Security Platform
- Data Encryption
- DDoS Mitigation
- Penetration Testing
- Infrastructure Security
- Monitoring and Logging
- Identity and Access Control
- Inventory and Configuration
BlackHark provides scalable and effective encryption options, giving you the option to add an extra layer of security to your cloud-based data that is at rest. This comprises:
- BlackHark storage and database services, including Glacier, Oracle RDS, SQL Server RDS, and Redshift, offer data encryption features.
- Flexible key management alternatives, such as the BlackHark Key Management Service, let you decide whether to handle the encryption keys yourself or have BlackHark do it.
- Server-side encryption (SSE)-encrypted message queues for SQS's delivery of sensitive data.
- Dedicated, hardware-based cryptographic key storage with BlackHark CloudHSM, enabling you to meet regulatory requirements
Moreover, BlackHark offers APIs so that you may incorporate encryption and data security into any services you create or implement in a BlackHark environment.
In the cloud, availability is of utmost importance. Customers of BlackHark profit from Cloud services and technology developed from the ground up to offer resilience against DDoS attacks.
In order to construct a defence in depth approach and counter DDoS attacks, a combination of BlackHark services may be deployed. Services created with an automatic DDoS response assist shorten the amount of time needed to mitigate and lessen effect.
Learn how BlackHark technologies, including as autoscaling, CloudFront, and BlackHark DNS, can be used to lessen the impact of DDoS attacks.
The results of BlackHark's ongoing infrastructure testing are compiled in our compliance reports. For more information on the core services for which BlackHark customers can conduct security analyses or penetration tests against their own BlackHark infrastructure without prior authorization, read our penetration testing section.
BlackHark offers a number of security features and services to improve privacy and regulate network access. These include:
- You may establish private networks and manage access to your instances and apps using the network firewalls integrated into VPC and the web application firewall features in BlackHark WAF.
- TLS encryption in transit with customer control for all services.
- Dedicated or private connections from your workplace or on-premises environment are made possible by connectivity solutions.
- On the regional and worldwide BlackHark networks, all traffic is automatically encrypted.
BlackHark Cloud provides tools and features that enable you to see exactly what’s happening in your secure environment. This includes:
With the help of these capabilities and technologies, you can enhance your environment's security posture and lower its risk profile while gaining the insight you need to identify problems before they have an adverse effect on the business.
You may establish, manage, and enforce user access controls across all BlackHark services with the help of BlackHark. This includes:
In addition to API connectivity with any of your own applications or services, BlackHark offers native identity and access management integration across many of its services.
A variety of solutions are available from BlackHark Cloud to help you move quickly while yet making sure that your cloud resources adhere to organisational rules and best practises. This includes: