Cloud Applications: Real-time attack detection and blocking

B2B Cyber ​​Security ShortNews

Share post

Industry-first solution that combines multicloud observability and advanced AIOps with real-time vulnerability management and mitigation. Dynatrace integrates real-time intrusion detection and blocking, enhancing cloud application security.

Dynatrace, the "Software Intelligence Company", has extended the Application Security Module. It now offers real-time automatic detection and mitigation of attacks. This protects against injection attacks that exploit critical vulnerabilities such as Log4Shell. Dynatrace thus complements existing functions such as automatic detection of runtime vulnerabilities in cloud-native applications and container workloads. Now organizations can protect their applications in real time and increase DevSecOps automation to improve the security of their digital services and accelerate throughput.

Proactive protection is essential

"It's imperative that we proactively protect all of our systems to mitigate security risks," said David Catanoso, acting director of cloud and edge solutions in infrastructure operations at the US Department of Veterans Affairs. “We take a multi-layered, in-depth approach to security. Dynatrace is one of the solutions used because it quickly uncovers vulnerabilities in monitored applications in our clouds. For example, with the Log4Shell vulnerability, the platform immediately and accurately identified where we were impacted and prioritized the systems and runtime environments that required immediate attention. She was able to save us from wasting time in crisis meetings and pursuing false positives.”

Dynatrace Smartscape provides a continuously and automatically updated topology. Davis, the Dynatrace platform's AI engine, provides real-time visibility and prioritization of vulnerabilities. This combination enables Dynatrace to improve the security of applications by:

  • Accurate identification and prioritization of vulnerabilities - Teams gain a clear understanding of the top vulnerabilities to fix. You no longer have to spend time searching for false positives.
  • Proactive vulnerability remediation – This enables integration with DevOps toolchains, including offerings like Atlassian, Slack, and ServiceNow.
  • Automated attack detection and mitigation – The solution provides runtime application self-protection for the top threats identified by the Open Web Application Security Project (OWASP). These include SQL injections and command injections.

AI: Real-time visibility and prioritization of vulnerabilities

"Enterprises want to improve their security through application testing and DevSecOps processes, but that's not enough for highly dynamic cloud-native environments," said Steve Tack, SVP of Product Management, Dynatrace. “To help our customers be proactive, innovative and secure, we have added the ability to automatically block attacks in real-time to our existing strengths of vulnerability identification and prioritization. With Dynatrace's intelligence and automation, organizations can reduce risk across the software development lifecycle, accelerate throughput, and secure modern cloud workloads and applications.”

More at Dynatrace.com

 


About Dynatrace

Dynatrace delivers software intelligence to simplify the complexities of the cloud and accelerate digital transformation. With automatic and intelligent, highly scalable observability, our all-in-one platform provides precise answers about the performance and security of applications, the underlying infrastructure and the experience of all users. This enables companies to drive innovations faster, work together more efficiently and generate added value with significantly less effort.


Matching articles on the topic

Report: 40 percent more phishing worldwide

The current spam and phishing report from Kaspersky for 2023 speaks for itself: users in Germany are after ➡ Read more

BSI sets minimum standards for web browsers

The BSI has revised the minimum standard for web browsers for administration and published version 3.0. You can remember that ➡ Read more

Stealth malware targets European companies

Hackers are attacking many companies across Europe with stealth malware. ESET researchers have reported a dramatic increase in so-called AceCryptor attacks via ➡ Read more

IT security: Basis for LockBit 4.0 defused

Trend Micro, working with the UK's National Crime Agency (NCA), analyzed the unpublished version that was in development ➡ Read more

The AI ​​Act and its consequences for data protection

With the AI ​​Act, the first law for AI has been approved and gives manufacturers of AI applications between six months and ➡ Read more

MDR and XDR via Google Workspace

Whether in a cafe, airport terminal or home office – employees work in many places. However, this development also brings challenges ➡ Read more

Test: Security software for endpoints and individual PCs

The latest test results from the AV-TEST laboratory show very good performance of 16 established protection solutions for Windows ➡ Read more

AI on Enterprise Storage fights ransomware in real time

NetApp is one of the first to integrate artificial intelligence (AI) and machine learning (ML) directly into primary storage to combat ransomware ➡ Read more