An all encompassing ITOM platform that changes your Unknowns to Knowns
What do you like best?
BMC Helix Cloud Security is often an eye opener to cloud environments where it's used - in less than 5 minutes it shows you what you thought you had secured, but in fact did not.
A few points of real usefulness:
1) Automated remediation. included within the ready-to-use policy libs. Easily customized. Remediation is disabled by default (good practice) and admins have complete control over who can remediate what's where. Remediation is available by a single button-click, or by self-driving remediation.
2) Integration to ITSM. When a risky configuration or compliance violation is found, integration to the ITSM solution automatically opens a ticket. Similarly, when a remediation request is attempted, you can automatically launch your change management workflow. In this way, audit trails are always available.
3) View and manage security by business services. With integration with and cross-launch to BMC Helix Discovery, developers can use dependency mapping as a vital input in prioritizing their security backlog. Really simplifies security for developers.
4) Multi-cloud. Covers IaaS and PaaS services across AWS, Azure, and GCP, while also providing container configuration security for Docker and k8s.
What do you dislike?
Its a growing capability, therefore always evolving and new capabilities are showing up all the time.
Recommendations to others considering the product:
BMC Helix Cloud Security does not replace a viable cloud strategy or methodology for deploying a cloud-native architecture. But it provides visibility if you are doing it correctly against regulatory standards (CIS for example) or if your team is deviating from standards. It also provides proactive measurement if your titanic is heading towards the wrong direction early enough for corrective actions (manual or automated).
Consider BMC Helix Cloud Security as a means to ensure you can scale across all of your accounts and subscriptions, even if you have one or two accounts. Multi-cloud makes its value proposition even stronger as its tough to measure real-time the security posture.
What problems are you solving with the product? What benefits have you realized?
Resolving perception versus reality of cloud configuration. The typical problem of "too many hands in the cookie jar" yields inconsistency due to human nature. It provides the ability to "Trust but verify" your cloud team, as well as provide immediate remediation ability to reduce complexity of snapping back to compliance.