blog post cover

Resmo is Now Available in Public Beta!

We’re thrilled to announce that Resmo is now available for everyone to use in beta! 🎉

No credit card required and 14-day free trial in professional plan.
Signup on resmo.com/signup.

Our team has been hard at work and gave 110% at perfecting Resmo to ensure that you achieve modern cloud asset security and compliance. Let’s take a closer look!

What Resmo Offers to Public Beta Users

Since day one, we’ve been striving toward helping our customers tackle the asset visibility, security, and compliance obstacles in their cloud and SaaS stacks. In other words, Resmo works with your existing tools and cloud service providers to improve your cyber asset attack visibility and secure your attack surface. Here’s a quick summary.

Create complete Cloud and SaaS asset inventory

Security is about getting visibility. Resmo brings your dispersed cyber assets (resources) into the light by consolidating them in one place. 

We support native, agentless, and read-only cloud integrations with AWS, GCP, Azure, Kubernetes, and (soon) Snowflake. Our SaaS integrations include all major providers like Atlassian stack, Google Workspace, Okta, DataDog, PagerDuty, and many others (see the full list). Once an integration is added, it only takes a couple of seconds to create your entire asset directory.

Streamline security and compliance checks

We offer out-of-the-box checks against security vulnerabilities and best practices. Once the integration is created, rules start running continuously, giving you the insights you need without additional effort. Each rule has an activity log with details like non-compliant resources and the latest changes.

For instance, you can make sure you rotate IAM credentials at the right time, secure S3 buckets the right way, and make sure your alerting tool has the right configuration to alert your on-call engineers. More than 500 ready-to-use checks are offered by default. You can also create your own, again with just SQL.

Our team has a lot of experience fighting alert fatigue. So, we made it easy for you to add suppressions, define notification rules, and get alerted via your favorite channels like Slack, email, webhook, or PagerDuty.

We want to simplify security operations for modern teams. This includes standard compliance checks like CIS, AWS Well-Architected, or SOC2. Our initial packs focus on offering out-of-the-box compliance scores and reports for what matters the most for modern sec teams. 

Never miss a critical change

Tracking the change history of your resources and rules can become the make-or-break point for your security operations and incident response processes. Traditional vendors scan your environments every day or week, not alerting security engineers about critical changes until too late. 

Our time to detect a change is 10 min at most. We focused exclusively on the speed of change collection while building Resmo. Your audit history should be as accurate as it can and notify you at the right time.

Our users can:

  • Detect when a resource was created, modified, or deleted!
  • Identify the actor behind a change
  • View security rule change history
  • Access change history data for up to 12 months for further investigation!

Dig deeper using SQL

Resmo SQL query for cloud security

Cyber asset attack surface management is about the ability to questions. Resmo users can query their entire asset inventory and changes using SQL, the most well-known programming language of all time. Our engine offers flexibility for querying nested data to make debugging easier and supports SQL keywords like group by and joins. We also offer:

  • Top-notch autocomplete
  • An extensive set of ready-to-use queries
  • Custom queries, for you and your team
  • Querying resource changes directly by adding “_changes”
    ‍

Just a few questions our customers can answer using SQL:

  • List unencrypted volumes attached to each instance
  • List GitHub repositories with visibility change to public from private
  • Find recently deleted S3 buckets
  • Find Security Groups with Incoming 0.0.0.0/0
  • Get number of Kubernetes services per namespace
  • Check if IAM User Password Policy Prevents Password Reuse

Gain in-context visibility

CAASM dashboard screen

Cyber asset complexity is growing exponentially by the day. By surfacing assets visually, you can easily understand and map their connections on a deeper level. This helps pinpoint security and compliance issues in your cloud environment.

You can visualize complex assets and rules with easy-to-customize dashboards. Empower teams to own their resources and create reports for executives and managers for tracking progress.

How Do I Get Started?

You can easily get started and start your 14-day free trial with a professional plan. No credit card or commitment is required. We offer predictable and open pricing to provide you with greater value. 

Start your free trial here!

That being said, we’d love to see you use Resmo and drop us your feedback! If you have any questions, we are happy to answer. Just contact us via live chat on our website or email us at contact@resmo.com, and we’ll get back to you in no time.

Is Resmo the one for your cloud and SaaS assets? Discover use cases and role-based solutions. For more detailed information and a product tour, drop us a demo request, and we’ll reach out.

Continue Reading

Sign up for our Newsletter