of our AWS environment. As a result, Optiv helped enable Alight to identify areas of opportunities and position us to be more proactive when assessing our AWS cloud deployments. They were a great partner and provided tremendous value.” - Jason Lish, Chief Information Officer at Alight Solutions By: Daniel Brennan Cloud Security Architect Daniel Brennan is an accomplished cloud security architect with over 30 years of IT experience. As a cloud security architect, he helps to ensure the successful integrated delivery of cloud security solutions. He works with teams across Optiv to ensure clients have the right information, guidance, and strategy to successfully secure their environments. Share: Security Assessment
Would you like to speak to an advisor? How can we help you today? Image E-Book Cybersecurity Field Guide #13: A Practical Approach to Securing Your Cloud Transformation Download Now Image Events Register for an Upcoming OptivCon Learn More Ready to speak to an Optiv expert to discuss your security needs?