Skip to main content
Skip table of contents

Armor Anywhere

A full suite of critical server security capabilities that is fast to deploy and easy to manage.

Armor Anywhere is exactly what its name implies: a security solution that protects your Windows and Linux servers wherever they happen to be and whatever their type: on-premises, public cloud, private cloud, or hybrid.

Core Functionality:

ARMOR SERVICES

Vulnerability Scanning
With recommendations scans, you can scan your hosts to identify vulnerabilities and the state of controls on the host. It scans the operating system, installed applications, Windows registry, open ports, directory listings, the file system, running processes and services, and users.

View a vulnerability scanning report, or view a parsed version of the weekly vulnerability scanning report.

Log Management
Log and data management allows organizations to enhance threat detection, expand context for effective response, and satisfy compliance requirements for the storage of logs. Armor's security log collector ingests logs from agent and third-party log sources into the cloud security platform.

Learn how to view your log statuses, search for collected logs, and obtain log relay.

Also, find documentation on how to review / upgrade your log retention plan, or how to configure and create a remote log source, based on your specific log type.

IP Threat Lookup
Research the reputation of specific IP addresses, or create a rule to allow or block an IP address.

Malware Protection
Armor's malware protection safeguards your environment from harmful malware and botnets, including viruses, spyware, and rootkits.

Learn how to view malware events, and how malware data affects the security status of your instance.

File Integrity Monitoring (FIM)
File integrity monitoring examines critical system file locations on your hosts as well as critical OS files for changes that may allow threat actors to control your environment.

Learn how FIM data affects the security status of your instance.

Intrusion Detection
IDS/IPS events are analyzed and correlated with event data from your other devices under management by our cloud security platform, delivering enhanced detection of potential threats across your cloud, on-premise, hosted, and hybrid environments.

View data from the host-based intrusion detection system (HIDS).

Dashboards

Use the security dashboards to review and troubleshoot data for your instance.

Security


Infrastructure

Virtual Machines
Create, configure and maintain your instance. Learn how to review the Virtual Machines screen, export usage data, or install the Anywhere Agent for your specific operating system.

CIS Benchmarks

Review the CIS Benchmarks™ that have been adopted by Armor

JavaScript errors detected

Please note, these errors can depend on your browser setup.

If this problem persists, please contact our support.