Artificial Intelligence | News | Insights | AiThority
[bsfp-cryptocurrency style=”widget-18″ align=”marquee” columns=”6″ coins=”selected” coins-count=”6″ coins-selected=”BTC,ETH,XRP,LTC,EOS,ADA,XLM,NEO,LTC,EOS,XEM,DASH,USDT,BNB,QTUM,XVG,ONT,ZEC,STEEM” currency=”USD” title=”Cryptocurrency Widget” show_title=”0″ icon=”” scheme=”light” bs-show-desktop=”1″ bs-show-tablet=”1″ bs-show-phone=”1″ custom-css-class=”” custom-id=”” css=”.vc_custom_1523079266073{margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}”]

Aqua Security Unveils Industry-First Detection & Response for Zero-Day Attacks in Cloud Native Environments

Aqua Security, the leading pure-play cloud native security provider, unveiled the most powerful cloud native detection and response (CNDR) capabilities in the industry. CNDR uses a growing body of more than 80 behavioral indicators to identify zero-day attacks from low level eBPF events, which are surfaced by the open source project ​​Tracee. The new detection capabilities, combined with Aqua’s unique runtime security controls, make Aqua the only vendor that can both detect and granularly prevent malicious activity from spreading without disrupting the production environment.

Newly Identified Behavioral Indicators

CNDR leverages continually updated, runtime behavioral indicators that are based on thousands of real-world attacks observed in the wild on cloud native environments, including Linux, Containers, Serverless and Kubernetes workloads. For example, a rootkit tactic that involves loading a malicious kernel, execution of fileless malware, reverse shell, etc.

Recommended AI News: Cybersixgill Recognized as the Best Machine Learning Autonomous Solution by the 2021 Tech Ascension Awards

In addition to behavioral indicators, Aqua’s threat intelligence includes IP and DNS reputation intel and a malware database, giving CNDR and Aqua’s customers access to the most complete threat intelligence feed for Cloud Native Application security.

“The cloud native threat landscape is constantly evolving. Adversaries are advancing their techniques to craft more sophisticated and targeted attacks at a rate faster than enterprises can track, which makes the cloud native cyber research performed by Team Nautilus so important,” said Amir Jerbi, co-founder and CTO, Aqua Security. “By incorporating the output of this research and intelligence with industry-leading detection capabilities and surgical runtime policies, Aqua delivers the industry’s most comprehensive protection for cloud native environments.”

Related Posts
1 of 20,904

Recommended AI News: IBM and Deloitte Launch New AI Offering to Unlock Business Insights in Hybrid Cloud Environments

Built on eBPF-based Open Source Technology

Aqua CNDR is built on the open source project Tracee, which uses Linux eBPF technology to surface suspicious application behavior at runtime. Tracee uniquely takes advantage of eBPF features that prevent circumvention by evaders and exploits, ensuring accurate detection of suspicious behavior. Since its creation in 2019, Tracee has evolved from an open source system tracing tool into a robust runtime security solution for DevOps that includes a powerful eBPF engine, easy deployment, and a list of behavioral indicators to also identify malicious patterns and attacks from eBPF events.

A Pioneer in Cloud Native Detection and Response

The addition of CNDR is a significant milestone in the industry and for Aqua Security, which already offers the most unified and integrated Cloud Native Application Protection Platform (CNAPP) on the market. While a small number of solutions leverage eBPF for observability and monitoring, they lack a broad set of continuously updated behavioral intelligence specific to novel attacks in cloud native environments. Aqua goes beyond mere detection to stop the detected attacks using its granular, highly focused runtime controls.

“It is absolutely critical for application development and security teams to keep the business and production environment running while at the same time maintaining an effective security posture. This is impossible if runtime controls are binary — let the container run with security issues or kill the container. That is why we focus on the most granular, least intrusive enforcement capabilities available, so the business can continue running securely,” said Ehud Amiri, VP Product Management at Aqua Security.

Recommended AI News: RedZone Robotics Launches AI/ML Platform, IntegrityPRO, and Announces Partnership with

[To share your insights with us, please write to]

Comments are closed.