As organizations increasingly migrate their computing workloads to publicly hosted clouds, IT and security administrators face new challenges, stated Radware. Cloud environments make it easy to spin up new resources and grant wide-ranging permissions that can potentially be abused. Such misuse would often lead to cloud-native risks to public cloud services, namely data breaches, account compromise, and resource exploitation.
Radware’s new service uniquely addresses cloud security posture, detection of cloud native attacks, and consequent/respective actionable insights. Initially available for Amazon’s AWS platform, Radware has designed its Cloud Workload Protection service to help customers safeguard their role in cloud providers’ ‘shared responsibility model.’
“Public cloud environments make it very easy to grant extensive permissions and very difficult to keep track of them,” said Dr. David Aviv, Chief Technology Officer (CTO) of Radware. “What is frequently mis-characterized as ‘misconfigurations’ is actually the result of permission misuse or abuse. We specifically designed Radware’s Cloud Workload Protection Service to offer extensive protection against the broader public cloud attack surfaces and new cloud-native risks.”
Radware’s detection engine is based on advanced machine-learning algorithms that would identify potentially malicious activity within cloud accounts. Radware then correlates individual alerts into streamlined attack storylines, which show the step-by-step attack progression. This way, Radware would map-out hackers’ attack kill-chain, and help block data theft attempts before they result in a breach.
With the addition of Cloud Workload Protection, Radware now provides a full-stack protection of applications hosted on public clouds, covering both the perimeter (WAF, DDoS, SSL, bot management, and threat intelligence) as well as the internal cloud workload and cloud data (workload protection).
Read more at Radware Unveils Cloud Workload Protection Service on Website Hosting Review.