MicroPerimeter™

SECURITY VISIBILITY

Understanding the complete trail of connections from one service to another requires identity for all services, centralized tracking, and tagging each request to understand where it fits. MicroPerimeter™ Security does this out of the box. The automatic registration of services enables microservice decomposition; this not only provides visibility into potential breaches but also enables higher velocity in your CI/CD pipeline.

MicroPerimeter™

SECURITY VISIBILITY

Understanding the complete trail of connections from one service to another requires identity for all services, centralized tracking, and tagging each request to understand where it fits. MicroPerimeter™ Security does this out of the box. The automatic registration of services enables microservice decomposition; this not only provides visibility into potential breaches but also enables higher velocity in your CI/CD pipeline.

API
VISIBILITY

You can’t protect what you can’t see, but by placing MicroPerimeter™ Edge in front of your services, you can now see every service, every transaction, and every response code. This allows you to block unwanted traffic while also understanding where it is coming from so you can craft more precise security responses to potential threats.

API
VISIBILITY

You can’t protect what you can’t see, but by placing MicroPerimeter™ Edge in front of your services, you can now see every service, every transaction, and every response code. This allows you to block unwanted traffic while also understanding where it is coming from so you can craft more precise security responses to potential threats.

END-to-END
TRANSACTION &

TAGGING

Services call other services. Unfortunately, those transactions are often anonymous and out of context, making it is difficult to understand what was accessed in the event of a breach. This becomes very expensive with per-record exposure fines under new privacy laws when the entire dataset was potentially exposed.

Cloudentity supports the OpenTracing standard with our unique transaction fingerprint technology. This gives every transaction an identifier, timestamp and a cryptographically signed fingerprint to create a chain of custody through every service call. Now you can see exactly what services were touched and what user, service or thing initiated cascading transactions.

INSTALL
MicroPerimeter™ API SECURITY

IMMUTABLE
AUDIT TRAIL

Every transaction is signed with a unique identifier that requires a key to verify. This allows the data to be verified even at rest – if the transaction record changed after the fact, the signature won’t match giving you peace of mind that audits are accurate.

ALERTS &
AGGREGATION

Discovering issues is often by noticing something weird. Cloudentity tracks all requests and is able to provide granular information about unusual traffic. The Dashboard is a great place to learn about the behavior in your API ecosystem and catch oddities before they become problems.

INTEGRATION

While we provide rich data and visualization, we realize you have an investment in analytic and alerting tools.  Our data collection systems are built on standards and open standards architecture to make it easy to connect business intelligence, escalation notification, and other analytic tools you use day-to-day.

INTEGRATION

While we provide rich data and visualization, we realize you have an investment in analytic and alerting tools.  Our data collection systems are built on standards and open standards architecture to make it easy to connect business intelligence, escalation notification, and other analytic tools you use day-to-day.