BOSTON—May 16, 2023—Aqua Security, the pioneer in cloud native security, today announced the launch of Real-Time CSPM, a next-gen cloud security posture management (CSPM) solution, offering the best visibility and context in the industry. Real-Time CSPM provides a complete view of multi-cloud security risk, pinpoints threats that evade agentless detection, and dramatically reduces noise so …
Powered by eBPF technology, Aqua’s pipeline integrity scanner detects and blocks suspicious behaviour and malware in real time, preventing code tampering and countering threats in the software build process.
This industry-first solution equips organizations to feel confident in their ability to strategically stop the most aggressive software supply chain threats that produce massive attack surfaces.
BOSTON—May 10, 2023—Aqua Security, the pioneer in cloud native security, today announced it added pipeline integrity scanning to prevent software supply chain attacks and assure CI/CD pipeline integrity. Powered by eBPF technology, Aqua’s pipeline integrity scanner detects and blocks suspicious behavior and malware in real time, preventing code tampering and countering threats in the software …
“Containers and cloud-native technologies allow for more efficient and scalable development, Chris Smith, Aqua CRO said, but they also increase the complexity of the environment, making it essential to have visibility and an “agent-based security approach” to identify and resolve any issues that may arise.”
Co-founder and CEO Dror Davidoff was featured by CRN. He shares in his insights: “For many customers, cloud security started by just getting visibility — to understand what they have in the cloud. I think there is a realization that it’s a good first step, but it’s certainly not enough.”
Aqua was named a vendor to watch in Cloud Security Posture Management (CSPM).
Research that cloud-security vendor Aqua Security recently conducted uncovered some 250 million software artifacts and more than 65,000 container images lying exposed and Internet-accessible in thousands of registries and repositories. Some 1,400 hosts allowed access to secrets, keys, passwords, and other sensitive data that an attacker could use to mount a supply chain attack, or …