Dukkaun Online

Cloud Security Solutions

As more and more organisations rely on the cloud for their critical infrastructure and applications, the challenges to security posed by rapid adoption of the cloud are becoming critical to address

  • Increased attack surface due to dispersal of assets
  • Lack of Visibility due to decentralized nature of setups and operations
  • Everchanging environment and dynamic workloads
  • DevSecOps introduces a new element
  • Privilege and Access management becomes more complex
  • Compliance and Governance requirments need to be extended to the cloud
Solutions Areas

Dukkaun Online helps organisations address all these isssues by providing Solutions in four major areas..

  • Visibility and Compliance
  • Compute Security
  • Network Protection
  • Identity Security

Visibility and Compliance

  • Dukkaun Online provides asset monitoring and inventory services covering regular and Shadow IT, Attack surface area identification, Dark web and Brand monitoring as well as Public Data leaks.
  • Cloud Security Posture Management (CSPM) provides complete application lifecycle security compliance and remediation
  • Email Security solutions give visibility into security threats in email such as Malware, Phishing, Account Takeover etc
  • CASB Solutions provide malware inspection for cloud traffic as well as Data protection and privacy control while addressing governance and compliance needs.

Compute Security

  • Workload Security
  • Application Security
  • Container Security
  • File Storage Security
  • Conformity

Network protection

  • Dukkaun Online provides all the traditional controls such as Firewall, IPS, WAF, DDOS and DNS Security for cloud environments.
  • A DMARC monitoring and management service is also available
  • Micro-segmentation to isolate and protect workloads and inspect E-W traffic is a core component of data centre security both on-premise and on-cloud

Identity Security

  • Dukkaun Online provides solutions and services around various aspects of the zero-trust architecture such as Privileged identity and access management, multi factor authentication, device identity and compliance status checks, adaptive access, access/runtime protection and more..
  Loading...