Knowledge Director at Alert Logic
Thank you for submitting your idea Dean! I've passed this feature request on to our Product Management team.
Alert Logic is always evaluating the requirements of our customers to find security standards to support. With the shifting landscape of compliance and security standards, we review our list of sup...
Alert Logic® encourages Community members to share their cloud security and compliance knowledge for the benefit of all. When engaging with us and each other, it is important to be respectful. Dos ...
Other than the base rule set, which is quite vast and covers the OWASP Top 10 plus many known vulnerabilities, you can add regex-based, URL-based, and/or path-based detection rules. It all depends ...
Out of Band Web Security Manager (WSM) does not do any blocking. It does take advantage of the learning engine, which helps in learning the difference between good and bad traffic within your envir...
Threat Manager requires the Alert Logic Appliance (physical or virtual) in every deployment in which we engage. The Alert Logic Agent is required in public and private cloud environments on any hos...
Yes, the traffic between the agent and appliance is encrypted, but not by default. Refer to our Is traffic between the agent and appliance encrypted? knowledge base article for further and up-to-da...
Cloud Insight delivers internal vulnerability scanning functionality, and as such, covers PCI DSS requirement 11.2.1.External scanning is provided by the full Cloud Defender suite. Source: https://...
On a Linux host, the out of memory (OOM) will kill a process or sacrifice a child process. It will run down that path until it has killed everything, ultimately killing the agent.On the Windows hos...
Alert Logic will consider undertaking the additional risk of a HIPAA Business Associate Agreement at the time an original agreement is put in place with the customer. If you are an existing custome...