NETWORK TOPOLOGY FOR HIPAA COMPLIANCE - Armor€¦ · NETWORK TOPOLOGY FOR HIPAA COMPLIANCE Armor...
Transcript of NETWORK TOPOLOGY FOR HIPAA COMPLIANCE - Armor€¦ · NETWORK TOPOLOGY FOR HIPAA COMPLIANCE Armor...
NETWORK TOPOLOGY FOR HIPAA COMPLIANCEArmor Complete is our secure hosting solution that combines our proven secure managed virtual private cloud (VPC) with the necessary virtual machine, physical server, and network security services to protect sensitive workloads. High performance cloud infrastructure with built-in security controls provides the utmost protection for your sensitive, regulated data to help you achieve security beyond compliance.
LOAD BALANCERS
APPLICATION SERVERS
WEB SERVERS
DATABASE SERVERS
HIGH PERFORMANCESTORAGE PLATFORM
SSD FLASHACCELERATED
MAGNETIC
SPARTAN THREAT PREVENTION AND RESPONSE PLATFORM
Isolated Customer Environment
Private IP Space
Log Management
Patch Management
File Integrity Monitoring
Data Encryption (optional service)
Vulnerability Scanning (optional service)
Malware Protection
Fibre Channel Connectivity
Separate Storage Area Network (SAN)
Secure Data Deletion
Complete Data Obfuscation
ARMOR SECURE REMOTE ACCESS
Secure Jump Hosts
Privileged Access Management
Full Session Recording
Blade Server Architecture, Clustered for High Availability
Stateful Firewall Policies
Firewall Policy via microsegmentation
SERVER/NETWORK/STORAGE VIRTUALIZATION
IP ReputationFiltering
Dos/DDoSMitigation
Web ApplicationFirewalls
IntrusionDetection
NAT
VPN (SSL and L2L/Site2Site)
Routing
INTERNET
INTERNETGATEWAY
ARMOR.COM | 19013001 Copyright © 2019. Armor, Inc., All rights reserved.
COMMUNITY-POWERED INSIGHTS
Leverage the collective knowledge of more than 1,200 client environments
CONTINUOUS THREAT HUNTING
Uncover targeted threat indicators and potential threat actors operating within your environment
BREACH RECOVERY
Ensure data protection and availability of workloads
ADVANCED ANALYTICS
Discover anomalies and patterns across your security ecosystem
ORCHESTRATION
Playbooks accelerate response and automate repetitive tasks and workflows
THREAT INTELLIGENCE
Apply intelligence and context to better understand the threat
FORENSIC RESEARCH AND INVESTIGATION
Consolidated and intuitive search, analysis, and investigation of events
FEATURES
ARMOR.COM | 19013001 Copyright © 2019. Armor, Inc., All rights reserved.