Discover and secure your serverless workloads in Azure and AWS by defining
application boundaries during cloud account onboarding.
Protect your serverless resources in Azure or AWS environments by defining
security boundaries for them during
cloud account onboarding. Once defined,
these newly discovered serverless functions become visible on your application
dashboard, integrating with your existing virtual machine and container workloads
for a unified view of your entire cloud environment. This consolidation of
visibility allows you to monitor and manage security for all your compute types from
a single location.
The platform uses the same streamlined workflow you already use for other
cloud assets. By extending this workflow to serverless functions, you can
consistently deploy firewall protection, ensuring comprehensive security coverage as
your cloud-native architectures evolve. This approach provides a repeatable,
automated way to secure your dynamic cloud applications, helping to maintain a
strong security posture without the need for manual, per-resource configurations.
The integration of serverless resources into the centralized dashboard simplifies
management and helps you quickly identify and protect newly deployed functions.