Extended cloud security to all application layers

B2B Cyber ​​Security ShortNews

Share post

Dynatrace, the "Software Intelligence Company", has expanded its application security module for more cloud security. It now detects and protects against vulnerabilities in runtime environments including Java Virtual Machine (JVM), Node.js and .NET CLR.

Dynatrace now also supports applications based on the programming language Go. Its adoption has increased by 23 percent over the past year, making it one of the fastest growing programming languages.

Real-time visibility and vulnerability analysis

With these enhancements, the Dynatrace Platform is currently the only solution that offers real-time visibility and vulnerability analysis across the entire application stack. This includes custom code, open-source and third-party libraries, as well as language runtimes, container runtimes, and container orchestrators.

Dynatrace not only automatically detects vulnerabilities in each of these layers, but also analyzes them to provide actionable and accurate recommendations immediately. This not only enables development and security teams to better assess risks, prioritize and remediate threats more effectively, but also drive innovation faster and more securely.

Extended application stacks

Language runtimes are an important layer of the application stack. They ensure that applications are available on any platform and run smoothly without having to be rewritten or compiled. By extending the Application Security Module to support runtimes in the most popular programming languages, Dynatrace provides the industry's most comprehensive application vulnerability assessment. It covers all potential points of attack in pre-production and production environments.

“The number of entry points for attacks on applications is constantly increasing. Vulnerabilities can creep in from any part of the software supply chain, including open-source or third-party components and application runtimes,” said Steve Tack, SVP of Product Management at Dynatrace. "Traditional approaches are unable to accurately identify runtime vulnerabilities or analyze their potential vulnerability and impact."

More at Dynatrace.de

 

 


About Dynatrace

Dynatrace ensures that software works perfectly worldwide. Our unified software intelligence platform combines broad and deep observability and continuous run-time application security with the most advanced AIOps to deliver answers and intelligent automation from data at remarkable scale. This enables organizations to modernize and automate cloud operations, deliver software faster and more securely, and ensure flawless digital experiences.


 

Matching articles on the topic

Report: 40 percent more phishing worldwide

The current spam and phishing report from Kaspersky for 2023 speaks for itself: users in Germany are after ➡ Read more

BSI sets minimum standards for web browsers

The BSI has revised the minimum standard for web browsers for administration and published version 3.0. You can remember that ➡ Read more

Stealth malware targets European companies

Hackers are attacking many companies across Europe with stealth malware. ESET researchers have reported a dramatic increase in so-called AceCryptor attacks via ➡ Read more

IT security: Basis for LockBit 4.0 defused

Trend Micro, working with the UK's National Crime Agency (NCA), analyzed the unpublished version that was in development ➡ Read more

MDR and XDR via Google Workspace

Whether in a cafe, airport terminal or home office – employees work in many places. However, this development also brings challenges ➡ Read more

Test: Security software for endpoints and individual PCs

The latest test results from the AV-TEST laboratory show very good performance of 16 established protection solutions for Windows ➡ Read more

FBI: Internet Crime Report counts $12,5 billion in damage 

The FBI's Internet Crime Complaint Center (IC3) has released its 2023 Internet Crime Report, which includes information from over 880.000 ➡ Read more

HeadCrab 2.0 discovered

The HeadCrab campaign against Redis servers, which has been active since 2021, continues to successfully infect targets with the new version. The criminals' mini-blog ➡ Read more