Agent Technical Overview

Armor Anywhere - Security
Defend
Data Anywhere
ARMOR AGENT OVERVIEW
Protect valuable workloads
and cloud environments — no
matter where they’re located.
Defend Your Cloud Workloads
Security Operations
Organizations want the benefits of the cloud but are required
to piece together an effective security program to protect cloud
data and stop malicious actors before they enter your Virtual
Machine and become a true compromise. Armor Anywhere
- Security allows you to secure your data without additional
headcount or overburdening your team.
Security results from the Armor Agent provide valuable
data to Armor’s Security Operations Center, where our
experts manage and secure your systems and workloads
– monitoring both inbound and outbound traffic at the host
– and identify malicious threats in real-time to enable quick
response and containment before larger issues occur.
Obtain the benefits of Armor’s powerful cloud expertise,
proactive security team and advanced threat intelligence
without the complexity of hiring a security operations task force.
Our Security Operations Center and the processes they
use are organized to ensure the highest level of security to
our customers. The Threat Resistance Unit (TRU) collects,
enriches and disseminates threat intelligence, to ensure
that our experts stay ahead of threats that could impact
customer environments.
The Armor Agent
Armor Anywhere - Security operates through the Armor
Agent installed on your server. The Armor Agent applies a
suite of security services to public, on-premise, private and
hybrid workloads.
The Armor Agent also establishes a connection to the Armor
Management Portal (AMP), allowing visibility of all instances of
the Armor Agent you have installed on any cloud.
Our Indications and Warnings (I&W) team monitors customer
environments for anomalies around the clock. The incident
Response and Forensics (IRF) team focuses on mitigating
and responding to potential points of compromise. Each of
the teams in our Security Operations Center work together
to constantly improve processes and fine-tune our tools –
staying ahead of threats.
Secure
Any Cloud
Real-Time Security
Dashboard via AMP
Automated
Installation
Supports MultiCloud Strategies
armor.com (US)+1 844 682 2858 (UK)+44 800 500 3167
@armor
Armor Anywhere - Security
ARMOR AGENT OVERVIEW
How It Works
Security Services
Once the quick and easy installation is complete,
the Armor Agent registers with Armor’s API
service endpoints via open outbound network
ports or port-forwarding services. All data in
transit is encrypted using TLS 1.2.
Intrusion Detection
With visibility to inbound and outbound activity at the host, Armor inspects
anomalous traffic against predefined policies – detecting attacks like generic
SQL injections, generic XSS attacks, DoS and generic web app effects.
Malware
Protection
Armor protects your environment from harmful malware and botnets deployed
to capture your data, monitor your activity or leverage your servers for illicit
activity. In the event an alert is created, Armor’s threat analysts begin an
in-depth investigation.
With a secure connection established, the security
scan results and activity logs are sent to the
Armor Management Portal (AMP). The security
results and logs also feed into Armor’s Security
Operations Center (SOC) and data is translated
into security policies applied to your environment.
OS File
Integrity Monitoring
Monitor critical operating system (OS) files for changes that may allow threat
actors to control your environment. File integrity monitoring (FIM) utilizes
OS-specific policies and provides Armor log visibility to assist in reviewing
security events.
This crowd-sourced intelligence loop, combined
with multiple channels of threat intelligence,
blends to enhance the overall security protecting
you from the latest threats.
Log & Event
Management
Document, analyze and report all activity via Armor’s proactive log
management controls. Armor captures log events from specific OS locations to
determine validity and severity.
Patch
Monitoring
Consistent patch monitoring is a cornerstone of maintaining a strong security
posture. An outdated OS can lead to compromise. Armor provides you visibility
to your environment running the Armor Agent so you can ensure your OS is
consistently up to date.
Vulnerability Scans
Armor scans for potential points of risk to help reduce the surface area of
attack. Weekly scheduled scans provide you a visible audit report to identify the
vulnerabilities that attackers could use to penetrate your network so you can
develop your remediation plan.
armor.com (US)+1 844 682 2858 (UK)+44 800 500 3167
@armor
Armor Anywhere - Security
ARMOR AGENT OVERVIEW
Armor Management Portal
AMP is your window into all of your instances where the Armor Agent is installed. AMP allows you to monitor and manage
your security posture through a single pane of glass.
Real-Time Updates
Armor Management Portal (AMP) Features
Easily Secure
Additional Instances
Add the Armor CORE Agent to other instances quickly and easily.
Malware Protection
Service Health
View state of malware service engine and review previously
detected malware items.
OS Patching
Updates
View number of OS-level patches and whether a reboot is required.
OS FIM
Service Status View current state of FIM service, and review previous FIM scan results.
Log & Event
Management
View up to 90 days of log events, or, select an option to access
13 months for regulatory requirements.
ARMOR AGENT
ARMOR MANAGEMENT PORTAL
The Armor Agent reports to the Armor
Management Portal for the latest updates.
Simple Account
Support
AMP is your primary method to contact the Armor support team.
Vulnerability
Scanning
View Vulnerability Scanning scan results to identify risks and determine
appropriate next steps to reduce your threat vectors.
armor.com (US)+1 844 682 2858 (UK)+44 800 500 3167
@armor
Armor Anywhere - Security
ARMOR AGENT OVERVIEW
Supported Operating Systems
• RHEL 6 & 7
• CENTOS 6 & 7
• UBUNTU 12.04, 14.04 & 16.04
• Amazon Linux 2015.09, 2015.03, 2016.03, & 2016.09
• Windows 2008, 2008 R2, 2012, 2012 R2, & 2016
Minimum System Requirements
Onboarding & Installation
Remote Access
When you are ready for installation, Armor’s onboarding
team will walk you through an introduction to AMP
and provide step-by-step guidance on installing the
Armor Agent on your server. After installation, Armor’s
onboarding team will review AMP with the instances
populated and connect you with support, should you
need further assistance
To provide the highest level of support in the event of
a security incident, Armor may require remote access
to your environment. The customer retains all rights
and access to their own environments, giving them
the ability to disable services, connectivity or user
accounts for any portion of our stack. However, doing
so prevents Armor from delivering the remediation
portion of our services and from offering timely support to real security matters.
Additionally, installs and updates of any of the software
packages may have an impact on system resources
during the installation process. Please consider any
existing access controls, maintenance plans or critical
applications prior to implementation.
Windows:
• 2GB RAM,
• 2 CPU minimum,
• 3GB of free disk space minimum
Linux:
• 1GB RAM,
• 1 CPU minimum,
• 3GB of free disk space minimum
Network & Firewall Requirements
Specific network connectivity is required on an ongoing
basis to provide Armor services. All connectivity required
for Armor Security is outbound unless stated otherwise.
These requirements will be made available to you within
an onboarding ticket or and are accessible via the Armor
Knowledge Base.
armor.com (US)+1 844 682 2858 (UK)+44 800 500 3167
@armor