Page 35 - GS210101
P. 35

NewProducts
                                                    NewProducts


                             Comprehensive, contextual


                                    security for the cloud




                                                               dress PCI-DSS, SOC2, PSD2, and GDPR requirements, Shua
                                                               stated, adding that SideScanning technology is easy to de-
                                                               ploy.  When used as a subscription service or within a cloud
                                                               environment, SideScanning technology ensures sensitive
                                                               data never leaves an environment, the company stated,
                                                               adding that both solutions enable users to quickly detect
                                                               vulnerabilities, malware, misconfigurations, lateral move-
                                                               ment risk, weak and leaked passwords, and unsecured PII
                                                               in cloud environments.

                   rca Security created SideScanning technology,   Agile, responsive, proactive
                   a patent-pending solution designed to pro-
                   tect cloud-based networks and infrastructures   Shua has observed that network security has changed
        O by  replacing  traditional  workload  protection     over the past decade. Financial institutions that previously
        programs and legacy vulnerability assessment tools. The   waited a year for a new software feature now expect it next
        agentless solution is simple to deploy and uses read-only   week, yet despite changes, group dynamics have stayed the
        access, according to Avi Shua, CEO and co-founder of Orca   same, he noted. Developers focus on fixing, developing and
        Security.                                              changing code and delivering software; security teams are
                                                               responsible for making sure there are no critical mistakes;
        "We built a technology, which is patent pending, called   by definition friction occurs between these teams, he stated.
        SideScanning that enables us to scan cloud environments
        in a non-invasive way, similar to performing an MRI, by   "Before you even look at security technology, it's important
        scanning a network and building an image without touch-  to understand three different types of communication that
        ing anything," Shua said. "The business value is allowing   I've witnessed in discussions between these teams," Shua
        security teams to have visibility in the environment and   said. He summarized the discussions into three main cat-
        identify areas that need to be fixed."                 egories as follows:
                                                                  1. Making things more secure: "For security teams,
        Shua also noted that SideScanning technology can perform    one of the most common discussions is how to make
        a deep scan of an entire cloud estate without leaving any   things more secure. This is a discussion that people
        gaps in coverage and without the costly use of agents. This   are usually open to, because everyone is focused on a
        enables network administrators to implement a range of      relatively easy win."
        PCI-DSS workload controls such as vulnerability manage-   2. We found something critical that needs to be fixed:
        ment, malware scanning and file integrity monitoring, he    "A second discussion, which is also relatively easy, is
        stated.                                                     when the security team finds a critical flaw. Again, if
        Comprehensive, contextual coverage                          there's an issue, this is a fairly straightforward propo-
                                                                    sition."
        Shua pointed out that Orca Security is focused on maxi-   3. We don't understand your security posture: "There
        mizing the three C's: comprehensiveness, coverage and       is a third kind of discussion that simply doesn't work,
        context. Comprehensive coverage provides a thorough,        and that's the discussion that says, 'I'm not sure about
        multidimensional view of the cloud environment and its      the security posture of this service, so I need you to
        vast interconnected web of assets. Contextual coverage pri-  install software and change the way you work so that
        oritizes risk based on environmental context, replacing ge-  I, as your security analyst, can evaluate your network.'
        neric security alerts and going a step further by pinpoint-  That's a discussion that never works. And fortunately,
        ing critical vulnerabilities and providing a precise pathway   with Orca's SideScanning technology, there will not be
        to remediation, he noted.                                   a need to have this third type of discussion."

        Comprehensive, contextual security coverage saves time
        and money and simplifies compliance, Shua added. In ad-
        dition to its advanced capabilities and coverage, SideScan-        Company: Orca Security
        ning technology documents security capabilities to show            Product: SideScanning Technology
        regulators how networks identify and protect PII and con-          Website: https://orca.security
        tinuously monitor and detect vulnerabilities, malware, and
        improperly secured secrets. These capabilities and their           Contact: info@orca.securitym
        documented audit trails help network administrators ad-
                                                                                                                35
   30   31   32   33   34   35   36   37   38   39   40