skip to main content
Close Icon We use cookies to improve your website experience.  To learn about our use of cookies and how you can manage your cookie settings, please see our Cookie Policy.  By continuing to use the website, you consent to our use of cookies.

Introduction

Ermetic provides security for data stores, databases, and some compute instances in IaaS and PaaS.

Highlights

  • Ermetic uses back-end identity, configuration, and event data from services such as AWS CloudTrail, then reins in extant permissions within an enterprise and monitors for any future slippage.

Features and Benefits

  • Understand why permission sprawl is a problem in cloud computing.
  • Understand how Ermetic performs CPM.

Key questions answered

  • What is cloud permissions management (CPM)?
  • How does Ermetic perform CPM?

Table of contents

Omdia view

  • Catalyst
  • Key messages
  • Omdia view

Recommendations for enterprises

  • Why put Ermetic on your radar?

Highlights

  • Background
  • Current position

Data sheet

  • Key facts

Appendix

  • On the Radar
  • Author