Better cloud security through Continuous Security Verification

Better cloud security through Continuous Security Verification

Share post

Cloud security: The cloud-native security solution Mitigant protects cloud infrastructures through continuous security verification. It is able to independently detect, analyze and issue an alarm for suspicious anomalies within cloud infrastructures.

Mitigant, the cloud-native security solution from the start-up Resility, introduces itself to the German security community. Since its AWS public release on August 1, German medium-sized companies can benefit from the modern cloud security posture management solution. The features of the current version include Continuous Cloud Compliance Management, Cloud Assets Inventory, Secure Drift Management and Automated Assessments & Notifications. More features will be added throughout the year.

Proactive: attack your own cloud to test it

Mitigant differs from previous cloud security solutions in its security chaos engineering approach. It enables IT security teams to proactively ensure security in cloud infrastructures. The solution goes far beyond just detecting and fixing misconfigured cloud resources. It is able to independently detect and analyze suspicious anomalies within cloud infrastructures. In addition, it carries out automated cloud attack scenarios, similar to a penetration test, in order to test the resilience of the cloud infrastructure to different cloud attack scenarios. The approach allows IT security teams to determine how resilient their company's cloud infrastructure actually is.

Strengthening countering cloud attacks

“Cloud attacks have increased significantly in recent years as a result of rapid digital transformation and growing data migration to the cloud. They are becoming increasingly complex and can have devastating consequences for companies that store their data and operate their IT infrastructure in the cloud. With Mitigant, we offer an automated cloud security solution that can be used to quickly identify and fix misconfigurations, quickly discover anomalies and easily optimize resilience. Our approach is: "Detect", "Secure" and "Verify". This is how we ensure continuous security verification, i.e. continuous verification of the protective measures," adds Kennedy Torkura, co-founder and CTO at Resility GmbH.

More at Mitigant.io

 


About resilience

Resility GmbH was founded in Potsdam in 2021 by graduates of the Hasso Plattner Institute. Mitigant is a cloud-native security solution that detects and remediates cyber threats and vulnerabilities in public clouds. Companies use the security chaos engineering approach to verify the effectiveness of the security measures in their infrastructure.


 

Matching articles on the topic

Cybersecurity platform with protection for 5G environments

Cybersecurity specialist Trend Micro unveils its platform-based approach to protecting organizations' ever-expanding attack surface, including securing ➡ Read more

Data manipulation, the underestimated danger

Every year, World Backup Day on March 31st serves as a reminder of the importance of up-to-date and easily accessible backups ➡ Read more

Printers as a security risk

Corporate printer fleets are increasingly becoming a blind spot and pose enormous problems for their efficiency and security. ➡ Read more

The AI ​​Act and its consequences for data protection

With the AI ​​Act, the first law for AI has been approved and gives manufacturers of AI applications between six months and ➡ Read more

Windows operating systems: Almost two million computers at risk

There are no longer any updates for the Windows 7 and 8 operating systems. This means open security gaps and therefore worthwhile and ➡ Read more

AI on Enterprise Storage fights ransomware in real time

NetApp is one of the first to integrate artificial intelligence (AI) and machine learning (ML) directly into primary storage to combat ransomware ➡ Read more

DSPM product suite for Zero Trust Data Security

Data Security Posture Management – ​​DSPM for short – is crucial for companies to ensure cyber resilience against the multitude ➡ Read more

Data encryption: More security on cloud platforms

Online platforms are often the target of cyberattacks, such as Trello recently. 5 tips ensure more effective data encryption in the cloud ➡ Read more