Ermetic Platform Provides Anomaly Detection to Protect Cloud Infrastructures From Security Threats
- Continuous Analytics-based Behavior Monitoring of Identities Prevents Entitlements Abuse and Unauthorized Changes to Infrastructure Configurations
Ermetic, the cloud infrastructure security company, announced a new version of the Ermetic platform that continually monitors the access behavior of user and machine identities to detect suspicious activity and prevent security threats. The new capabilities enable organizations to protect against unusual data access, suspicious configuration changes, privilege escalation and more, in multicloud environments.
.@ErmeticSec provides anomaly detection to protect cloud infrastructures from security threats using analytics-based behavior monitoring of identities to prevent entitlements abuse and unauthorized configuration changes
Using analytics-driven policies, Ermetic continuously analyzes access behavior, creates a baseline for every identity and monitors for anomalous activity in AWS, Microsoft Azure, and Google Cloud Platform.
Recommended AI News: Nureva HDL200 Audio Conferencing System Certified for Barco ClickShare Conference
“Detecting suspicious access, privilege escalation or infrastructure configuration changes across thousands of identities in cloud platforms is manually impossible,” said Sivan Krigsman, Chief Product Officer for Ermetic. “Our unique combination of advanced analytics and granular visibility into access, entitlements and infrastructure configuration changes allows us to identify, alert on and respond to anomalies in expected behavior with very few false positives.”
Recommended AI News: CherryRoad Announces Partnership With DocuSign
Since Ermetic provides unparalleled visibility into all identities, multicloud assets and network access, as well as entitlements, privileges and configurations, customers can benefit from anomaly detection policies for multiple categories of suspicious activity that require investigation, including:
- Unusual data access
- Unexpected modifications such as disabling audit and logging
- Network infrastructure changes like changing firewall rules
- Configuration changes that affect public exposure of assets
- Escalating privileges for users/roles/groups
- Unusual reconnaissance activity such as enumeration of storage contents, function code, or secrets values
- Unauthorized use and theft of access keys
Recommended AI News: D8 Holdings to Accept Bitcoin, Ethereum, Dogecoin for Delta-8 THC Products
Comments are closed.