WALTHAM, Mass., Oct. 24, 2022 /PRNewswire/ — Uptycs,
supplier of the primary unified CNAPP and XDR answer, immediately introduced
enhanced Kubernetes and container safety capabilities. These new
options present menace detection for container runtime correlated with
the Kubernetes management airplane assaults alongside scanning of container
pictures in registries for vulnerabilities, malware, credentials, secret
keys, and different delicate info.
In accordance with the most recent Cloud Native Computing Basis survey, 96%
of organizations are both utilizing or evaluating Kubernetes — the best
proportion because the surveys started in 2016.1 But
many organizations usually are not ready to detect threats in opposition to these new
deployments. “Kubernetes-orchestrated clusters are primarily ‘clouds
inside clouds.’ The monitoring and visibility of the Kubernetes logs,
community flows and utility behaviors inside the cluster must be
baselined and analyzed for indications of compromise,” recommends
Gartner.2
Organizations can detect assaults in opposition to their Kubernetes deployments
by adopting a shift up strategy to cybersecurity, by which telemetry
emanating from Kubernetes clusters and containers, laptops, and cloud
companies is normalized on the level of assortment, however processed,
correlated, and analyzed in a knowledge lake.
In contrast to siloed endpoint and cloud safety options, Uptycs protects
the whole arc of cloud-native utility improvement, from the
developer’s laptop computer to container runtime. “Menace actors know a
developer’s laptop computer is usually only one hop away from cloud
infrastructure,” stated Ganesh Pai, co-founder and CEO of Uptycs. “Uptycs
correlates threat alerts from the fashionable assault floor for
lightning-fast, contextualized detection and response. We do that with
our distinctive, telemetry-powered strategy and Detection Cloud. It is a shift
up strategy to cybersecurity that brings collectively a number of groups and
sorts of IT infrastructure right into a unified information mannequin and UI.”
“Our safety crew is organized round six domains, together with menace
detection and response, threat and compliance, utility safety, information
safety, infrastructure safety, and enterprise safety,” stated Anwar Reddick,
Director of Data Safety at Greenlight Monetary. “Having a
single answer like Uptycs that traverses these domains, and
contextualizes menace exercise throughout a number of asset sorts like
Kubernetes, cloud companies, and laptops improves cross-domain
collaboration and insights. In consequence, we have dramatically shortened
our menace investigation time.”
New Kubernetes and container runtime security measures embody:
- Kubernetes menace detections — Combines anomalous Kubernetes
actions with actions on a granular container lever, Uptycs is ready to
observe in real-time and retailer the conduct for investigation; this
reduces imply time to detection (MTTD), collects forensic proof for
investigation, and determines the complete scope of the incident because it
occurs - Registry scanning — Permits the flexibility to search for
vulnerabilities in container pictures in a registry; Uptycs helps many
registries, together with AWS ECR, Azure Container Registry, DockerHub, and
jFrog Artifactory - Secret scanning — Supplies the flexibility to search for non-public keys, credentials, and different secrets and techniques saved in container pictures
- NSA/CISA hardening checks — Ensures that Kubernetes
deployments are arrange per the up to date hardening steering supplied by
the U.S. Nationwide Safety Company and Cybersecurity and Infrastructure
Safety Company. For instance, guaranteeing that pod safety and community
safety insurance policies are in keeping with steering
Uptycs fills in safety visibility gaps with a single answer to
defend container-based purposes, whether or not they’re run on-premises
or within the cloud, from bare-metal to a serverless deployment. With
Uptycs, clients can determine vulnerabilities early within the course of,
confirm safe configurations, guarantee compliance posture in opposition to
requirements like CIS benchmarks for Linux and Docker, and constantly
monitor the runtime in manufacturing.
Uptycs was acknowledged as a Pattern Vendor for Container and Kubernetes Safety within the Gartner Hype Cycle for Software Safety, 2022 and the Gartner Hype Cycle for Community and Workload Safety, 2022. As well as, Uptycs was acknowledged as a Pattern Vendor within the report from Gartner, Rising Tech: CIEM Is Required for Cloud Safety and IAM Suppliers to Compete.
Uptycs will likely be at KubeCon + CloudNativeCon from Oct. 24 – 28, 2022 in Detroit, Michigan. To study extra, please cease by sales space #G29 or go to: https://www.uptycs.com/lp-kubecon-2022-request-a-meeting
Sources
Gartner doesn’t endorse any vendor, services or products depicted in
its analysis publications, and doesn’t advise expertise customers to
choose solely these distributors with the best scores or different designation.
Gartner analysis publications encompass the opinions of Gartner’s
analysis group and shouldn’t be construed as statements of reality.
Gartner disclaims all warranties, expressed or implied, with respect to
this analysis, together with any warranties of merchantability or health
for a specific goal.
Word: All new options will likely be accessible to Uptycs clients in This fall, 2022.
About Uptycs
Your developer’s laptop computer is only a hop away from cloud infrastructure.
Attackers do not assume in silos, so why would you may have siloed options
defending public cloud, non-public cloud, containers, laptops, and
servers?
Uptycs reduces threat by prioritizing your responses to threats,
vulnerabilities, misconfigurations, delicate information publicity, and
compliance mandates throughout your fashionable assault floor — all from a single
platform, UI, and information mannequin. This contains the flexibility to tie collectively
menace exercise because it traverses on-prem and cloud boundaries, thus
delivering a extra cohesive enterprise-wide safety posture.
In search of acronym protection? We have now that, too, together with CNAPP,
CWPP, CSPM, KSPM, CIEM, CDR, and XDR. Begin together with your Detection Cloud,
Google-like search, and the assault floor protection you want immediately. Be
prepared for what’s subsequent.
Shift your cybersecurity up with Uptycs. Learn the way at: https://uptycs.com
1 Cloud Native Computing Basis, CNCF Annual Survey, February 2022 https://www.cncf.io/studies/cncf-annual-survey-2021/
2 Gartner, “Find out how to Make Cloud Extra Safe Than Your Personal Information Middle,” Neil MacDonald, Tom Croll, April 2021 https://www.gartner.com/doc/3970177
SOURCE: Uptycs