Search for an article

Select a plan

Choose a plan from below, subscribe, and get access to our exclusive articles!

Monthly plan

$
13
$
0
billed monthly

Yearly plan

$
100
$
0
billed yearly

All plans include

  • Donec sagittis elementum
  • Cras tempor massa
  • Mauris eget nulla ut
  • Maecenas nec mollis
  • Donec feugiat rhoncus
  • Sed tristique laoreet
  • Fusce luctus quis urna
  • In eu nulla vehicula
  • Duis eu luctus metus
  • Maecenas consectetur
  • Vivamus mauris purus
  • Aenean neque ipsum
Customize Consent Preferences

We use cookies to help you navigate efficiently and perform certain functions. You will find detailed information about all cookies under each consent category below.

The cookies that are categorized as "Necessary" are stored on your browser as they are essential for enabling the basic functionalities of the site. ... 

Always Active

Necessary cookies are required to enable the basic features of this site, such as providing secure log-in or adjusting your consent preferences. These cookies do not store any personally identifiable data.

No cookies to display.

Functional cookies help perform certain functionalities like sharing the content of the website on social media platforms, collecting feedback, and other third-party features.

No cookies to display.

Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics such as the number of visitors, bounce rate, traffic source, etc.

No cookies to display.

Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.

No cookies to display.

Advertisement cookies are used to provide visitors with customized advertisements based on the pages you visited previously and to analyze the effectiveness of the ad campaigns.

No cookies to display.

HomeCyber BalkansAqua Security Introduces Real-Time CSPM for Addressing Security Threats in Multi-Cloud Environments.

Aqua Security Introduces Real-Time CSPM for Addressing Security Threats in Multi-Cloud Environments.

Published on

spot_img

Cloud security provider Aqua Security has launched Real-Time CSPM, a cloud security posture management solution designed to provide visibility and risk prioritisation across multi-cloud security risk. With organisations facing diverse, persistent cloud security challenges and risks that threaten both data and networks, Real-Time CSPM uses “real-time scanning” to pinpoint threats that evade agentless detection and reduce noise so security practitioners can identify, prioritise and remediate the most important cloud security risks. It is the latest addition to the Aqua Cloud Security Platform.

It provides security teams with the ability to match correlated findings across multi-cloud environments, deduplicate findings, and focus on identifying real cloud risks with smarter insights. A detailed context also allows teams to connect issues found in their cloud to their respective code repositories. Real-time visibility and threat prioritisation within a single platform eliminates the risks associated with “point-in-time” scanning that opens the door for increased attacks.

Furthermore Real-Time CSPM provides an orchestrated, end-to-end solution that will allow security teams to keep pace with modern, cloud-native technologies, as they are deployed and woven into the organisation’s systems. The industry is predicted to move away from point security solutions to cloud-native application protection platforms (CNAPPs) that offer single-source cloud visibility and centralised security control points.

“Customers have told us that they are bogged down by too much noise from current CSPM offerings,” said Amir Jerbi, CTO and co-founder, Aqua Security. “They receive too many findings yet lack complete visibility and therefore the ability to properly prioritise. Simply put, they fix the wrong things and end up compromised.”

Weak credentials, lack of authentication, unpatched vulnerabilities, and malicious open-source software (OSS) packages are all particularly troubling for businesses and Real-Time CSPM has been designed to enable users to match correlated findings across multi-cloud environments and focus on identifying the real cloud risks. These could include risky cloud behaviours that are repeatedly observed in organisations and heighten supply chain risks, including the likelihood of depreciated or abandoned software, malicious content, and slower patching cycles.

According to Unit 42 at Palo Alto, three-quarters of organisations scan less than 85% of their IT assets, with 41% of those scanning once per month or less. This creates the opportunity for many vulnerabilities to go undiscovered until an attacker makes use of them. The average time to remediate alerts is roughly six days, providing a lengthy window of opportunity for adversaries to exploit cloud vulnerabilities. Meanwhile, the increasing use of open source software (OSS) in the cloud also heightens supply chain risks including the likelihood of depreciated or abandoned software, malicious content, and slower patching cycles.

“Cloud-native application attack surfaces will inevitably also attract an expanding pool of attackers,” said Unit 42. “Alongside this, misconfigurations and other operational errors will provide further opportunities for attackers, regardless of their ultimate motive. To date, the security of the software supply chain, including OSS, has not been given equal weight with security measures that apply to other components of the IT environment.”

Real-Time CSPM is the advanced security solution that organisations need as they use multiple clouds and hybrid clouds, and it offers the ability for users to immediately detect and address vulnerabilities. With the software scanning in real-time, the organization remains secure by being able to fix vulnerabilities as soon as they emerge. By eliminating noise, it becomes possible to identify the real cloud risks that come with the modern, hybrid, multi-cloud environments that are increasingly prevalent.

Source link

Latest articles

Corero Network Security enhances AI capabilities in its portfolio

Corero Network Security, a leader in intelligent and adaptive security solutions, has recently announced...

FBI warns Gmail users about Medusa Ransomware

The recent warning issued by the FBI to Gmail users regarding the ongoing hacking...

CISA Reduces Cybersecurity Funds by $10 Million

The recent decision by the Cybersecurity and Infrastructure Security Agency (CISA) to terminate $10...

The Silent Cryptocurrency Hijacker: Cyber Criminals Scamming Digital Wallets

A recent revelation in the realm of cybersecurity has exposed a nefarious new malware...

More like this

Corero Network Security enhances AI capabilities in its portfolio

Corero Network Security, a leader in intelligent and adaptive security solutions, has recently announced...

FBI warns Gmail users about Medusa Ransomware

The recent warning issued by the FBI to Gmail users regarding the ongoing hacking...

CISA Reduces Cybersecurity Funds by $10 Million

The recent decision by the Cybersecurity and Infrastructure Security Agency (CISA) to terminate $10...