CipherCloud®, the market’s leading provider of integrated cloud security and data privacy, today announced that it has formally introduced its Cloud Security Posture Management (CSPM) and SaaS Security Posture Management (SSPM) solutions capabilities. This new offering enables CipherCloud customers to prevent unintended cloud misconfigurations that lead to data loss, while enabling more consistent compliance with industry standards such as GDPR, CCPA, HIPAA and PCI.
Delivered as an integrated component of the market-leading CASB+ solution, CipherCloud CSPM and SSPM directly address the leading cause of cloud security and data breaches – unseen cloud configuration errors. CipherCloud CSPM and SSPM deliver continuous oversight and real-time guardrails that enable practitioners to protect critical administrative and configuration controls across their numerous SaaS and IaaS environments, including Salesforce.com, Office 365, Amazon AWS, Microsoft Azure, and Google Cloud.
In the Gartner 2020 “Magic Quadrant for Cloud Access Security Brokers” CipherCloud was highlighted for market-leading CSPM/SSPM capabilities suitable to replace stand-alone tools.
“Our customers are asking us to provide them with all the security and GRC capabilities they need to address their cloud security challenges in an integrated solution, and CSPM has become a huge requirement based on the sheer number of related breaches,” said Pravin Kothari, CipherCloud Founder and CEO. “The growing scale and complexity of SaaS and cloud environments have made it impossible for security teams to properly address this issue using manual processes. Organizations need automated analysis and remediation to prevent risky configuration exposures and remain both protected and compliant.”
Integrated Multi-Cloud Configuration Monitoring and Remediation
CipherCloud’s CSPM and SSPM continuously scan SaaS and cloud services to discover problematic configurations, user errors, and perform automatic remediation of identified exposures, securing cloud accounts from unintended data loss due to security blindspots or configuration oversight.
The solution also defines pre-built rules to reflect leading security methodologies and compliance frameworks, including CIS Foundations Benchmarks, GDPR Compliance, HIPAA Compliance, and PCI DSS Best Practices, along with providing the option to validate cloud security posture against the native CipherCloud Best Practices framework.
Key processes addressed by CipherCloud CSPM and SSPM include:
- Configuration changes: Detecting less secure configurations on new resources and unintentional access/configuration changes on all existing resources.
- Compliance: Ensuring that the IaaS platform is deployed securely and appropriately configured to meet regulatory standards, security policies & CIS benchmarks.
- Continuous Monitoring: Continuously monitoring configuration changes to alert on insecure configurations, applying tags to inform further analysis.
- Reporting: Periodically running security assessments to analyze and detail changes, and generate corrective actions.
CipherCloud CASB+ Platform
The CipherCloud CASB+ platform enables complete control of SaaS and cloud applications to provide advanced visibility, data security, threat protection and compliance. CASB+ protects any cloud service or application from unauthorized data access, upload, download, and sharing to meet corporate governance, compliance, and cybersecurity policies.
The cloud-native platform ensures that confidential and sensitive data is protected at all locations – in the cloud and on users’ devices. CASB+ provides one centrally controlled unified platform for enterprises to safely use the largest and most diverse multi-cloud environments — email, SaaS, PaaS, or IaaS, and custom clouds. CipherCloud CASB+ has the ability to scale to fit any enterprise — as users scale their use of the platform, elasticity will support increased demand without impacting customer service, cost or manageability.
Image licensed by Pixabay.com
Related News:
Barracuda Research Reveals Evolving Tactics Attackers Use to Trick Victims