CIO Influence
CIO Influence News Networking

XDR Provider Cynet Adds SaaS Security Posture Management (SSPM), Centralized Log Management (CLM) to Autonomous Breach Protection Platform

XDR Provider Cynet Adds SaaS Security Posture Management (SSPM), Centralized Log Management (CLM) to Autonomous Breach Protection Platform
Lean security teams can now delegate the elimination of SaaS application risk and the consolidation and analysis of log data to an XDR platform with automated SaaS security posture management (SSPM) and centralized log management (CLM).

Cynet, the provider of the world’s first autonomous breach protection platform, announced the integration of SaaS security posture management (SSPM) and centralized log management (CLM) capabilities to its automated extended detection and response (XDR) platform, Cynet 360.

Average small- and mid-market businesses use between 102 and 137 SaaS applications, each of which introduces increased risk and exposure due to misconfiguration, oversights, drift, inconsistencies and out-of-date settings. Cloud misconfigurations were found in 93% of the deployments studied and blamed for nearly 20% of all data breaches. Each SaaS app requires overly complex manual management to ensure no holes exist in an organization’s security posture.

Log management is just as involved; security teams must manually collect, sift through and analyze evidence from individual security systems to identify stealthy threats or anomalies, in real time. This is an ongoing responsibility and requires a significant amount of time and effort.PREDICTIONS SERIES 2022

Top iTechnology Networking News: New Network Industry Trends Report Sheds Light on Key NetOps Priorities for 2021 and 2022

Today’s lean security teams contend with fewer resources and smaller budgets yet must manage the security posture of over 100 SaaS apps and manually aggregate log data from an increasing number of endpoints, in addition to their day-to-day operations. Thus, SSPM and log management are all too often retroactive and reactive practices because they are so labor- and resource-intensive. However, lean security teams can effectively scale their resources and skills by using automated SSPM and CLM capabilities within the Cynet 360 XDR platform.

“Configuring security settings on all SaaS apps separately, continually monitoring configuration drift, and ensuring all SaaS apps are in line with company security policies is a lot of manual work. Triaging, aggregating and analyzing log data in real time is no minor task, either. By integrating SSPM and CLM into Cynet 360, users can reduce the risk of SaaS misconfigurations leading to a security breach – and ensure that anomalies, trends and even the stealthiest threats revealed by, and hidden within, log data are immediately pinpointed and resolved,” said ​​Eyal Gruner, co-founder and CEO of Cynet.

Cynet 360 SSPM
From the Cynet 360 platform, Cynet SSPM provides visibility into the security settings of all SaaS applications. It enables users to centralize SaaS security management, gain continuous visibility into and identification of SaaS application misconfigurations, prioritize issues by risk severity, fix configuration errors with a single click, track open and closed configuration issues, and report on configuration drifts.

Top iTechnology AIOps News: Beautiful.ai Doubles Down on Growth and Design, Promotes Jason Lapp to CEO

Cynet 360 Centralized Log Management
From the same pane of glass as Cynet 360’s XDR platform, Cynet CLM simplifies and alleviates the task of manual log collection, management and analysis of critical activities performed across the IT environment. CLM ingests data into a data lake in real time to enable security teams to identify threats and anomalies with intuitive analysis and visualization tools, uncover and investigate hidden attack components via simplified forensic analysis, run custom reports to assess and comply with industry standards and retain CLM data to meet compliance requirements.

“Today, on top of the vast cloud-based landscape that needs securing and analysis, there’s a difficult push and pull on the security tech stack and on the lean security teams responsible for protecting their organizations. Research shows 78% of CISOs are juggling 16 or more security tools, and 80% have said they need to consolidate their security vendor portfolio. At the same time, 82% of security professionals say the responsibility to define cloud security policies falls onto the security team (as opposed to the cloud engineering team). So we’re seeing a desire to reduce the footprint of the tech stack but also an uptick in responsibilities for the resource-constrained lean security teams on the frontline. Allowing our clients to avoid purchasing and managing third-party CLM and SSPM tools is a reprieve,” added ​​Gruner.

Top iTechnology AIOps News: Beautiful.ai Doubles Down on Growth and Design, Promotes Jason Lapp to CEO

[To share your insights with us, please write to sghosh@martechseries.com]

Related posts

Code Climate Now Offers the Industry’s Most Actionable and Accurate DORA Metrics

GlobeNewswire

Menlo Security Announces Partner Program Investment and New Initiative to Drive International Growth

Business Wire

Sunlight and Lenovo Sign Reseller Agreement in Order to Integrate Sunlight in Lenovo’s Edge Computing Solutions

Business Wire

Leave a Comment