sb-as logo
Story image

Radware extends cloud protection, adds multi-cloud support

15 Jun 2020

Radware has enhanced its Cloud Workload Protection Service (CWP) to a full-suite of visibility, compliance and reporting features, coupled with enhancements to its attack detection engine.

Its compliance engine has been extended to support multi-cloud environments. 

The engine compares an organisation’s cloud security posture against multiple industry compliance standards, including: PCI DSS, HIPAA, NIST CSF, SOC2, CIS AWS/Azure Foundation Benchmark.

The service includes a new security posture dashboard that provides visibility into both the overall cloud risks associated with workloads hosted on both AWS and Azure and the organisation’s cloud security posture. 

This dashboard provides a detailed view of security risks across multiple accounts, regions, and public cloud vendors. 

Radware has improved its attack detection engine to detect cloud native attack vectors and added a new attack simulation tool. 

The attack simulation tool allows organisations to test their public cloud environments, harden security posture and improve their security teams’ readiness using simulated attacks based on real-life cloud data breach events. 

The result is an end-to-end CSPM solution for identifying security risks, unintended public exposure, excessive permissions, and compliance breaches as well as detecting breach attempts and automatically remediating threats.

“As companies increasingly turn to public cloud environments, they need unprecedented visibility into their environment that is based on real risk analysis. Too often, organisations use tools that struggle to distinguish between suspicious activity performed by legitimate entities and malicious activity conducted by threat actors,” says Radware chief technology officer David Aviv. 

“Radware’s Cloud Workload Protection Service helps organisations to identify both scenarios by providing meaningful threat intelligence and advanced analytics with an unmatched ability to identify attack-kill-chain.”

Ad-tech company Perion’s employees manage multiple AWS instances and use Radware for additional security visibility.

“We recently conducted a trial run with a cybersecurity startup that was quickly growing its customer base after receiving a large investment from a venture capital firm,” says Perion security analytics vice president Nissim Pariente.

“During the proof-of-concept period, we discovered that many of the identified public exposures were actually false positives, often reported by the company’s partners. Additionally, we discovered that nearly every employee in the organisation’s cloud environment had admin privileges. With CWP, this company was able to optimise permissions to the right level of access, with a level of granularity and control that was much appreciated by executives.”

Radware’s CWP has also helped companies to monitor workloads and maintain productivity, as their workforce transitioned to remote and work-from-home arrangements, working closely with one particular client to monitor remote worker engagement and optimise permissions that align with the principle of least privilege.

Story image
Security training and tech: Empowering staff in a hybrid work environment
As employees travel back and forth between home and the workplace, are they walking through the door with cyber threats sitting on their devices?More
Story image
Proofpoint enhances security awareness training platform
Available in Q4 2020, the platform will integrate more closely with Proofpoint’s best-in-class threat intelligence.More
Story image
Malware and email scams targeting employees spread rapidly in Q2
"Businesses must stay alert and should employ defense-in-depth tactics and equip themselves with multilayered security mechanisms, including high-sensor spam filters and a VPN connection, which would prevent malicious pages from opening."More
Story image
Check Point acquires Odo Security to bolster remote security offering
The deal will integrate Odo’s remote access software with Check Point’s Inifinity architecture, bolstering the latter company’s remote security capabilities in a time where working and learning from home has become the norm, and looks to largely remain that way in the near future.More
Story image
Emotet malware is on a rampage after months of silence
CERT agencies around the world are reporting a surge in cyber attacks related to the Emotet malware, which is being distributed by email.More
Link image
Webinar: Best practices for keeping your video chats secure
Video collaboration providers nowadays operate exclusively on a multi-tenant, public cloud - and security and privacy concerns have come into the spotlight. Here's how to secure your communications.More