Check Point Software Technologies launched its CloudGuard Application Security, which expands the capabilities of its unified CloudGuard Cloud Native Security platform, according to ITP.net. CloudGuard AppSec is a fully automated API and web application protection solution that would allow organizations to protect all their cloud-native applications from both known and zero-day attacks. As part of the CloudGuard Workload Protection capabilities, it reduces the high rate of false-positive alerts brought on by legacy Web Application Firewalls and eliminates the need for manual tuning by employing contextual artificial intelligence in the prevention of cloud application-related attacks, which allows businesses to take full advantage of cloud agility and speed. “Protecting workloads and applications in the cloud requires a holistic suite of capabilities. However, the journey to workload protection starts with securing your web applications and APIs. Check Point addresses this need for integrated application security and demonstrates their cloud acumen with the introduction of CloudGuard’s newest capability which includes automated application security,” said Frank Dickson, IDC Research’s program vice president of security and trust.
Jill Aitoro leads editorial for SC Media, and content strategy for parent company CyberRisk Alliance. She 20 years of experience editing and reporting on technology, business and policy.
Major cybersecurity firm Fortinet has disclosed having information from fewer than 0.3% of its customers compromised following a cyberattack against its Microsoft Azure SharePoint server by the threat actor Fortibitch, which claimed to have stolen and exposed 440 GB of data.
A consolidated security platform that bundles together distributed networking and cloud-native security tools can cut costs and speed implementation as you modernize your systems.
With the feature being air-gapped from self-managed Google Cloud projects hindering its resources' visibility, organizations could specify against backup modifications and deletions until a designated timeframe, as well as ensure backup recovery even in the absence of the source resource, according to Google.