  {"id":22472,"date":"2020-05-19T13:54:23","date_gmt":"2020-05-19T17:54:23","guid":{"rendered":"https:\/\/arcticwolf.com\/solutions\/managed-cloud-monitoring\/faq\/"},"modified":"2022-04-13T14:50:48","modified_gmt":"2022-04-13T18:50:48","slug":"faq","status":"publish","type":"page","link":"https:\/\/arcticwolf.com\/uk\/solutions\/cloud-detection-and-response\/faq\/","title":{"rendered":"Solutions \u2013 Managed Cloud Monitoring \u2013 FAQ"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"22472\" class=\"elementor elementor-22472 elementor-18013\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-top-section elementor-element elementor-element-76ba1d7 elementor-section-stretched elementor-section-content-bottom elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"76ba1d7\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-0471873\" data-id=\"0471873\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8345c1e elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"8345c1e\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;,&quot;_animation_delay&quot;:400}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<span class=\"elementor-heading-title elementor-size-default\"><h5>FAQ<\/h5><\/span>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3c5aa8f elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"3c5aa8f\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;,&quot;_animation_delay&quot;:400}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<span class=\"elementor-heading-title elementor-size-default\"><h1 style=\"font-weight: 700;text-transform: uppercase;line-height: 1em\">Cloud Detection and Response<\/h5><\/span>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-ec5717c elementor-hidden-phone\" data-id=\"ec5717c\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;gradient&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-top-section elementor-element elementor-element-1a7c550 elementor-section-content-top elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"1a7c550\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7694ad7 elementor-invisible\" data-id=\"7694ad7\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;animation&quot;:&quot;fadeIn&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8dc9dd2 elementor-widget elementor-widget-html\" data-id=\"8dc9dd2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<style>\n    @media (min-width: 768px) {\n        .premium-button {\n            align-self: flex-start !important;\n        }\n    }\n<\/style>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3f41a8a elementor-widget elementor-widget-text-editor\" data-id=\"3f41a8a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h5 style=\"font-weight: 700; letter-spacing: 2px\">GENERAL<\/h5>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-top-section elementor-element elementor-element-b2d8f44 elementor-section-content-top elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"b2d8f44\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-81ee633 elementor-invisible\" data-id=\"81ee633\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;animation&quot;:&quot;fadeIn&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4f90f43 premium-unfold-btn-inside elementor-widget elementor-widget-premium-unfold-addon\" data-id=\"4f90f43\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;premium_unfold_fold_height_select&quot;:&quot;pixel&quot;,&quot;premium_unfold_fold_height_pix&quot;:0,&quot;premium_unfold_fold_height_pix_tablet&quot;:100,&quot;premium_unfold_fold_height_pix_mobile&quot;:100,&quot;premium_unfold_fold_dur_select&quot;:&quot;fast&quot;,&quot;premium_unfold_fold_easing&quot;:&quot;swing&quot;,&quot;premium_unfold_unfold_dur_select&quot;:&quot;fast&quot;,&quot;premium_unfold_unfold_easing&quot;:&quot;swing&quot;}\" data-widget_type=\"premium-unfold-addon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\r\n\t\t<div class='premium-unfold-container'>\r\n\t\t\t<div class='premium-unfold-folder'>\r\n\t\t\t\t\t\t\t\t\t<h4 class=\"premium-unfold-heading\">\r\n\t\t\t\t\t\tWhat is Cloud Detection and Response?\t\t\t\t\t<\/h4>\r\n\t\t\t\t\r\n\t\t\t\t<div id=\"premium-unfold-content-4f90f43\" class=\"premium-unfold-content toggled\">\r\n\t\t\t\t\t<div class=\"premium-unfold-content-wrap\">\r\n\t\t\t\t\t\t\t\t\t\t\t\t\tThe Arctic Wolf Cloud Detection and Response solution provides 24\u00d77 monitoring of your Infrastructure as a Service (IaaS) and Software as a Service (SaaS) platforms, providing awareness of your risks, misconfigurations, and threats across your cloud environments. Arctic Wolf Cloud Detection and Response is delivered by the Arctic Wolf Concierge Security Team,\u202fbuilt\u202fon the foundation of the industry\u2019s leading cloud native platform.\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t<a class=\"premium-button premium-btn-sm\" href=\"javascript:;\" aria-label=\"\">\r\n\t\t\t\t\t<span class=\"premium-unfold-icon premium-unfold-before\"><\/span>\r\n\t\t\t\t\t<span class=\"premium-unfold-button-text\"><\/span>\r\n\t\t\t\t<\/a>\r\n\t\t\t\t<\/div>\r\n\t\t\r\n\t\t\t\t\t<span class=\"premium-icon-holder-fold\">\r\n\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i>\t\t\t<\/span>\r\n\t\t\t<span class=\"premium-icon-holder-unfolded\">\r\n\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i>\t\t\t<\/span>\r\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-e2daee5 elementor-invisible\" data-id=\"e2daee5\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;animation&quot;:&quot;fadeIn&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-89ba0b4 premium-unfold-btn-inside elementor-widget elementor-widget-premium-unfold-addon\" data-id=\"89ba0b4\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;premium_unfold_fold_height_select&quot;:&quot;pixel&quot;,&quot;premium_unfold_fold_height_pix&quot;:0,&quot;premium_unfold_fold_height_pix_tablet&quot;:100,&quot;premium_unfold_fold_height_pix_mobile&quot;:100,&quot;premium_unfold_fold_dur_select&quot;:&quot;fast&quot;,&quot;premium_unfold_fold_easing&quot;:&quot;swing&quot;,&quot;premium_unfold_unfold_dur_select&quot;:&quot;fast&quot;,&quot;premium_unfold_unfold_easing&quot;:&quot;swing&quot;}\" data-widget_type=\"premium-unfold-addon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\r\n\t\t<div class='premium-unfold-container'>\r\n\t\t\t<div class='premium-unfold-folder'>\r\n\t\t\t\t\t\t\t\t\t<h4 class=\"premium-unfold-heading\">\r\n\t\t\t\t\t\tHow is pricing determined? \t\t\t\t\t<\/h4>\r\n\t\t\t\t\r\n\t\t\t\t<div id=\"premium-unfold-content-89ba0b4\" class=\"premium-unfold-content toggled\">\r\n\t\t\t\t\t<div class=\"premium-unfold-content-wrap\">\r\n\t\t\t\t\t\t\t\t\t\t\t\t\tCloud Detection and Response is priced based on the number of user accounts and cloud servers protected\u2014simplifying budgeting and offering a predictable approach to scoping and purchasing, and scaling security as your\u00a0organisation\u00a0grows.\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t<a class=\"premium-button premium-btn-sm\" href=\"javascript:;\" aria-label=\"\">\r\n\t\t\t\t\t<span class=\"premium-unfold-icon premium-unfold-before\"><\/span>\r\n\t\t\t\t\t<span class=\"premium-unfold-button-text\"><\/span>\r\n\t\t\t\t<\/a>\r\n\t\t\t\t<\/div>\r\n\t\t\r\n\t\t\t\t\t<span class=\"premium-icon-holder-fold\">\r\n\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i>\t\t\t<\/span>\r\n\t\t\t<span class=\"premium-icon-holder-unfolded\">\r\n\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i>\t\t\t<\/span>\r\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-7c3164b elementor-invisible\" data-id=\"7c3164b\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;animation&quot;:&quot;fadeIn&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-99a22c3 premium-unfold-btn-inside elementor-widget elementor-widget-premium-unfold-addon\" data-id=\"99a22c3\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;premium_unfold_fold_height_select&quot;:&quot;pixel&quot;,&quot;premium_unfold_fold_height_pix&quot;:0,&quot;premium_unfold_fold_height_pix_tablet&quot;:100,&quot;premium_unfold_fold_height_pix_mobile&quot;:100,&quot;premium_unfold_fold_dur_select&quot;:&quot;fast&quot;,&quot;premium_unfold_fold_easing&quot;:&quot;swing&quot;,&quot;premium_unfold_unfold_dur_select&quot;:&quot;fast&quot;,&quot;premium_unfold_unfold_easing&quot;:&quot;swing&quot;}\" data-widget_type=\"premium-unfold-addon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\r\n\t\t<div class='premium-unfold-container'>\r\n\t\t\t<div class='premium-unfold-folder'>\r\n\t\t\t\t\t\t\t\t\t<h4 class=\"premium-unfold-heading\">\r\n\t\t\t\t\t\tHow does Cloud Detection and Response integrate with other Arctic Wolf security operations solutions?\t\t\t\t\t<\/h4>\r\n\t\t\t\t\r\n\t\t\t\t<div id=\"premium-unfold-content-99a22c3\" class=\"premium-unfold-content toggled\">\r\n\t\t\t\t\t<div class=\"premium-unfold-content-wrap\">\r\n\t\t\t\t\t\t\t\t\t\t\t\t\tCloud Detection and Response is built atop the same Arctic Wolf ºÚÁÏÉç and delivered by the same Concierge Security Team as all Arctic Wolf security operations solutions, providing seamless security integration. Cloud risks are visible alongside on-premise risks in the Managed Risk portal, and threats and attacks are detected by the same Concierge Security Team. This integration allows for more effective security operations, detecting attackers that move back and forth between cloud and on-premise systems, and prioritising the most serious risks regardless of location.\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t<a class=\"premium-button premium-btn-sm\" href=\"javascript:;\" aria-label=\"\">\r\n\t\t\t\t\t<span class=\"premium-unfold-icon premium-unfold-before\"><\/span>\r\n\t\t\t\t\t<span class=\"premium-unfold-button-text\"><\/span>\r\n\t\t\t\t<\/a>\r\n\t\t\t\t<\/div>\r\n\t\t\r\n\t\t\t\t\t<span class=\"premium-icon-holder-fold\">\r\n\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i>\t\t\t<\/span>\r\n\t\t\t<span class=\"premium-icon-holder-unfolded\">\r\n\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i>\t\t\t<\/span>\r\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-top-section elementor-element elementor-element-5612ad7 elementor-section-content-top elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"5612ad7\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-87738d6 elementor-invisible\" data-id=\"87738d6\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;animation&quot;:&quot;fadeIn&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-21b973e elementor-widget elementor-widget-text-editor\" data-id=\"21b973e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h5 style=\"font-weight: bold; letter-spacing: 2px;\">IDENTIFY<\/h5>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d388ca2 premium-unfold-btn-inside elementor-widget elementor-widget-premium-unfold-addon\" data-id=\"d388ca2\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;premium_unfold_fold_height_select&quot;:&quot;pixel&quot;,&quot;premium_unfold_fold_height_pix&quot;:0,&quot;premium_unfold_fold_height_pix_tablet&quot;:100,&quot;premium_unfold_fold_height_pix_mobile&quot;:100,&quot;premium_unfold_fold_dur_select&quot;:&quot;fast&quot;,&quot;premium_unfold_fold_easing&quot;:&quot;swing&quot;,&quot;premium_unfold_unfold_dur_select&quot;:&quot;fast&quot;,&quot;premium_unfold_unfold_easing&quot;:&quot;swing&quot;}\" data-widget_type=\"premium-unfold-addon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\r\n\t\t<div class='premium-unfold-container'>\r\n\t\t\t<div class='premium-unfold-folder'>\r\n\t\t\t\t\t\t\t\t\t<h4 class=\"premium-unfold-heading\">\r\n\t\t\t\t\t\tCan Cloud Detection and Response identify unsecured cloud resources?\t\t\t\t\t<\/h4>\r\n\t\t\t\t\r\n\t\t\t\t<div id=\"premium-unfold-content-d388ca2\" class=\"premium-unfold-content toggled\">\r\n\t\t\t\t\t<div class=\"premium-unfold-content-wrap\">\r\n\t\t\t\t\t\t\t\t\t\t\t\t\tYes. Cloud Detection and Response can detect unsecured cloud resources, such as S3 buckets\u2014a key vulnerability commonly exploited by malicious actors.  \t\t\t\t\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t<a class=\"premium-button premium-btn-sm\" href=\"javascript:;\" aria-label=\"\">\r\n\t\t\t\t\t<span class=\"premium-unfold-icon premium-unfold-before\"><\/span>\r\n\t\t\t\t\t<span class=\"premium-unfold-button-text\"><\/span>\r\n\t\t\t\t<\/a>\r\n\t\t\t\t<\/div>\r\n\t\t\r\n\t\t\t\t\t<span class=\"premium-icon-holder-fold\">\r\n\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i>\t\t\t<\/span>\r\n\t\t\t<span class=\"premium-icon-holder-unfolded\">\r\n\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i>\t\t\t<\/span>\r\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-366b554 premium-unfold-btn-inside elementor-widget elementor-widget-premium-unfold-addon\" data-id=\"366b554\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;premium_unfold_fold_height_select&quot;:&quot;pixel&quot;,&quot;premium_unfold_fold_height_pix&quot;:0,&quot;premium_unfold_fold_height_pix_tablet&quot;:100,&quot;premium_unfold_fold_height_pix_mobile&quot;:100,&quot;premium_unfold_fold_dur_select&quot;:&quot;fast&quot;,&quot;premium_unfold_fold_easing&quot;:&quot;swing&quot;,&quot;premium_unfold_unfold_dur_select&quot;:&quot;fast&quot;,&quot;premium_unfold_unfold_easing&quot;:&quot;swing&quot;}\" data-widget_type=\"premium-unfold-addon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\r\n\t\t<div class='premium-unfold-container'>\r\n\t\t\t<div class='premium-unfold-folder'>\r\n\t\t\t\t\t\t\t\t\t<h4 class=\"premium-unfold-heading\">\r\n\t\t\t\t\t\tCan Cloud Detection and Response detect unauthorised cloud applications?\t\t\t\t\t<\/h4>\r\n\t\t\t\t\r\n\t\t\t\t<div id=\"premium-unfold-content-366b554\" class=\"premium-unfold-content toggled\">\r\n\t\t\t\t\t<div class=\"premium-unfold-content-wrap\">\r\n\t\t\t\t\t\t\t\t\t\t\t\t\tYes. Through its integration with Arctic Wolf Managed Detection and Response, Cloud Detection and Response can identify unauthorised cloud applications, or \u201cshadow IT\u201d, allowing organisations to mitigate the risk of data breach or loss associated with such services.\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t<a class=\"premium-button premium-btn-sm\" href=\"javascript:;\" aria-label=\"\">\r\n\t\t\t\t\t<span class=\"premium-unfold-icon premium-unfold-before\"><\/span>\r\n\t\t\t\t\t<span class=\"premium-unfold-button-text\"><\/span>\r\n\t\t\t\t<\/a>\r\n\t\t\t\t<\/div>\r\n\t\t\r\n\t\t\t\t\t<span class=\"premium-icon-holder-fold\">\r\n\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i>\t\t\t<\/span>\r\n\t\t\t<span class=\"premium-icon-holder-unfolded\">\r\n\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i>\t\t\t<\/span>\r\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-aedee04 elementor-invisible\" data-id=\"aedee04\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;animation&quot;:&quot;fadeIn&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-35276e1 elementor-widget elementor-widget-text-editor\" data-id=\"35276e1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h5 style=\"font-weight: bold; letter-spacing: 2px;\">MONITOR<\/h5>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d0c59ce premium-unfold-btn-inside elementor-widget elementor-widget-premium-unfold-addon\" data-id=\"d0c59ce\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;premium_unfold_fold_height_select&quot;:&quot;pixel&quot;,&quot;premium_unfold_fold_height_pix&quot;:0,&quot;premium_unfold_fold_height_pix_tablet&quot;:100,&quot;premium_unfold_fold_height_pix_mobile&quot;:100,&quot;premium_unfold_fold_dur_select&quot;:&quot;fast&quot;,&quot;premium_unfold_fold_easing&quot;:&quot;swing&quot;,&quot;premium_unfold_unfold_dur_select&quot;:&quot;fast&quot;,&quot;premium_unfold_unfold_easing&quot;:&quot;swing&quot;}\" data-widget_type=\"premium-unfold-addon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\r\n\t\t<div class='premium-unfold-container'>\r\n\t\t\t<div class='premium-unfold-folder'>\r\n\t\t\t\t\t\t\t\t\t<h4 class=\"premium-unfold-heading\">\r\n\t\t\t\t\t\tCan Arctic Wolf monitor for security issues in my cloud infrastructure? If so, what sources can you ingest?\t\t\t\t\t<\/h4>\r\n\t\t\t\t\r\n\t\t\t\t<div id=\"premium-unfold-content-d0c59ce\" class=\"premium-unfold-content toggled\">\r\n\t\t\t\t\t<div class=\"premium-unfold-content-wrap\">\r\n\t\t\t\t\t\t\t\t\t\t\t\t\tYes. Cloud Detection and Response monitors for security issues in IaaS platforms and performs inventory reporting, environment benchmarking, and remediation recommendations. This monitoring allows Arctic Wolf to discover cloud risks and detect suspicious behaviour. Cloud Detection and Response integrates with major IaaS platforms, including AWS and Azure.\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t<a class=\"premium-button premium-btn-sm\" href=\"javascript:;\" aria-label=\"\">\r\n\t\t\t\t\t<span class=\"premium-unfold-icon premium-unfold-before\"><\/span>\r\n\t\t\t\t\t<span class=\"premium-unfold-button-text\"><\/span>\r\n\t\t\t\t<\/a>\r\n\t\t\t\t<\/div>\r\n\t\t\r\n\t\t\t\t\t<span class=\"premium-icon-holder-fold\">\r\n\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i>\t\t\t<\/span>\r\n\t\t\t<span class=\"premium-icon-holder-unfolded\">\r\n\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i>\t\t\t<\/span>\r\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-845b8b9 premium-unfold-btn-inside elementor-widget elementor-widget-premium-unfold-addon\" data-id=\"845b8b9\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;premium_unfold_fold_height_select&quot;:&quot;pixel&quot;,&quot;premium_unfold_fold_height_pix&quot;:0,&quot;premium_unfold_fold_height_pix_tablet&quot;:100,&quot;premium_unfold_fold_height_pix_mobile&quot;:100,&quot;premium_unfold_fold_dur_select&quot;:&quot;fast&quot;,&quot;premium_unfold_fold_easing&quot;:&quot;swing&quot;,&quot;premium_unfold_unfold_dur_select&quot;:&quot;fast&quot;,&quot;premium_unfold_unfold_easing&quot;:&quot;swing&quot;}\" data-widget_type=\"premium-unfold-addon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\r\n\t\t<div class='premium-unfold-container'>\r\n\t\t\t<div class='premium-unfold-folder'>\r\n\t\t\t\t\t\t\t\t\t<h4 class=\"premium-unfold-heading\">\r\n\t\t\t\t\t\tCan Arctic Wolf monitor for security issues in my SaaS applications? If so, which sources can you ingest?\t\t\t\t\t<\/h4>\r\n\t\t\t\t\r\n\t\t\t\t<div id=\"premium-unfold-content-845b8b9\" class=\"premium-unfold-content toggled\">\r\n\t\t\t\t\t<div class=\"premium-unfold-content-wrap\">\r\n\t\t\t\t\t\t\t\t\t\t\t\t\tYes. Cloud Detection and Response can detect key SaaS indicators of compromise, including suspicious logins or administrative activity, and malicious integrations. These alerts allow Arctic Wolf to detect serious attacks such as business email compromise, data breach, and more. Cloud Detection and Response integrates with major SaaS platforms including Office365, Gsuite, Salesforce, and Box.\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t<a class=\"premium-button premium-btn-sm\" href=\"javascript:;\" aria-label=\"\">\r\n\t\t\t\t\t<span class=\"premium-unfold-icon premium-unfold-before\"><\/span>\r\n\t\t\t\t\t<span class=\"premium-unfold-button-text\"><\/span>\r\n\t\t\t\t<\/a>\r\n\t\t\t\t<\/div>\r\n\t\t\r\n\t\t\t\t\t<span class=\"premium-icon-holder-fold\">\r\n\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i>\t\t\t<\/span>\r\n\t\t\t<span class=\"premium-icon-holder-unfolded\">\r\n\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i>\t\t\t<\/span>\r\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4348a0a premium-unfold-btn-inside elementor-widget elementor-widget-premium-unfold-addon\" data-id=\"4348a0a\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;premium_unfold_fold_height_select&quot;:&quot;pixel&quot;,&quot;premium_unfold_fold_height_pix&quot;:0,&quot;premium_unfold_fold_height_pix_tablet&quot;:100,&quot;premium_unfold_fold_height_pix_mobile&quot;:100,&quot;premium_unfold_fold_dur_select&quot;:&quot;fast&quot;,&quot;premium_unfold_fold_easing&quot;:&quot;swing&quot;,&quot;premium_unfold_unfold_dur_select&quot;:&quot;fast&quot;,&quot;premium_unfold_unfold_easing&quot;:&quot;swing&quot;}\" data-widget_type=\"premium-unfold-addon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\r\n\t\t<div class='premium-unfold-container'>\r\n\t\t\t<div class='premium-unfold-folder'>\r\n\t\t\t\t\t\t\t\t\t<h4 class=\"premium-unfold-heading\">\r\n\t\t\t\t\t\tIs 24x7 monitoring included with Cloud Detection and Response?\t\t\t\t\t<\/h4>\r\n\t\t\t\t\r\n\t\t\t\t<div id=\"premium-unfold-content-4348a0a\" class=\"premium-unfold-content toggled\">\r\n\t\t\t\t\t<div class=\"premium-unfold-content-wrap\">\r\n\t\t\t\t\t\t\t\t\t\t\t\t\tYes. Cloud Detection and Response provides 24\u00d77 security monitoring, with alerts on attacks or risks delivered in minutes.\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t<a class=\"premium-button premium-btn-sm\" href=\"javascript:;\" aria-label=\"\">\r\n\t\t\t\t\t<span class=\"premium-unfold-icon premium-unfold-before\"><\/span>\r\n\t\t\t\t\t<span class=\"premium-unfold-button-text\"><\/span>\r\n\t\t\t\t<\/a>\r\n\t\t\t\t<\/div>\r\n\t\t\r\n\t\t\t\t\t<span class=\"premium-icon-holder-fold\">\r\n\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i>\t\t\t<\/span>\r\n\t\t\t<span class=\"premium-icon-holder-unfolded\">\r\n\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i>\t\t\t<\/span>\r\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-acb30ff elementor-invisible\" data-id=\"acb30ff\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;animation&quot;:&quot;fadeIn&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-705d2ce elementor-widget elementor-widget-text-editor\" data-id=\"705d2ce\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h5 style=\"font-weight: bold; letter-spacing: 2px;\">SIMPLIFY<\/h5>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d37ceed premium-unfold-btn-inside elementor-widget elementor-widget-premium-unfold-addon\" data-id=\"d37ceed\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;premium_unfold_fold_height_select&quot;:&quot;pixel&quot;,&quot;premium_unfold_fold_height_pix&quot;:0,&quot;premium_unfold_fold_height_pix_tablet&quot;:100,&quot;premium_unfold_fold_height_pix_mobile&quot;:100,&quot;premium_unfold_fold_dur_select&quot;:&quot;fast&quot;,&quot;premium_unfold_fold_easing&quot;:&quot;swing&quot;,&quot;premium_unfold_unfold_dur_select&quot;:&quot;fast&quot;,&quot;premium_unfold_unfold_easing&quot;:&quot;swing&quot;}\" data-widget_type=\"premium-unfold-addon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\r\n\t\t<div class='premium-unfold-container'>\r\n\t\t\t<div class='premium-unfold-folder'>\r\n\t\t\t\t\t\t\t\t\t<h4 class=\"premium-unfold-heading\">\r\n\t\t\t\t\t\tIs Cloud Detection and Response a security product or service?\t\t\t\t\t<\/h4>\r\n\t\t\t\t\r\n\t\t\t\t<div id=\"premium-unfold-content-d37ceed\" class=\"premium-unfold-content toggled\">\r\n\t\t\t\t\t<div class=\"premium-unfold-content-wrap\">\r\n\t\t\t\t\t\t\t\t\t\t\t\t\tCloud Detection and Response is a security operations solution. That means that it is a service delivered by our Concierge Security Team. Unlike security products, which often require extensive training and setup and ongoing maintenance and monitoring, Cloud Detection and Response simplifies cloud security by providing actionable outcomes from security operations experts.\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t<a class=\"premium-button premium-btn-sm\" href=\"javascript:;\" aria-label=\"\">\r\n\t\t\t\t\t<span class=\"premium-unfold-icon premium-unfold-before\"><\/span>\r\n\t\t\t\t\t<span class=\"premium-unfold-button-text\"><\/span>\r\n\t\t\t\t<\/a>\r\n\t\t\t\t<\/div>\r\n\t\t\r\n\t\t\t\t\t<span class=\"premium-icon-holder-fold\">\r\n\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i>\t\t\t<\/span>\r\n\t\t\t<span class=\"premium-icon-holder-unfolded\">\r\n\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i>\t\t\t<\/span>\r\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b895ab0 premium-unfold-btn-inside elementor-widget elementor-widget-premium-unfold-addon\" data-id=\"b895ab0\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;premium_unfold_fold_height_select&quot;:&quot;pixel&quot;,&quot;premium_unfold_fold_height_pix&quot;:0,&quot;premium_unfold_fold_height_pix_tablet&quot;:100,&quot;premium_unfold_fold_height_pix_mobile&quot;:100,&quot;premium_unfold_fold_dur_select&quot;:&quot;fast&quot;,&quot;premium_unfold_fold_easing&quot;:&quot;swing&quot;,&quot;premium_unfold_unfold_dur_select&quot;:&quot;fast&quot;,&quot;premium_unfold_unfold_easing&quot;:&quot;swing&quot;}\" data-widget_type=\"premium-unfold-addon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\r\n\t\t<div class='premium-unfold-container'>\r\n\t\t\t<div class='premium-unfold-folder'>\r\n\t\t\t\t\t\t\t\t\t<h4 class=\"premium-unfold-heading\">\r\n\t\t\t\t\t\tWho delivers the Cloud Detection and Response solution?\t\t\t\t\t<\/h4>\r\n\t\t\t\t\r\n\t\t\t\t<div id=\"premium-unfold-content-b895ab0\" class=\"premium-unfold-content toggled\">\r\n\t\t\t\t\t<div class=\"premium-unfold-content-wrap\">\r\n\t\t\t\t\t\t\t\t\t\t\t\t\tCloud Detection and Response is delivered by your Concierge Security Team, two dedicated security operations experts.\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t<a class=\"premium-button premium-btn-sm\" href=\"javascript:;\" aria-label=\"\">\r\n\t\t\t\t\t<span class=\"premium-unfold-icon premium-unfold-before\"><\/span>\r\n\t\t\t\t\t<span class=\"premium-unfold-button-text\"><\/span>\r\n\t\t\t\t<\/a>\r\n\t\t\t\t<\/div>\r\n\t\t\r\n\t\t\t\t\t<span class=\"premium-icon-holder-fold\">\r\n\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i>\t\t\t<\/span>\r\n\t\t\t<span class=\"premium-icon-holder-unfolded\">\r\n\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i>\t\t\t<\/span>\r\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bd59b7b premium-unfold-btn-inside elementor-widget elementor-widget-premium-unfold-addon\" data-id=\"bd59b7b\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;premium_unfold_fold_height_select&quot;:&quot;pixel&quot;,&quot;premium_unfold_fold_height_pix&quot;:0,&quot;premium_unfold_fold_height_pix_tablet&quot;:100,&quot;premium_unfold_fold_height_pix_mobile&quot;:100,&quot;premium_unfold_fold_dur_select&quot;:&quot;fast&quot;,&quot;premium_unfold_fold_easing&quot;:&quot;swing&quot;,&quot;premium_unfold_unfold_dur_select&quot;:&quot;fast&quot;,&quot;premium_unfold_unfold_easing&quot;:&quot;swing&quot;}\" data-widget_type=\"premium-unfold-addon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\r\n\t\t<div class='premium-unfold-container'>\r\n\t\t\t<div class='premium-unfold-folder'>\r\n\t\t\t\t\t\t\t\t\t<h4 class=\"premium-unfold-heading\">\r\n\t\t\t\t\t\tWhat is required to deploy Cloud Detection and Response?\t\t\t\t\t<\/h4>\r\n\t\t\t\t\r\n\t\t\t\t<div id=\"premium-unfold-content-bd59b7b\" class=\"premium-unfold-content toggled\">\r\n\t\t\t\t\t<div class=\"premium-unfold-content-wrap\">\r\n\t\t\t\t\t\t\t\t\t\t\t\t\tCloud Detection and Response is simple and easy to deploy. Once the solution is scoped and purchased, Arctic Wolf will collect the necessary cloud credentials through our secure portal. Then our security operations experts will activate and configure the service and begin monitoring.\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t<a class=\"premium-button premium-btn-sm\" href=\"javascript:;\" aria-label=\"\">\r\n\t\t\t\t\t<span class=\"premium-unfold-icon premium-unfold-before\"><\/span>\r\n\t\t\t\t\t<span class=\"premium-unfold-button-text\"><\/span>\r\n\t\t\t\t<\/a>\r\n\t\t\t\t<\/div>\r\n\t\t\r\n\t\t\t\t\t<span class=\"premium-icon-holder-fold\">\r\n\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i>\t\t\t<\/span>\r\n\t\t\t<span class=\"premium-icon-holder-unfolded\">\r\n\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i>\t\t\t<\/span>\r\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fb8515a premium-unfold-btn-inside elementor-widget elementor-widget-premium-unfold-addon\" data-id=\"fb8515a\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;premium_unfold_fold_height_select&quot;:&quot;pixel&quot;,&quot;premium_unfold_fold_height_pix&quot;:0,&quot;premium_unfold_fold_height_pix_tablet&quot;:100,&quot;premium_unfold_fold_height_pix_mobile&quot;:100,&quot;premium_unfold_fold_dur_select&quot;:&quot;fast&quot;,&quot;premium_unfold_fold_easing&quot;:&quot;swing&quot;,&quot;premium_unfold_unfold_dur_select&quot;:&quot;fast&quot;,&quot;premium_unfold_unfold_easing&quot;:&quot;swing&quot;}\" data-widget_type=\"premium-unfold-addon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\r\n\t\t<div class='premium-unfold-container'>\r\n\t\t\t<div class='premium-unfold-folder'>\r\n\t\t\t\t\t\t\t\t\t<h4 class=\"premium-unfold-heading\">\r\n\t\t\t\t\t\tCan I customise monitoring under Cloud Detection and Response?\t\t\t\t\t<\/h4>\r\n\t\t\t\t\r\n\t\t\t\t<div id=\"premium-unfold-content-fb8515a\" class=\"premium-unfold-content toggled\">\r\n\t\t\t\t\t<div class=\"premium-unfold-content-wrap\">\r\n\t\t\t\t\t\t\t\t\t\t\t\t\tYes. Your Concierge Security Team can customise alerting rules, reporting cadences, and risk priorities, to ensure you are receiving actionable security information and ongoing guidance to improve your cloud security posture.\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t<a class=\"premium-button premium-btn-sm\" href=\"javascript:;\" aria-label=\"\">\r\n\t\t\t\t\t<span class=\"premium-unfold-icon premium-unfold-before\"><\/span>\r\n\t\t\t\t\t<span class=\"premium-unfold-button-text\"><\/span>\r\n\t\t\t\t<\/a>\r\n\t\t\t\t<\/div>\r\n\t\t\r\n\t\t\t\t\t<span class=\"premium-icon-holder-fold\">\r\n\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i>\t\t\t<\/span>\r\n\t\t\t<span class=\"premium-icon-holder-unfolded\">\r\n\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i>\t\t\t<\/span>\r\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e4af4d0 premium-unfold-btn-inside elementor-widget elementor-widget-premium-unfold-addon\" data-id=\"e4af4d0\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;premium_unfold_fold_height_select&quot;:&quot;pixel&quot;,&quot;premium_unfold_fold_height_pix&quot;:0,&quot;premium_unfold_fold_height_pix_tablet&quot;:100,&quot;premium_unfold_fold_height_pix_mobile&quot;:100,&quot;premium_unfold_fold_dur_select&quot;:&quot;fast&quot;,&quot;premium_unfold_fold_easing&quot;:&quot;swing&quot;,&quot;premium_unfold_unfold_dur_select&quot;:&quot;fast&quot;,&quot;premium_unfold_unfold_easing&quot;:&quot;swing&quot;}\" data-widget_type=\"premium-unfold-addon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\r\n\t\t<div class='premium-unfold-container'>\r\n\t\t\t<div class='premium-unfold-folder'>\r\n\t\t\t\t\t\t\t\t\t<h4 class=\"premium-unfold-heading\">\r\n\t\t\t\t\t\tWhat happens if an issue is identified in my cloud infrastructure or applications?\t\t\t\t\t<\/h4>\r\n\t\t\t\t\r\n\t\t\t\t<div id=\"premium-unfold-content-e4af4d0\" class=\"premium-unfold-content toggled\">\r\n\t\t\t\t\t<div class=\"premium-unfold-content-wrap\">\r\n\t\t\t\t\t\t\t\t\t\t\t\t\tIf an issue is identified in your cloud environment, your Concierge Security Team will verify the issue and alert you as per your previously determined escalation policy. This can include ticketing, emails or emergency phone calls. The Concierge Security Team will manage the end-to-end workflow of detection and response, and then provide remediation and validation guidance to ensure the issue is resolved.\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t<a class=\"premium-button premium-btn-sm\" href=\"javascript:;\" aria-label=\"\">\r\n\t\t\t\t\t<span class=\"premium-unfold-icon premium-unfold-before\"><\/span>\r\n\t\t\t\t\t<span class=\"premium-unfold-button-text\"><\/span>\r\n\t\t\t\t<\/a>\r\n\t\t\t\t<\/div>\r\n\t\t\r\n\t\t\t\t\t<span class=\"premium-icon-holder-fold\">\r\n\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i>\t\t\t<\/span>\r\n\t\t\t<span class=\"premium-icon-holder-unfolded\">\r\n\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i>\t\t\t<\/span>\r\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>FAQ Cloud Detection and Response GENERAL What is Cloud Detection and Response? The Arctic Wolf Cloud Detection and Response solution provides 24\u00d77 monitoring of your Infrastructure as a Service (IaaS) and Software as a Service (SaaS) platforms, providing awareness of your risks, misconfigurations, and threats across your cloud environments. Arctic Wolf Cloud Detection and Response <a href=\"https:\/\/arcticwolf.com\/uk\/solutions\/cloud-detection-and-response\/faq\/\" class=\"more-link\">&#8230;<span class=\"screen-reader-text\">  Solutions \u2013 Managed Cloud Monitoring \u2013 FAQ<\/span><\/a><\/p>\n","protected":false},"author":64,"featured_media":21701,"parent":22471,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-22472","page","type-page","status-publish","has-post-thumbnail","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>FAQ - Cloud Detection and Response | Arctic Wolf<\/title>\n<meta name=\"description\" content=\"Arctic Wolf&#039;s Cloud Detection and Response, find information and answers to frequently asked questions.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/arcticwolf.com\/uk\/solutions\/cloud-detection-and-response\/faq\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"FAQ - Cloud Detection and Response | Arctic Wolf\" \/>\n<meta property=\"og:description\" content=\"Arctic Wolf&#039;s Cloud Detection and Response, find information and answers to frequently asked questions.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/arcticwolf.com\/uk\/solutions\/cloud-detection-and-response\/faq\/\" \/>\n<meta property=\"og:site_name\" content=\"Arctic Wolf\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ArcticWolfNetworks\" \/>\n<meta property=\"article:modified_time\" content=\"2022-04-13T18:50:48+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/arcticwolf.com\/wp-content\/uploads\/2024\/12\/aw-og-generic.png\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1440\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@AWNetworks\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/arcticwolf.com\\\/uk\\\/solutions\\\/cloud-detection-and-response\\\/faq\\\/\",\"url\":\"https:\\\/\\\/arcticwolf.com\\\/uk\\\/solutions\\\/cloud-detection-and-response\\\/faq\\\/\",\"name\":\"FAQ - Cloud Detection and Response | Arctic Wolf\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/arcticwolf.com\\\/uk\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/arcticwolf.com\\\/uk\\\/solutions\\\/cloud-detection-and-response\\\/faq\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/arcticwolf.com\\\/uk\\\/solutions\\\/cloud-detection-and-response\\\/faq\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/arcticwolf.com\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/aw-og-generic.png\",\"datePublished\":\"2020-05-19T17:54:23+00:00\",\"dateModified\":\"2022-04-13T18:50:48+00:00\",\"description\":\"Arctic Wolf's Cloud Detection and Response, find information and answers to frequently asked questions.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/arcticwolf.com\\\/uk\\\/solutions\\\/cloud-detection-and-response\\\/faq\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/arcticwolf.com\\\/uk\\\/solutions\\\/cloud-detection-and-response\\\/faq\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/arcticwolf.com\\\/uk\\\/solutions\\\/cloud-detection-and-response\\\/faq\\\/#primaryimage\",\"url\":\"https:\\\/\\\/arcticwolf.com\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/aw-og-generic.png\",\"contentUrl\":\"https:\\\/\\\/arcticwolf.com\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/aw-og-generic.png\",\"width\":2560,\"height\":1440},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/arcticwolf.com\\\/uk\\\/solutions\\\/cloud-detection-and-response\\\/faq\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/arcticwolf.com\\\/uk\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Solutions\",\"item\":\"https:\\\/\\\/arcticwolf.com\\\/uk\\\/solutions\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Solutions \u2013 Managed Cloud Monitoring\",\"item\":\"https:\\\/\\\/arcticwolf.com\\\/uk\\\/solutions\\\/cloud-detection-and-response\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Solutions \u2013 Managed Cloud Monitoring \u2013 FAQ\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/arcticwolf.com\\\/uk\\\/#website\",\"url\":\"https:\\\/\\\/arcticwolf.com\\\/uk\\\/\",\"name\":\"Arctic Wolf\",\"description\":\"The Leaders in Security Operations\",\"publisher\":{\"@id\":\"https:\\\/\\\/arcticwolf.com\\\/uk\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/arcticwolf.com\\\/uk\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/arcticwolf.com\\\/uk\\\/#organization\",\"name\":\"Arctic Wolf Networks\",\"alternateName\":\"Arctic Wolf\",\"url\":\"https:\\\/\\\/arcticwolf.com\\\/uk\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/arcticwolf.com\\\/uk\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/arcticwolf.com\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/AW-Logo-Main-AuroraFY25.png\",\"contentUrl\":\"https:\\\/\\\/arcticwolf.com\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/AW-Logo-Main-AuroraFY25.png\",\"width\":655,\"height\":232,\"caption\":\"Arctic Wolf Networks\"},\"image\":{\"@id\":\"https:\\\/\\\/arcticwolf.com\\\/uk\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/ArcticWolfNetworks\",\"https:\\\/\\\/x.com\\\/AWNetworks\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/arcticwolf\",\"https:\\\/\\\/www.youtube.com\\\/ArcticWolfNetworks\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"FAQ - Cloud Detection and Response | Arctic Wolf","description":"Arctic Wolf's Cloud Detection and Response, find information and answers to frequently asked questions.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/arcticwolf.com\/uk\/solutions\/cloud-detection-and-response\/faq\/","og_locale":"en_GB","og_type":"article","og_title":"FAQ - Cloud Detection and Response | Arctic Wolf","og_description":"Arctic Wolf's Cloud Detection and Response, find information and answers to frequently asked questions.","og_url":"https:\/\/arcticwolf.com\/uk\/solutions\/cloud-detection-and-response\/faq\/","og_site_name":"Arctic Wolf","article_publisher":"https:\/\/www.facebook.com\/ArcticWolfNetworks","article_modified_time":"2022-04-13T18:50:48+00:00","og_image":[{"width":2560,"height":1440,"url":"https:\/\/arcticwolf.com\/wp-content\/uploads\/2024\/12\/aw-og-generic.png","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@AWNetworks","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/arcticwolf.com\/uk\/solutions\/cloud-detection-and-response\/faq\/","url":"https:\/\/arcticwolf.com\/uk\/solutions\/cloud-detection-and-response\/faq\/","name":"FAQ - Cloud Detection and Response | Arctic Wolf","isPartOf":{"@id":"https:\/\/arcticwolf.com\/uk\/#website"},"primaryImageOfPage":{"@id":"https:\/\/arcticwolf.com\/uk\/solutions\/cloud-detection-and-response\/faq\/#primaryimage"},"image":{"@id":"https:\/\/arcticwolf.com\/uk\/solutions\/cloud-detection-and-response\/faq\/#primaryimage"},"thumbnailUrl":"https:\/\/arcticwolf.com\/wp-content\/uploads\/2024\/12\/aw-og-generic.png","datePublished":"2020-05-19T17:54:23+00:00","dateModified":"2022-04-13T18:50:48+00:00","description":"Arctic Wolf's Cloud Detection and Response, find information and answers to frequently asked questions.","breadcrumb":{"@id":"https:\/\/arcticwolf.com\/uk\/solutions\/cloud-detection-and-response\/faq\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/arcticwolf.com\/uk\/solutions\/cloud-detection-and-response\/faq\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/arcticwolf.com\/uk\/solutions\/cloud-detection-and-response\/faq\/#primaryimage","url":"https:\/\/arcticwolf.com\/wp-content\/uploads\/2024\/12\/aw-og-generic.png","contentUrl":"https:\/\/arcticwolf.com\/wp-content\/uploads\/2024\/12\/aw-og-generic.png","width":2560,"height":1440},{"@type":"BreadcrumbList","@id":"https:\/\/arcticwolf.com\/uk\/solutions\/cloud-detection-and-response\/faq\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/arcticwolf.com\/uk\/"},{"@type":"ListItem","position":2,"name":"Solutions","item":"https:\/\/arcticwolf.com\/uk\/solutions\/"},{"@type":"ListItem","position":3,"name":"Solutions \u2013 Managed Cloud Monitoring","item":"https:\/\/arcticwolf.com\/uk\/solutions\/cloud-detection-and-response\/"},{"@type":"ListItem","position":4,"name":"Solutions \u2013 Managed Cloud Monitoring \u2013 FAQ"}]},{"@type":"WebSite","@id":"https:\/\/arcticwolf.com\/uk\/#website","url":"https:\/\/arcticwolf.com\/uk\/","name":"Arctic Wolf","description":"The Leaders in Security Operations","publisher":{"@id":"https:\/\/arcticwolf.com\/uk\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/arcticwolf.com\/uk\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/arcticwolf.com\/uk\/#organization","name":"Arctic Wolf Networks","alternateName":"Arctic Wolf","url":"https:\/\/arcticwolf.com\/uk\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/arcticwolf.com\/uk\/#\/schema\/logo\/image\/","url":"https:\/\/arcticwolf.com\/wp-content\/uploads\/2025\/01\/AW-Logo-Main-AuroraFY25.png","contentUrl":"https:\/\/arcticwolf.com\/wp-content\/uploads\/2025\/01\/AW-Logo-Main-AuroraFY25.png","width":655,"height":232,"caption":"Arctic Wolf Networks"},"image":{"@id":"https:\/\/arcticwolf.com\/uk\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ArcticWolfNetworks","https:\/\/x.com\/AWNetworks","https:\/\/www.linkedin.com\/company\/arcticwolf","https:\/\/www.youtube.com\/ArcticWolfNetworks"]}]}},"_links":{"self":[{"href":"https:\/\/arcticwolf.com\/uk\/wp-json\/wp\/v2\/pages\/22472","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/arcticwolf.com\/uk\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/arcticwolf.com\/uk\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/arcticwolf.com\/uk\/wp-json\/wp\/v2\/users\/64"}],"replies":[{"embeddable":true,"href":"https:\/\/arcticwolf.com\/uk\/wp-json\/wp\/v2\/comments?post=22472"}],"version-history":[{"count":0,"href":"https:\/\/arcticwolf.com\/uk\/wp-json\/wp\/v2\/pages\/22472\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/arcticwolf.com\/uk\/wp-json\/wp\/v2\/pages\/22471"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/arcticwolf.com\/uk\/wp-json\/wp\/v2\/media\/21701"}],"wp:attachment":[{"href":"https:\/\/arcticwolf.com\/uk\/wp-json\/wp\/v2\/media?parent=22472"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}