How management tools proliferate
In most large organisations the proliferation of management tools is rife (often driven by the illusive promise of a “single pane of glass”). The reality though is that adding another management tool generally results in more things to monitor, not less.
So, when we were designing scarlet, we deliberately set out to not fall into the same trap. Instead, we go out of our way to reuse all the existing collaboration tools that your teams are already using. Which means nothing new for them to learn, effortless implementation, and instant value. What’s not to like about that?
For example, the DevOps team live in their Slack channels, right? So why not push attack surface alerts straight into the same channels? That would make things easy.
And the incident response team already depend on their SIEM to manage security events. Surely it would be good to use the same interface to send them alerts about changes to the attack surface too?
In the next few weeks, we’ll also be launching two new features to make scarlet even more powerful:
The first will be to use the existing organisation wikis for maintaining documentation in realtime. So, in future, when someone needs to know what the cloud attack surface looks like, anyone with access will be able to find the latest information in Atlassian Confluence and Microsoft Sharepoint.
Then secondly, we’ll be introducing the capability to initiate vulnerability scans using the popular platforms. And obviously they’ll only triggered by the specific attack surface changes as they occur. Anything else just wouldn’t be efficient, would it?
As ever, our goal is to make scarlet the first choice for a high-value, low-effort way to immediately improve your cloud security. No more forgotten servers!™
But don’t take our word for it, why not just give it a try? There’s a free, unrestricted trial available, and you only need an email address to register. You could literally be up and running, and seeing the value in ten minutes.