HomeCyber BalkansAqua Security Introduces Real-Time CSPM for Addressing Security Threats in Multi-Cloud Environments.

Aqua Security Introduces Real-Time CSPM for Addressing Security Threats in Multi-Cloud Environments.

Published on

spot_img

Cloud security provider Aqua Security has launched Real-Time CSPM, a cloud security posture management solution designed to provide visibility and risk prioritisation across multi-cloud security risk. With organisations facing diverse, persistent cloud security challenges and risks that threaten both data and networks, Real-Time CSPM uses “real-time scanning” to pinpoint threats that evade agentless detection and reduce noise so security practitioners can identify, prioritise and remediate the most important cloud security risks. It is the latest addition to the Aqua Cloud Security Platform.

It provides security teams with the ability to match correlated findings across multi-cloud environments, deduplicate findings, and focus on identifying real cloud risks with smarter insights. A detailed context also allows teams to connect issues found in their cloud to their respective code repositories. Real-time visibility and threat prioritisation within a single platform eliminates the risks associated with “point-in-time” scanning that opens the door for increased attacks.

Furthermore Real-Time CSPM provides an orchestrated, end-to-end solution that will allow security teams to keep pace with modern, cloud-native technologies, as they are deployed and woven into the organisation’s systems. The industry is predicted to move away from point security solutions to cloud-native application protection platforms (CNAPPs) that offer single-source cloud visibility and centralised security control points.

“Customers have told us that they are bogged down by too much noise from current CSPM offerings,” said Amir Jerbi, CTO and co-founder, Aqua Security. “They receive too many findings yet lack complete visibility and therefore the ability to properly prioritise. Simply put, they fix the wrong things and end up compromised.”

Weak credentials, lack of authentication, unpatched vulnerabilities, and malicious open-source software (OSS) packages are all particularly troubling for businesses and Real-Time CSPM has been designed to enable users to match correlated findings across multi-cloud environments and focus on identifying the real cloud risks. These could include risky cloud behaviours that are repeatedly observed in organisations and heighten supply chain risks, including the likelihood of depreciated or abandoned software, malicious content, and slower patching cycles.

According to Unit 42 at Palo Alto, three-quarters of organisations scan less than 85% of their IT assets, with 41% of those scanning once per month or less. This creates the opportunity for many vulnerabilities to go undiscovered until an attacker makes use of them. The average time to remediate alerts is roughly six days, providing a lengthy window of opportunity for adversaries to exploit cloud vulnerabilities. Meanwhile, the increasing use of open source software (OSS) in the cloud also heightens supply chain risks including the likelihood of depreciated or abandoned software, malicious content, and slower patching cycles.

“Cloud-native application attack surfaces will inevitably also attract an expanding pool of attackers,” said Unit 42. “Alongside this, misconfigurations and other operational errors will provide further opportunities for attackers, regardless of their ultimate motive. To date, the security of the software supply chain, including OSS, has not been given equal weight with security measures that apply to other components of the IT environment.”

Real-Time CSPM is the advanced security solution that organisations need as they use multiple clouds and hybrid clouds, and it offers the ability for users to immediately detect and address vulnerabilities. With the software scanning in real-time, the organization remains secure by being able to fix vulnerabilities as soon as they emerge. By eliminating noise, it becomes possible to identify the real cloud risks that come with the modern, hybrid, multi-cloud environments that are increasingly prevalent.

Source link

Latest articles

Top headlines of cyber attacks trending on Google

The cyberthreat landscape has been shaken once again as Microsoft Threat Intelligence researchers uncover...

Top Cyber Threats in Healthcare Industry Today

Healthcare organizations are facing an increasing threat from cyber attacks, which can have serious...

Microsoft Warns of Chinese Hackers “Silk Typhoon” Utilizing IT Supply Chain Attacks for Cyberespionage

In a recent development, Microsoft has issued a warning regarding the activities of a...

SuperBlack Ransomware operators take advantage of vulnerabilities in Fortinet Firewall in latest attacks – Source: securityaffairs.com

Operators responsible for the SuperBlack ransomware attacks have been found to exploit two vulnerabilities...

More like this

Top headlines of cyber attacks trending on Google

The cyberthreat landscape has been shaken once again as Microsoft Threat Intelligence researchers uncover...

Top Cyber Threats in Healthcare Industry Today

Healthcare organizations are facing an increasing threat from cyber attacks, which can have serious...

Microsoft Warns of Chinese Hackers “Silk Typhoon” Utilizing IT Supply Chain Attacks for Cyberespionage

In a recent development, Microsoft has issued a warning regarding the activities of a...