CIO Influence
CIO Influence News Cloud Security

Sysdig Adds Real-Time Cloud Attack Graph to Its Industry-Leading CNAPP

Sysdig Adds Real-Time Cloud Attack Graph to Its Industry-Leading CNAPP

Multidomain correlation identifies imminent risk and surfaces live attack paths in seconds

Sysdig, the leader in cloud security powered by runtime insights announced Cloud Attack Graph, which provides the industry’s first real-time attack path analysis and live risk prioritization. Using its real-time insights from production, these new features identify unseen but imminent threats and attacks in motion. In addition, the company released a new cloud inventory that provides comprehensive cloud visibility with integrated search to surface information such as in-use instances of a critical vulnerability or roles with unused credentials. Sysdig also released agentless scanning, providing a complete agent and agentless solution across the software life cycle.

Read More About Cioinfluence Interview: CIO Influence Interview with Sumeet Arora, Chief Development Officer at ThoughtSpot

Today @Sysdig unveils a suite of real-time cloud security offerings, including risk prioritization, attack path analysis, inventory, and agentless scanning.

In the cloud, every second counts. Environments have grown more complex, and attacks happen at warp speed. Whereas on-premises attacks are measured in weeks, cloud attacks can happen in mere minutes. Attackers exploit the complexity and automation of the cloud to move laterally, elevate privileges, and maximize blast radiuses. Knowing what’s happening in the moment, customers can make better-informed decisions from prevention to defense.

“I have a mandate for my security team. I want them to be a team in the know, not the team of no. Security shouldn’t slow the speed of development,” said David Quisenberry, Senior Manager of Information Security at apree health. “Prevention is necessary, but it won’t catch everything given the speed of the cloud. We also need to be ready to defend in real time. Cloud security requires tools that connect dots and provide context, but the key is that it must be in real time.”

New Capabilities Focused on What Matters Now

Sysdig’s industry-leading cloud-native application protection platform (CNAPP) is powered by runtime insights, which enable Sysdig’s real-time detection and multidomain correlation to prioritize risky combinations across environments.

Cloud Attack Graph functions as the neural center of the Sysdig CNAPP, applying multidomain correlation across assets, users, activity, and risk to identify threats in real time. By layering on instant detections, in-use vulnerabilities, and in-use permissions, Sysdig connects the dots across environments so customers can diffuse threats before they escalate.

Latest Cioinfluence Interview: CIO Influence Interview with Aliza Freud, Founder and CEO at SheSpeaks

Risk Prioritization is a stack-ranked list of risks to help prioritize the order in which they should be addressed across an entire cloud-native environment. The list is uniquely generated from runtime insights, layered with real-time detection of events, vulnerabilities tied to in-use packages, and in-use permissions to draw attention to the most imminent attacks happening at any given moment.

Attack Path Analysis is a visual representation of the exploitable dependencies across resources, which can help reveal potential attack paths. Unlike other solutions, Sysdig layers on real-time detections to reveal active attack behavior such as lateral movement, helping stop attackers in their tracks.

Inventory, powered by runtime insights, is a complete, searchable list of all of the resources in a cloud environment across users, workloads, hosts, and infrastructure as code. Dynamic filtering provides immediate access to the most relevant information across cloud environments for use in various ways. By identifying vulnerabilities in active packages, security teams can prioritize the fixes that matter. Inventory can also be used to quickly check exposure to vulnerabilities, such as identifying all instances of Log4j in packages in use and exposed to the internet. Customers can then dig deeper into potentially compromised workloads with a real-time view of associated misconfigurations, compliance violations, and vulnerabilities.

Complete Agentless Scanning rounds out Sysdig’s agent and agentless solution. Sysdig has expanded agentless capabilities to include host scanning, extending its existing agentless scanning for misconfigurations and threat detection. Sysdig’s agentless approach gives users a full picture of their cloud security, highlighting vulnerabilities, misconfigurations, in-use permissions, and threats. Meanwhile, the scalable and performant agent delivers real-time analysis of file access, network connections, and active processes in addition to other workload attributes. It then filters out unused package vulnerabilities for prioritized protection.

“Security teams need a tool that sees everything, correlates it, and distills it into actionable insights within seconds. What sets Cloud Attack Graph apart is that it was designed specifically for the cloud, enabling users to visualize risk; prioritize the threats that matter; and in the event of a live attack, alert in real time and make it a priority for the security team to focus on,” said Knox Anderson, Vice President of Product at Sysdig. “Context and speed are everything in the cloud, making runtime insights a critical capability for cloud security.”

Browse The Complete Interview About Cioinfluence : CIO Influence Interview with Petri Kuivala, CISO Advisor at Hoxhunt

[To share your insights with us, please write to sghosh@martechseries.com] 

Related posts

Mitel Appoints Eric Hanson as Chief Marketing Officer

CIO Influence News Desk

Quantum Workplace Introduces Integration With Microsoft Teams

5G Technology A Key CatalystFor Industry 4.0, Finds Frost & Sullivan

CIO Influence News Desk