This product documentation database includes feature descriptions, use cases, and FAQs. Each section consists of a description of the group features and the use cases. We created the guides to help you get the most value out of the platform and troubleshoot any issues.
Panoptica deploys to all of the major cloud vendors, including:
Our integration is agentless, secure, and easy to deploy. By following a simple, documented onboarding flow, a secure "read-only" role connects your cloud resources with Panoptica, and the scan begins.
Panoptica's Cloud Inventory provides real-time visibility into cloud assets across cloud providers. You can review assets grouped by different parameters, investigate attack paths and remediate in a few simple steps. Filter assets by service, risk engine, risk severity, cloud provider, account, label, and category, or use our advanced query language to search for custom queries.
For more details, see Cloud Inventory
Our workload scanning and vulnerability detection capabilities allow us to review unique CVEs, grouped by assets or Docker images. We then prioritize them to show the most relevant to you - based on your environment's security and network topology.
We prioritize publicly exposed vulnerabilities, local and network-based attack vector vulnerabilities, and more.
For more details, see Vulnerability Management
Where all of this comes together is with our unique attack path capabilities. Here we can see how security findings, vulnerabilities, and identity risks all work together to create an attack path. Using our graph-based approach, you can also investigate each attack path over a timeline, to understand each action's impact on the risk of the attack path. Finally, we provide ready-made remediation capabilities, to easily handle the vulnerabilities across your cloud stack.
For more details, see Attack Paths.
Panoptica provides detailed information about security findings - such as exposed secrets, identity risks, and configuration issues. We also provide malware detection, and application security via third-party feeds that we can inject and provide prioritization to.
For example, if you want to see all of your exposed secrets inside your environment, you can view contextual information about what each asset means to you, and recommendations for how to remediate them.
For more details, see Security Posture.
Panoptica helps protect the APIs you expose, as well as third-party APIs your applications consume, by providing visibility, assessing security risks, and automating the detection of sensitive data in your APIs.
For more details, see API Security
Panoptica can help identify the underlying Root Cause of an issue, enabling you to remediate the risk in a single action.
Our Compliance Frameworks covers GDRP, SOC2, HIPAA, CIS, PCI, and more.
And finally, Panoptica's CI/CD Security capability can scan Infrastructure as Code (IaC) artifacts to detect security issues, misconfigurations, and exposed credentials in the code before it is ever deployed to your cloud.
These pages describe the functionality of the Cisco Panoptica platform. Information is subject to change at any time, as the application evolves.
Any mention of third-party platforms or applications (such as AWS, GCP, Kubernetes, etc.) is for informational purposes only. Users should review the respective documentation pages of these platforms or applications.
Updated 2 days ago