Security in the cloud can be measured and analyzed

Security in the cloud can be measured and analyzed

Share post

Attack path analysis and business impact score for cloud-native applications - Orca Security makes security in the cloud measurable and analyzable. Security teams can now go well beyond prioritizing siled alerts and focus on the handful of toxic combinations of issues that target the most critical assets

Orca Security, the innovation leader in cloud security, today released the industry's first attack path analysis and business impact score for cloud-native applications. The new Attack Path Analysis and Business Impact Score feature automatically combines cloud risks and insights, including vulnerabilities, misconfigurations, and trust permissions. The aim is to show the most critical attack paths that lead to the "crown jewels", i.e. the most valuable data stocks and resources of a company.

Dashboard shows company risk

Security teams can now get a high-level view of enterprise risk through an interactive dashboard, instead of dealing with siled alerts. This approach prevents what is known as alert fatigue, which is fatigue from frequent alerts, reduces the time to resolution of issues, and helps prevent damaging data breaches.

Orca Attack Path Analysis and Business Impact Score helps curb cloud security alert fatigue. According to the Orca Security 2022 Cloud Security Alert Fatigue Report, more than half of respondents (55 percent) confirmed that their team has historically missed critical alerts due to ineffective alert prioritization — often on a weekly or even daily basis.

Attack path visualization, assessment and prioritization

Orca Security provides a visual representation of an attack path and detailed information about each step in the chain. Orca Security also assigns an overall score (from 0 to 99) to each attack vector.

To calculate the score, Orca Security uses an algorithm based on multiple factors within the attack path. These include e.g. B. The underlying severity of a given vulnerability and its accessibility and risk of lateral displacement. The business effects are also recorded - e.g. B. Access to sensitive data and critical assets, including personal identification data, secrets, permissions, intellectual property, financial information and more. Security teams can also label the most valuable data assets and assets in their cloud inventory.

More at Orca.Security

 


About Orca Security

Orca Security delivers out-of-the-box security and compliance for AWS, Azure, and GCP—without the gaps in coverage, alert fatigue, and operational costs of agents or sidecars. Simplify cloud security operations with a single CNAPP platform for workload and data protection, cloud security posture management (CSPM), vulnerability management, and compliance. Orca Security prioritizes risks based on security issue severity, accessibility, and business impact.


 

Matching articles on the topic

Cybersecurity platform with protection for 5G environments

Cybersecurity specialist Trend Micro unveils its platform-based approach to protecting organizations' ever-expanding attack surface, including securing ➡ Read more

Data manipulation, the underestimated danger

Every year, World Backup Day on March 31st serves as a reminder of the importance of up-to-date and easily accessible backups ➡ Read more

Printers as a security risk

Corporate printer fleets are increasingly becoming a blind spot and pose enormous problems for their efficiency and security. ➡ Read more

The AI ​​Act and its consequences for data protection

With the AI ​​Act, the first law for AI has been approved and gives manufacturers of AI applications between six months and ➡ Read more

Windows operating systems: Almost two million computers at risk

There are no longer any updates for the Windows 7 and 8 operating systems. This means open security gaps and therefore worthwhile and ➡ Read more

AI on Enterprise Storage fights ransomware in real time

NetApp is one of the first to integrate artificial intelligence (AI) and machine learning (ML) directly into primary storage to combat ransomware ➡ Read more

DSPM product suite for Zero Trust Data Security

Data Security Posture Management – ​​DSPM for short – is crucial for companies to ensure cyber resilience against the multitude ➡ Read more

Data encryption: More security on cloud platforms

Online platforms are often the target of cyberattacks, such as Trello recently. 5 tips ensure more effective data encryption in the cloud ➡ Read more