[ad_1]
Resonate’s new cloud identity platform is designed to protect cloud resources from identity-based attacks. According to Resonate, the company provides identity protection in the cloud as a way to solve a wide range of identity and access security issues. The company is providing the ability to overcome legacy approaches with a new cloud-based application that unifies what it says are all aspects of how access and identity are protected in the cloud.
Identity protection is important because it is critical to the security of cloud-based systems. According to the Verizon 2022 Data Breach Investigations Report, “many intrusions exploit basic identity (mis)management.” The report states that unauthorized access due to mismanaged credentials accounted for more than a third of the entire hacking category and more than half of all compromised records. Worse, the report noted that many major breaches resulted from the use of default or shared credentials. Verizon first pointed this out in 2009 – thirteen years before the current DBIR.
“Over the past decade, we’ve focused on making our employees more efficient,” said Roy Ackerman, CEO and founder of Resonate. “The ability to access anything from anywhere at any time from any device.” Identity was already a critical aspect of enterprise security programs.”
The growth of the cloud as a central place for an increasing number of enterprises only complicates the problem of securing identity. “The reliance on cloud infrastructure is only increasing as more and more enterprises build their core offerings in the cloud,” Ackerman explained. “Only one million companies use AWS, let alone other cloud providers.” A significant understatement.”
Growing complexity
The identity problem becomes more complex as the cloud environment becomes more complex. This means that identity management as a key aspect of security is only growing in importance.
“Bottom line,” Ackerman said, “everything moves and changes rapidly in the cloud. However, security must resonate at all times for every process, workload, and authority when building and running an organization’s cloud business.”
To keep up with the dynamic nature of the cloud, Resonate continuously analyzes and synthesizes the data in the cloud applications as well as the identities that have access. Both human and machine identities become part of what Resonate calls a unique narrative that provides insight into identity and access risk. This visibility allows those risks to be eliminated and the risks to be analyzed for further study and understanding of how the risk may affect the cloud being attacked. In addition to viewing events in real time, Resonate can also look back at past events, authorization rules, and flows to illuminate potential risks.
“Businesses are building software fast,” Ackerman said. “Many developers and partners work together, the code is constantly changing.” It therefore becomes a moving target. Today, there are 20 times more machine identities than human identities, which raises the issue even further through the identity fabric.”
Ackerman said the most important change in cloud security is that the cloud attack surface is no longer the cloud perimeter, which is protected by legacy security approaches. Instead, he said, the attack surface is completely cloud, making a cloud-based solution necessary.
“The interesting part of it is — the cloud does it for us,” Ackerman explained. “The solution lies in the infrastructure that we want to protect.” We just use it. This is a security approach that is as dynamic as the infrastructure we want to protect.
[ad_2]
Source link