Artificial Intelligence | News | Insights | AiThority
[bsfp-cryptocurrency style=”widget-18″ align=”marquee” columns=”6″ coins=”selected” coins-count=”6″ coins-selected=”BTC,ETH,XRP,LTC,EOS,ADA,XLM,NEO,LTC,EOS,XEM,DASH,USDT,BNB,QTUM,XVG,ONT,ZEC,STEEM” currency=”USD” title=”Cryptocurrency Widget” show_title=”0″ icon=”” scheme=”light” bs-show-desktop=”1″ bs-show-tablet=”1″ bs-show-phone=”1″ custom-css-class=”” custom-id=”” css=”.vc_custom_1523079266073{margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}”]

Ermetic Unifies Automated Detection And Remediation Of Risky Cloud Entitlements And Resource Configurations

Identity-first Cloud Infrastructure Security Platform Combines Full Lifecycle Approach for CIEM and CSPM in One Integrated Solution

Ermetic, the cloud infrastructure security company, announced a new version of the Ermetic Platform that combines cloud infrastructure entitlement management (CIEM) and cloud security posture management (CSPM) in one unified, identity-first product. Customers can now use Ermetic to automate and centralize the detection and remediation of security risks associated with over privileged identities as well as misconfigurations that can expose cloud assets to data breaches.

Recommended AI News: CoinFund Debuts New $83 Million Fund To Back Cutting-Edge Entrants Across The Blockchain Industry

A recent IDC survey found that 98% of organizations experienced a cloud data breach in the past 18 months, compared to 79% last year. Attackers typically compromise both cloud misconfigurations (i.e. databases exposed to the internet) and excessive access permissions to carry out ransomware campaigns and exfiltrate data.

Combining CIEM and CSPM provides 365 degree context to automate the detection and remediation of cloud security risks. For example, understanding whether a sensitive data store is vulnerable to attack requires a holistic assessment of its access permissions, resource configuration and network configuration.

“Since the Ermetic Platform has deep visibility into all cloud resources to determine identity and permissions risk, we already provide many native CSPM capabilities,” said Shai Morag, CEO of Ermetic. “Our identity-first approach addresses the most difficult cloud security challenges, so extending our platform with CSPM for compliance, reporting and governance was a natural and easy next step.”

Related Posts
1 of 30,207

End-to-End, Identity-First Cloud Security

The integration of CIEM and CSPM addresses two key elements of cloud security: the detection and visualizing of attack vectors in cloud configuration and access permissions, and full stack visibility into identity entitlements and resource settings to understand and manage cloud risk. The Ermetic Platform combines the following complete set of capabilities in one unified product:

Recommended AI News: Google Cloud Region Goes Live in Delhi NCR in India

CIEM – Full Lifecycle Identity Governance

  • Governance of all human and service identities according to industry best practices and custom policies throughout the identity lifecycle
  • Full-stack analysis and visualization of permissions and effective access
  • Prioritization of risks according to full posture analysis
  • Automatic remediation through a variety of workflows and integrations
  • Overprovisioning alerts to enable Shift Left for DevOps and SRE teams
  • Anomaly detection based on behavioral analysis

CSPM – Cloud Resource Configuration Management

  • Asset inventory management
  • Resource configuration analysis
  • Network visualization and exposure
  • Compliance audit and reporting
  • Activity audit and investigation

Recommended AI News: NICE Ranks Top of Gartner’s Magic Quadrant in 2021 for Workforce Engagement Management

Comments are closed.