Artificial Intelligence | News | Insights | AiThority
[bsfp-cryptocurrency style=”widget-18″ align=”marquee” columns=”6″ coins=”selected” coins-count=”6″ coins-selected=”BTC,ETH,XRP,LTC,EOS,ADA,XLM,NEO,LTC,EOS,XEM,DASH,USDT,BNB,QTUM,XVG,ONT,ZEC,STEEM” currency=”USD” title=”Cryptocurrency Widget” show_title=”0″ icon=”” scheme=”light” bs-show-desktop=”1″ bs-show-tablet=”1″ bs-show-phone=”1″ custom-css-class=”” custom-id=”” css=”.vc_custom_1523079266073{margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}”]

Rapid7 Announces Cloud Identity and Access Management Governance Module for DivvyCloud

Security professionals can now simplify cloud identity and access management at scale to help prevent security incidents and data breaches

Rapid7, Inc., a leading provider of security analytics and automation, announced the availability of its Cloud Identity and Access Management (IAM) Governance module for DivvyCloud to help customers identify and reduce cloud identity risk. With this new module, customers gain deeper visibility into their cloud resources to assess, prioritize, and remediate improper permission combinations that could grant unintended or overly permissive access.

Recommended AI News: HyperChain CEO Stelian Balta About Company’s Plan To Extend Investments In DeFi Projects

The dynamic and ephemeral nature of cloud environments makes traditional security perimeter approaches insufficient for managing risk. To reduce risk, companies must view identity as the new perimeter. Unfortunately, the complexity of cloud environments and cloud service provider IAM tools often lead developers and engineers to grant unintended or overly permissive access. For security teams, this same complexity makes it difficult, if not impossible, to determine who—or what—has access to a cloud resource. The result is unmanaged cloud risk that overwhelms security teams.

“Despite the fact that cloud-based services and tools have been a staple in most companies’ operations for many years, IAM remains a persistent problem because traditional IAM solutions don’t solve today’s challenges,” said Brian Johnson, senior vice president of cloud security at Rapid7. “Rapid7’s new Cloud IAM Governance module for DivvyCloud allows our customers to gain full control and visibility over their entire cloud environment, no matter how many different cloud providers, users, or resources they have in play. Once they have this insight, companies can start to implement least privilege access to reduce the risk of data breaches and enhance security.”

Related Posts
1 of 40,761

This solution is now generally available to DivvyCloud customers as an additional module. Specifically, the Cloud IAM Governance module allows customers to:

  • Gain visibility of the full cloud IAM picture to assess, prioritize, and remediate improper permission combinations that grant unintended or overly permissive access
  • Explore effective access by principal user, resource, or application
  • Understand true access to complex IAM combinations
  • Establish and maintain least privilege
  • Limit and understand the cloud security blast radius

Recommended AI News: VirBELA Announces Collaboration With HTC VIVE To Introduce VIVE Campus, Redefining The “Next Normal”

“This solution is designed to solve a critical pain point for enterprises today,” said Chris DeRamus, vice president of cloud security technology at Rapid7. “Our IAM Governance Module analyzes and maps customers’ cloud environments and bridges the gaps between cloud provider IAM policies and enterprise directories (e.g. Active Directory, LDAP, Okta, Ping, etc.). Enterprises can now identify exactly what resource, application, user, and role is accessing a specific cloud asset and the potential impact of that access.”

“The surge in remote work caused by the pandemic has been accompanied by an increased reliance on cloud applications and services,” said Doug Cahill, vice president and group director of cybersecurity, ESG Global. “This means companies have had to act quickly to ensure proper support and secure access to cloud resources, and, according to a recent study conducted by ESG, developing and adjusting security policies is the top security challenge associated with remote work. Companies need a solution that supports this increase in direct-to-cloud access by offering identity and access management options that recognize there’s a new perimeter and ensures security.”

Recommended AI News: The Next Release Of SAS Viya Introduces A New Category Of Analytics For The Cloud

1 Comment
  1. Copper fitting recycling Copper billet recycling Eco-conscious metal recycling
    Copper cable scrap recycling services, Scrap metal grading standards, Copper oxide scrap recycling

Leave A Reply

Your email address will not be published.