Analyze the unprotected cloud assets and the traffic flow between them.
This page helps you to assess the network traffic flow between AI applications, AI
models, and the internet. It also enables you to evaluate and correlate identified
network threats with discovered resources, providing a comprehensive view of potential
vulnerabilities and risks.
Where Can I Use This?
What Do I Need?
AI Runtime Security Discovery in Strata Cloud
Manager
Assess application threats to identify vulnerabilities
and risks post AI Runtime Security: Network intercept deployment.
Select the Security view on the Strata Cloud Manager
dashboard.
Click on the Apps icon. This view will:
Group application threats under Applications, Cloud
Providers, and Application Assets.
Classify apps as protected or unprotected apps, including metadata
such as Application Asset IP address, Cloud Networks,
Region, Cloud Provider, and Tags used to
categorize the apps.
Drill down to see the network traffic flows between Apps →
Models, Users → Apps, and Apps → Internet.
Select Application Breakdown to view applications grouped by your
cloud workloads such as VMs and Pods (including containerized environments,
Clusters, VMs, and Serverless architectures).