BMC Helix Cloud Security Primary Use Case

DG
Portfolio Manager/ Helix Administrator at Frontier Communications

We use the product for IT service requests.

View full review »
VL
Managing Director at VVL Systems

Primarily, it is to understand the cloud baseline against regulatory controls. The primary use case is to identify unknown or unmitigated risks when it comes to security controls in a cloud workload or environment. Within that use case, it takes things, like CIS Compliance Controls, and determines if your workloads are compliant to those best practices. Therefore, the primary use cases are detection and identification. The secondary use case, which goes sort of hand in hand, is to enable operational controls in the form of remediation and actions.

It not only can identify if a cloud resource is noncompliant, but also provide operations an easy and distinct way to take action to remediate, address. amd enclose the security gaps. 

The fringe use case is to integrate it with your IT operations management and IT service management. This is to not only be notified about deviations from acceptable baseline, but also tying into service management for change detection and change tracking.

It is a SaaS subscription model where you can leverage it to analyze and have insight into your cloud services. We use it in a sort of a bimodal way. We use it for both our Microsoft Azure and AWS workloads that we have both internally and customer-facing. We also use it as part of our managed service for our customers and their customer accounts. Thirdly, we use it as part of advising for clients who are interested in their capabilities.

Every account that we have, either Azure or AWS, is owned by us or managed as a managed service and overseen by BMC Helix Cloud Security. We don't deploy cloud accounts without having it managed by Cloud Security.

View full review »
GregoireSoukiassian - PeerSpot reviewer
Consultant at Ministry of Research and Education

Our customers use BMC Helix Cloud Security to keep their cloud systems secure and compliant while improving service management. This solution streamlines processes, automates security checks, and offers insights for multi-cloud setups.

View full review »
Buyer's Guide
BMC Helix Cloud Security
May 2024
Learn what your peers think about BMC Helix Cloud Security. Get advice and tips from experienced pros sharing their opinions. Updated: May 2024.
770,292 professionals have used our research since 2012.
JD
VP Cloud Operations at VVL systems

The biggest use case is for our customers who want to be proactive and not have any kind of vulnerabilities. Instead of being reactive, they want to understand where their vulnerabilities are, whether their cloud space is Azure, AWS, or Google. They want to understand and remediate those vulnerabilities before they get bigger than they really should be. 

For example, we are working with a client that is trying to be proactive. They said they don't want to be on the front page of a newspaper, and they're quite big in AWS. They wanted to check out the tool and they're doing a trial. It's meeting all their needs.

Essentially, all use cases, with regard to security. involve clients wanting to understand and get that 50,000-foot view of what their vulnerabilities are. They also want the ability to remediate inside the tool instead of having to understand what's going on and then have to go to each server and remediate the vulnerabilities.

View full review »
PK
Governance Test and Compliance Officer at Thales

With BMC Helix Cloud Security I'm looking for the application level security and application firewall level security. I'm also looking for its service, security and incident management tools. I'm thinking from the perspective of how many technology features can be fruitfully completed by a single tool.

View full review »
Buyer's Guide
BMC Helix Cloud Security
May 2024
Learn what your peers think about BMC Helix Cloud Security. Get advice and tips from experienced pros sharing their opinions. Updated: May 2024.
770,292 professionals have used our research since 2012.