01 4503452

Cloud-Native Application Protection Platform Cwpp (de) Mo Per Use Sp100000-249999

Part Number:
MSP-C59DE-MOBF

Introduction

Every enterprise is undergoing a digital transformation. Most enterprises are leveraging the agility and innovation velocity of the public cloud, either solely or in conjunction with their private data centers. These enterprises need a simplified architecture, one that enables them to leapfrog the cost and complexity of the patchwork of point products, and benefit from the fabric of the cloudnative ecosystem-without major investments in tools or developer talent.

Features & Benefits

  • Discover and prioritize based on risk
    • Gain visibility of regulated or sensitive data stored in cloud storage services like Amazon S3, Azure Blob Storage, and GCP Cloud Storage. Perform on-demand scans to identify malicious files or automatically quarantine files that have protected data.
    • Detect security misconfigurations and mitigate drift in IaaS platforms, as well as popular container services like Amazon EKS, ECS, AWS Fargate, Azure Kubernetes Services, and Google Kubernetes Engine.
    • Scale security and empower development, operations, and architect teams. Identify risky applications and provide near-real time feedback on incident resolution and unintentional risk exposure..
  • Build and deploy: Shift left and DevSecOps
    • The ability to protect against configuration drift and provide vulnerability assessment at the time infrastructure is being “built as code.”
    • Integrate security into the CI/CD pipeline to proactively detect and correct insecure configurations, software vulnerabilities, or changes in once-secure configurations.
    • Automate security checks and balances at different stages by shifting left within the code pipeline, making security resolution faster and less time-consuming.
  • Extend MITRE ATT&CK to cloud threats and the SOC
    • Empower the SOC by mapping the cloudnative threats to the MITRE ATT&CK framework for proactive remediation.
    • Visualization of network flow traffic to provide granular visibility, detect suspicious and malicious network traffic, and use threat intelligence to eliminate false positives.
    • Enable real-time and proactive threat protection by identifying compromised accounts, insider threats, privileged user threats, and malware based on automated models, predefined policy or custom rules and thresholds.
  • Continuous compliance, data, and permissions
    • The ability to ensure continuous compliance and business continuity.
    • Skyhigh Security CNAPP provides the umbrella of continuous compliance, allowing companies to track their cloud native applications and platforms against regulatory frameworks, such as PCI-DSS, HIPAA, NIST 800-53, and GDPR standards.
    • Run granular management of permissions across cloud infrastructure. Help identify user permissions, inactive accounts and inappropriate access. Block risky users, revoke access, and enforce additional authentication.
    • Meet audit requirements and automate security controls for data and storage.
No options for this product
.