One-click cloud misconfiguration fix is a critical enabler for Data Security Posture Management (DSPM). Varonis Introduces Automated Posture Management to Remediate Cloud Security Risks.
The new automated posture management from Varonis, the specialists in data-centric cybersecurity, helps companies to easily remediate security and compliance gaps in their SaaS and IaaS environments: Varonis continuously scans, detects and prioritizes cloud security risks and provides CISOs, Security and compliance officers real-time insight into their data security posture. With the new automation feature, they can now automatically fix misconfigurations in applications like Salesforce and AWS from a single interface with just one click.
Cloud: 99 percent of security breaches preventable
According to Gartner, by 2025 more than 99 percent of security breaches in the cloud will be preventable and will be caused by misconfigurations and user error. With the rapid evolution of SaaS and IaaS applications, it is difficult to know when sensitive data is being compromised. In addition, security teams often do not have the expertise for each and every cloud application their organization uses.
The new capability represents a significant advance in cloud data security. Passive Data Security Posture Management (DSPM) solutions require time-consuming and resource-consuming manual workflows: Helpdesk tickets must be opened, manually reviewed by a staff member, and for each individual cloud application to be edited. In contrast, Varonis now offers a unified and automated approach to reducing the multi-cloud attack surface.
More at Varonis.com
About Varonis Since its founding in 2005, Varonis has taken a different approach than most IT security providers by placing company data stored both locally and in the cloud at the center of its security strategy: sensitive files and e-mails, confidential customer, patient and Employee data, financial data, strategy and product plans and other intellectual property. The Varonis data security platform (DSP) detects insider threats and cyber attacks through the analysis of data, account activities, telemetry and user behavior, prevents or limits data security breaches by locking sensitive, regulated and outdated data and maintains a secure state of the systems through efficient automation .,