The Armor Management Portal (AMP) gives you unified visibility and control over workloads and other assets monitored by Armor, no matter where they reside. By integrating critical security capabilities, alerting and management, Armor saves Security Analysts and DevOps practitioners valuable time in investigating and responding to potential incidents.
Visibility into Threats
The Armor Management Portal gives you unified visibility into detections and potential threats across workloads and other assets monitored by Armor, wherever they may be.
The More Event Data We See From Your Environment, the Greater Accuracy of the Outcomes We Deliver to You
Security is a numbers game. The more log and event telemetry from your environment you send to Armor for analysis and correlation, the greater accuracy and efficacy of the outcomes we deliver.
Easily expand protection for additional workloads and other assets for monitoring by Armor.
Add and scale cloud resources such as virtual servers and storage.*
Control access to the environment by managing users, roles and permissions.
Turn up additional services such as additional IP addresses, data replication, backups, encryption and other services.*
Create and interact with support tickets.
Turn Up/Down Resources Based on Your Use Case
Operators can turn up/down security and compliance controls through the Command Line Interface or using Toolbox in the Armor Management Portal.
This can be done for one host or across multiple hosts at the same time.
Toolbox brings the same operational control and flexibility to users through a simple, easy-to-use menu.
Users can manage agent capabilities and turn up/down security and compliance features for an individual virtual machine or fleet of virtual machines.
Did you know?
Armor offers a RESTful HTTP service called the Armor API. This API system allows you to fully access the Armor Management Portal (AMP) via JSON data formats, which allows you to programmatically manage elements of your account.
We Empower DevSecOps
Armor is focused on intersecting the junction of IT, Security, Development and DevOps to deliver powerful and flexible security and compliance outcomes aligned to the unique use cases and consumption needs of our customers.
Ready to Get Started?
Get started with our pricing tool or chat with our experts for answers on-demand.