CIO Influence
CIO Influence News End-point Security

Uptycs Strengthens Cloud Security Offering with Cloud Detection and Response

Uptycs Strengthens Cloud Security Offering with Cloud Detection and Response

Uptycs, provider of the first cloud-native security analytics platform enabling cloud and endpoint security from a common solution, announced new cloud detection and response (CDR) capabilities for detecting and remediating sophisticated attacks against cloud infrastructure. The new CDR feature will help organizations quickly detect malicious behaviors such as discovery, privilege escalation, remote code execution, and data exfiltration in their AWS cloud environment.

Attackers that have cloud credentials typically need to discover what is in the environment and escalate their privileges before they can achieve their goal, whether stealing data, installing coin mining software, or deploying ransomware. As they go about reconnoitering the environment and move laterally their activity is frequently logged, but someone with cloud security expertise needs to examine the sequence of events to discern malicious behavior. The new Uptycs CDR capabilities automate this analysis, alerting cloud security teams to attacks in progress.

ITechnology Cloud News: Tackle.io Furthers Strategic Partnership with Microsoft to Help Independent Software Vendors

“Threat actors today have become cloud experts. Their tactics and techniques are evolving quicker than most want to believe. When (not if) a threat actor steals credentials to your cloud environment, time is of the essence to detect their activity before they achieve their goal,” says Andre Rall, Director of Cloud Security at Uptycs. “The new CDR function in Uptycs evens the playing field for defenders, giving them automated expertise so they can detect and respond to these sophisticated threats.”

“Detection and response capabilities are essential to reducing risk and securing cloud infrastructure,” says Ganesh Pai, Co-Founder and CEO at Uptycs. “Our vision is to enable companies to innovate with cloud-native applications in a secure manner. That means securing the entire cloud-native application lifecycle, from the point where the code is written on developers’ laptops to the application workload run in the cloud. CDR plays a critical role, providing security teams with the ability to quickly detect stealthy attacks against cloud infrastructure as they unfold.”

Latest ITechnology News: Scribe Security Releases Code Integrity Validator Alongside Github Security Open Source Project

Unlike other products announced to the market, Uptycs CDR detections correlate discrete events so that alerts are only fired when there is a high-confidence of malicious behavior. For example, Uptycs correlates together the following sequence of events into a single privilege escalation detection:

  1. Using stolen credentials, the attacker uses the CLI and retrieves details about the user whose credentials they’ve stolen
  2. The attacker lists the policies attached to that user, along with the number of versions of those policies
  3. The attacker gets details about previous policy versions to find one that has elevated privileges
  4. The attacker elevates their privileges by reverting to the previous policy version with elevated privileges

Latest ITechnology News: Rescale Delivers New Capabilities for HPC, Applied AI and ML with NVIDIA

[To share your insights with us, please write to sghosh@martechseries.com]

Related posts

iboss Extends Ability to Identify and Protect Against Data Loss with the Addition of Cloud App Isolation and Exact Data Match

CIO Influence News Desk

Lotame Panorama ID Continues to Win Industry Support

CIO Influence News Desk

Sesame Software Releases Relational Junction 6.2 with Extended Support for New SaaS Applications and Databases

CIO Influence News Desk