Artificial Intelligence | News | Insights | AiThority
[bsfp-cryptocurrency style=”widget-18″ align=”marquee” columns=”6″ coins=”selected” coins-count=”6″ coins-selected=”BTC,ETH,XRP,LTC,EOS,ADA,XLM,NEO,LTC,EOS,XEM,DASH,USDT,BNB,QTUM,XVG,ONT,ZEC,STEEM” currency=”USD” title=”Cryptocurrency Widget” show_title=”0″ icon=”” scheme=”light” bs-show-desktop=”1″ bs-show-tablet=”1″ bs-show-phone=”1″ custom-css-class=”” custom-id=”” css=”.vc_custom_1523079266073{margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}”]

Sysdig CSPM Remediates Security Issues in Seconds

Industry-first guided remediation that aggregates issues to save time

Sysdig, the unified container and cloud security leader, announced ToDo, an actionable checklist showing prioritized risks, and Remediation Guru, guided remediation at the source. This is the industry’s first cloud security posture management (CSPM) offering that aggregates security findings by root cause and prioritizes remediation based on impact. ToDo saves time during investigations and Remediation Guru allows security and DevOps teams to fix issues in seconds with just a few clicks.

Latest Aithority Insights : NVIDIA Raises the Standard of Low Code DevOps with the NVIDIA AI Enterprise 2.1

Today @Sysdig announced ToDo, an actionable checklist showing prioritized cloud risks, and Remediation Guru, guided remediation at the source.

Organizations often have hundreds of cloud accounts and services spread across multiple cloud environments. They are automating deployment of cloud services using Infrastructure as Code (IaC). If the IaC template has a configuration error, the same error is often replicated across cloud environments, generating multiple alerts and overwhelming security teams.

Compounding the problem, policies and controls often cannot be applied across environments. This results in inconsistent policies across the organization for different parts of the software delivery pipeline. The lack of agnostic controls across the technology stack increases management complexity.

With Sysdig, security teams can rapidly find, prioritize, and remediate security issues. ToDo aggregates risks that have the same root cause and provides opinionated prioritization that reduces time spent on investigation. However, teams not only need help identifying the risks and focusing their attention on what matters, but they also need assistance implementing the fixes. Remediation Guru automatically generates the suggested change to IaC templates that can be applied with a single click so teams can get back to revenue-generating work. Because Sysdig has a shared policy model, teams can efficiently and consistently enforce policy across multiple cloud and Kubernetes environments.

Read More About AI News : Role of AI in Helping B2B companies that are Missing Out on Buyer Intent Data

Key Benefits

  • Manage cloud and Kubernetes inventory with a single view: Teams gain visibility into cloud assets across hybrid- and multi-cloud environments.
  • Prioritize what matters with ToDo: ToDo prioritizes actions that remediate the greatest number of issues by consolidating based on root cause and impact.
  • Save time using Remediation Guru to fix configuration risks: Remediation Guru enables teams to fix at the source by approving automatically generated pull requests that map misconfigurations in production to IaC manifests.
  • Adopt a shared policy model leveraging OPA: Sysdig helps teams apply security policies using Open Policy Agent (OPA) policy-as-code once across multiple cloud and Kubernetes environments. Teams get a unified view of security requirements from source to production, and can easily create custom OPA-based policies with a few clicks.

“It is the worst kept secret in cloud that security tools often overwhelm teams with useless alerts that are not actionable,” said Omer Azaria, Vice President Security Engineering at Sysdig. “Customers cannot wait to get their hands on ToDo prioritization and Remediation Guru, tools that group issues and guide you to take the most impactful actions to improve security posture. For example, ‘making this change to your IAC manifest file will cause 100 resources to pass a failing compliance control.'”

AI ML in Marketing: AI and Big Data Analysis Used to Find Brands’ Emotional Connection

[To share your insights with us, please write to] 

Comments are closed.