VIAVI Observer Sentry Threat Exposure Management solution analyzes, models, and visualizes your AWS (Amazon Web Services) and EKS (Elastic Kubernetes Services) environments to help you proactively pinpoint where your cloud assets are exposed. Sentry’s intuitive views highlight misconfigurations, overly permissive settings, and risky combinations of exposure paths and vulnerabilities to specifically identify where to mitigate the risk of attack - prior to being compromised.
See your environment from the attacker's perspective with our attack path visualizations. Our exposure path analysis and advanced graph theory algorithms identify relationships between otherwise siloed security findings to continuously visualize and prioritize critical security gaps to better secure your cloud stack and ensure your team is working efficiently.
Observer Sentry Features and Benefits Summary
- Full Security Visibility. Sentry empowers your team with the comprehensive visibility needed to understand your cloud stack, using an agentless approach, you can continuously scan your environments simultaneously.
- Attack and Exposure Path Management. See the end-to-end exposure and attack paths for VMs, services, storage, and containers within minutes by calculating their effective external exposure. Identify unknown or undesired access to assets or environments in actionable context to quickly remediate, improving your cloud security posture.
- Maximum security, minimal effort. Agentless technology puts the control back into the user’s hands. With minimal effort, your teams can scan your entire cloud environment map and visualize your assets and their relationships.
- Focus on risks that matter most. Detect, prioritize, and remediate critical exposure and attack paths with Observer Sentry, continuously prioritizing critical risks based on the analysis of misconfigurations, network exposure, vulnerabilities, and other factors providing a prioritized view of risk for your cloud environment.
AWS + EKS Visibility
Connect to your AWS environment and EKS clusters in minutes. Our agentless approach continuously scans your AWS environment and its EKS and ECS (Elastic Container Service) clusters. Private EKS clusters can be connected via a Helm-deployed container. Observer Sentry maps provide highly intuitive cross-environment diagrams that quickly identify misconfigurations, overly permissive settings, and changes.
Exposure Path Management
Within minutes of connecting, see an automated list of Exposure Paths from various points of entry into your environment along with detailed hop-by-hop reachability to specific assets. Identify unknown or undesired access to assets or environments and take corrective action.
Attack Path Management
Attack Paths are the dangerous combination of exposure, exploitable network vulnerabilities and risky configurations that provide the paths of least resistance to high-value resources within your environment.
Attack Path management provides actionable context on your most critical issues, so your teams can proactively and continuously improve your cloud security posture.
Attack Surface Management
Observer Sentry creates a detailed inventory of your cloud assets and then performs an analysis to determine their attack surface, effective exposure, and risk. This analysis can also be applied collectively to logical groupings of assets that make up specific applications and workloads. These groupings are tracked in scorecards and visualized in attack surface maps.