CIO Influence
CIO Influence News Cloud Security

Ermetic Platform Provides Anomaly Detection to Protect Cloud Infrastructures from Security Threats

Ermetic Platform Provides Anomaly Detection to Protect Cloud Infrastructures from Security Threats
Continuous Analytics-based Behavior Monitoring of Identities Prevents Entitlements Abuse and Unauthorized Changes to Infrastructure Configurations

Ermetic, the cloud infrastructure security company, announced a new version of the Ermetic platform that continually monitors the access behavior of user and machine identities to detect suspicious activity and prevent security threats. The new capabilities enable organizations to protect against unusual data access, suspicious configuration changes, privilege escalation and more, in multicloud environments.

Recommended ITech News:  Former Apple, Microsoft, Intel, and Square Security Leader Window Snyder Secures $2.5 Million Seed Investment to Launch Security Company Thistle Technologies

.@ErmeticSec provides anomaly detection to protect cloud infrastructures from security threats using analytics-based behavior monitoring of identities to prevent entitlements abuse and unauthorized configuration changes

Using analytics-driven policies, Ermetic continuously analyzes access behavior, creates a baseline for every identity and monitors for anomalous activity in AWS, Microsoft Azure, and Google Cloud Platform.

“Detecting suspicious access, privilege escalation or infrastructure configuration changes across thousands of identities in cloud platforms is manually impossible,” said Sivan Krigsman, Chief Product Officer for Ermetic. “Our unique combination of advanced analytics and granular visibility into access, entitlements and infrastructure configuration changes allows us to identify, alert on and respond to anomalies in expected behavior with very few false positives.”

Recommended ITech News:  Nielsen Doubles Down On Streaming, Adds Viewership By Platform And Advanced Audience Demographics

Since Ermetic provides unparalleled visibility into all identities, multicloud assets and network access, as well as entitlements, privileges and configurations, customers can benefit from anomaly detection policies for multiple categories of suspicious activity that require investigation, including:

  • Unusual data access
  • Unexpected modifications such as disabling audit and logging
  • Network infrastructure changes like changing firewall rules
  • Configuration changes that affect public exposure of assets
  • Escalating privileges for users/roles/groups
  • Unusual reconnaissance activity such as enumeration of storage contents, function code, or secrets values
  • Unauthorized use and theft of access keys

Recommended ITech News:  Microsoft Partners Find Foothold in German Enterprises With Growing Adoption of Azure, Cloud Services

Related posts

New Report Finds IT Leaders Focused on Digital Employee Experience Earn Nearly Double the Industry Average Salary

CIO Influence News Desk

Led by Technology Giants, Increasing Thermal Management Demand for Data Centers, Reports IDTechEx

PR Newswire

MetroNet Announces Expansion of 100% Fiber Optic Network to City of Des Moines

CIO Influence News Desk