Artificial Intelligence | News | Insights | AiThority
[bsfp-cryptocurrency style=”widget-18″ align=”marquee” columns=”6″ coins=”selected” coins-count=”6″ coins-selected=”BTC,ETH,XRP,LTC,EOS,ADA,XLM,NEO,LTC,EOS,XEM,DASH,USDT,BNB,QTUM,XVG,ONT,ZEC,STEEM” currency=”USD” title=”Cryptocurrency Widget” show_title=”0″ icon=”” scheme=”light” bs-show-desktop=”1″ bs-show-tablet=”1″ bs-show-phone=”1″ custom-css-class=”” custom-id=”” css=”.vc_custom_1523079266073{margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}”]

Orca Security Adds Agentless Cloud Detection and Response to Stop Attackers from Exposing Sensitive Data

The Orca Platform leverages anomaly detection via machine learning, combined with continuous monitoring of cloud feeds, workloads, data, identities and configurations, to enable security teams and SOC analysts to quickly detect and respond to attacks

Orca Security, the cloud security innovation leader,  added Cloud Detection & Response (CDR) capabilities to its agentless Cloud Security Platform to help organizations detect, investigate, and respond to in-progress attacks. The Orca Platform analyzes cloud provider logs and threat intelligence feeds using machine learning and rules-based heuristics, while also providing automated remediation to prevent security issues from progressing across the software development lifecycle (SDLC).

Latest Aithority Insights: AiThority.com to Attend The Character of AI – A Technology Ethics Conference (Virtual)

“With our new Cloud Detection and Response capabilities, we are greatly expanding the scope of the Orca Cloud Security Platform”

The need for a new approach to counter rising cloud attacks is critical. According to IDC, in 2021, 98 percent of companies experienced a cloud data breach in the last 18 months, up from 79 percent in 2020. Orca Security Cloud Detection & Response capabilities are uniquely designed to solve this challenge by monitoring for risks and threats across the full cloud attack surface. By providing Security Operations Center (SOC) and Incident Response (IR) teams with contextualized data on potentially malicious events, security teams can accelerate investigation, triage, and respond to threats in the cloud.

Orca Security combines this information with its fully contextualized insights into cloud workloads and configurations to quickly identify the threats that need immediate attention. By leveraging anomaly detection based on cloud native applications combined with user activity, security teams can identify the threats that pose the greatest risk to applications and crown jewel assets to remediate them quickly and effectively from a single cloud security platform.

“With our new Cloud Detection and Response capabilities, we are greatly expanding the scope of the Orca Cloud Security Platform,” said Avi Shua, CEO and co-founder of Orca Security. “By leveraging heuristics and anomaly detection capabilities encompassing both workloads and cloud native activity, organizations can, for the first time, have 100 percent agentless coverage against all kinds of cloud attacks.”

AI and ML NewsAI: Continuing the Chase for Brain-Level Efficiency

A Game Changer for Mitigating Cloud Attacks

Orca Security is the first agentless platform to combine anomaly detection and heuristics to cover the entire cloud native application attack surface–including cloud configuration, workload, data, network, and identity layers–in a unified data model to understand full risk context and which events potentially endanger the organization’s most critical assets.

“Identifying and responding to cloud threats is a difficult challenge for any organization. At Paidy, we trust Orca Security today for key capabilities like cloud vulnerability management and continuous compliance,” says Jeremy Turner, Deputy CISO and Senior Cloud Security Engineer at Paidy. “The added Cloud Detection and Response dashboard and capabilities strengthen the Orca Cloud Security Platform to continue scaling our cloud security efforts at Paidy.”

With Orca’s CDR capabilities, organizations can detect, investigate, and respond to cloud attacks:

  • Detect: Orca continuously monitors for cloud vulnerabilities and misconfigurations, as well as malware, identity and access management (IAM) risks, lateral movement risks, sensitive data exposure, and more. It also knows exactly when to alert security teams, and avoids over alerting about insignificant issues, reducing alert fatigue, and potentially missed critical issues.
  • Investigate: Security teams can research malicious activity with Orca’s new CDR dashboard to quickly understand whether the events indicate an attack and if any of the organization’s critical assets are in danger.
  • Respond: Organizations can remediate cloud attacks by leveraging Orca’s automated steps to quickly prevent attacks efficiently. Orca also integrates with SIEM and SOAR solutions for fast investigation and remediation (e.g., Splunk, Sumo Logic, IBM Qradar, Torq, and Bringa) and offers several ticketing and notification integrations with providers such as Slack, PagerDuty, ServiceNow, and Jira.

AI ML in Marketing: AI and Big Data Analysis Used to Find Brands’ Emotional Connection

[To share your insights with us, please write to sghosh@martechseries.com]

Comments are closed.