Comprehensive monitoring of all leading Cloud environments including Azure, Google Cloud, AWS, and Office 365.

Keep Your Cloud Secure

Blueshift XDR monitors leading cloud infrastructures in several ways. For Amazon EC2, Azure Virtual Machines, Google Cloud Platform Virtual Machines and Digital Ocean Droplets, the XDR agent can be installed directly on the virtual instances. 

In addition, through API integration, Blueshift XDR can monitor the platform environment for Amazon AWS, Google Cloud Platform, Microsoft Azure and Azure AD.

Monitored Cloud Alerts

Types of Cloud events that are monitored by the SOC include, but are not limited to:

  • Alerts generated in cloud platforms
  • Authentication Failures
  • Changes in cloud environments
  • Restricted or anomalous GeoIP logins
  • Resource exhaustion
  • AWS Cloudtrail Events
  • GCP PubSub Events
  • Azure/O365 logs and Events


Blueshift simplifies compliance initiatives and extends security visibility and management across an entire organization. It integrates with all existing devices, data and systems across the network. That includes cloud, IoT, endpoint, server, remote workers and more.

Adding Zero-Trust data protection to the Blueshift XDR platform means that files remain encrypted and only accessible by trusted users, wherever they go: endpoints, cloud, NAS, anywhere. Cigent’s integrated controls defend sensitive data from zero-day ransomware, advanced malware, fileless malware, living-off-the-land, zero-day, supply chain, firmware, unpatched software, and social engineering attacks.

Another Blueshift innovation has been to integrate zero-trust data protection with its XDR platform. Zero-trust data protection can force the protection of files during a security incident so that only authorized users with proper multi-factor authentication can access them. This helps reduce the risk that the data is exfiltrated or encrypted during an incident.




Learn how Blueshift’s Comprehensive Cybersecurity Operations protect all devices and data across your entire IT infrastructure, including in-depth information Blueshift’s:

  • Cyber Threat Edge Node
  • Unlimited On-Prem Security Log Retention
  • Threat Intelligence
  • Intrusion Detection & Prevention
  • External Deception
  • Internal Deception
  • Network Security Monitoring