News USA

Data Theorem Unveils First CNAPP Workflow Enhancements for API and Software Chain Security

Doug

Cloud Secure CNAPP Enhances Data Breach Discovery with ML-Based Tools and Visualizations for APIs and Software Supply Chains

Data Theorem’s Cloud Secure CNAPP now features pioneering attack path analysis for APIs and software supply chain security. The update integrates ML-based hacker toolkits and advanced visualizations to enhance data breach detection across first-party APIs and third-party software supply chain assets in multi-cloud setups.

As a result of today’s launch, organizations can now leverage an advanced ML-based CNAPP solution to best secure their cloud-native apps and discover weaknesses which could lead to data breaches. Previously, organizations had to rely on cloud security posture management (CSPM) and agent-based cloud workload protection platforms (CWPP) that lack the ability to accurately detect attack surfaces such as first- and third-party APIs that lead to the critical path hackers utilize to successfully exploit vulnerabilities and extract sensitive data.

Data Theorem’s new release of Cloud Secure now delivers Cloud Hacker Toolkits powered by a new set of visualization features and ML enhancements for exploit prioritization, helping organizations focus on the most critical vulnerabilities that hackers can take advantage of for a cyberattack to extract data from cloud-native apps. In addition, Cloud Secure now offers ML-powered optimized Cloud Assets inventory with new visualizations for organizations to better understand the relationships between applications (mobile and web), APIs (first and third party), and the myriad of cloud resources. As a result, organizations for the first time can have an accurate inventory of their cloud-native and cloud-hosted applications, and visualize the growing attack surfaces including APIs they develop themselves and APIs that come from leveraging open-source software, third-party software development kits (SDKs), and public cloud services within their software supply chains.

“As we have seen, machine learning, and particularly generative language learning model (LLM), offers a new set of innovations and creativity for both security practitioners and attackers,” said, Doug Dooley, Data Theorem COO.” 

Cloud Secure now also offers a new UI design that improves the end-to-end CNAPP workflow for organizations with new dashboard, inventory, security testing, and cloud-native protection sections. For example, the Cloud-Native Protection visualization graph with Cloud Abuse highlights priority events, actors, and attack path analysis that uniquely helps organizations diagnose near real-time data breaches and attempts at exfiltration attacks. In addition, Cloud Secure’s Enhanced Compliance Summary section with status and on-demand reporting downloads automates the audit processes to help organizations prove compliance.

Related posts

Securonix Onboards Dipesh Kaura as Head of India Sales

enterpriseitworld

Zoho Corp’s Qntrl Launches New Capabilities

enterpriseitworld

Vertiv Predicts Industry Efforts to Support, Enable, Leverage and Regulate AI

enterpriseitworld