Artificial Intelligence | News | Insights | AiThority
[bsfp-cryptocurrency style=”widget-18″ align=”marquee” columns=”6″ coins=”selected” coins-count=”6″ coins-selected=”BTC,ETH,XRP,LTC,EOS,ADA,XLM,NEO,LTC,EOS,XEM,DASH,USDT,BNB,QTUM,XVG,ONT,ZEC,STEEM” currency=”USD” title=”Cryptocurrency Widget” show_title=”0″ icon=”” scheme=”light” bs-show-desktop=”1″ bs-show-tablet=”1″ bs-show-phone=”1″ custom-css-class=”” custom-id=”” css=”.vc_custom_1523079266073{margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}”]

TrueFort Cloud Enables Application Intelligence-based Workload Protection to Secure Environments in Minutes

Flexible New Deployment Options Make Service Account Protection and Microsegmentation Capabilities Accessible to Any Size Organization

TrueFort, the real-time workload protection company, announced TrueFort Cloud, which makes application-intelligent workload protection, service account analytics, and microsegmentation accessible to customers in one day, compared to competitive approaches that take weeks. The TrueFort Cloud service is hosted on AWS, and supports both cloud and hybrid cloud/on-premises deployment architectures.

Latest Aithority InsightsKoïos Intelligence and Applied to Further Digitize Sales and Service Workflows

“As organizations increasingly host critical applications in cloud environments, they need ways to efficiently manage security risk,” said Melinda Marks, Senior Analyst at Enterprise Strategy Group, Inc. (ESG). “By monitoring workloads and understanding the communications between the applications and related resources, TrueFort helps customers detect security issues and efficiently take the needed actions to protect their workloads and assets.”

Shining a Light on Service Accounts

Although service accounts pose great risk to organizations, they are very rarely reset or retired, out of concern that changes will cause an outage. These sensitive accounts are often highly privileged, and if compromised, allow attackers to move laterally throughout the environment undetected. Meanwhile, endpoint detection and response (EDR) and user/entity behavior analytics (UEBA) solutions provide service account metrics, but lack visibility into local activity by the applications that use them.

TrueFort identifies, monitors, and learns trusted connection patterns of workloads, applications, and service accounts, and can easily absorb EDR agent telemetry to provide insight into active, inactive, and rogue accounts. With TrueFort Service Account Analytics, customers can detect and prevent lateral movement by attackers and malicious insiders.

Related Posts
1 of 40,712

“The combination of cloud migration and modernization has made applications and workloads an increasingly popular target for attackers, since most security tools cannot detect when they have been compromised and are exhibiting suspicious behavior,” said Nazario Parsacala, CTO of TrueFort. “We continuously analyze workloads in real time and profile their activity against approved and acceptable baselines to detect risky and anomalous behavior, and protect assets by enforcing legitimate service account behavior.”

Browse The Complete News About Aithority: AI for Safe Autonomous Drone Operations with Technologies from Auterion and Spleenlab

Workload Segmentation to Isolate Compromise

Workload and application communications have increased in complexity due to the evolution of microservices-based architectures, which are virtually impossible to document since they continuously evolve and change. In these environments, enforcing network-based microsegmentation policies on firewalls or other hardware solutions is not viable. In contrast, TrueFort provides Zero Trust workload microsegmentation to protect business critical assets.

TrueFort moves segmentation to the workload by enforcing policies based on profiles that understand network, identity, process, and application behavior rather than relying heavily on IP or port data. By implementing policy enforcement on workloads, TrueFort detects and blocks lateral movement and supply chain attacks that evade network-based segmentation. TrueFort also discovers and maps the environment for intra-application dependencies, workloads, and data flows to reduce an organization’s attack surface. Finally, TrueFort uses a trusted baseline of acceptable behavior to reduce lateral movement and block malicious workload activity.

Read More About Aithority News Altada Files Three Fast Track U.S. Patent Applications Relating to its Doc Intelligence Solution

 [To share your insights with us, please write to sghosh@martechseries.com]

Comments are closed.