Security News > 2021 > April > Ermetic platform detects suspicious activity and prevents security threats in multicloud environments
Ermetic announced a new version of the Ermetic platform that continually monitors the access behavior of user and machine identities to detect suspicious activity and prevent security threats.
The new capabilities enable organizations to protect against unusual data access, suspicious configuration changes, privilege escalation and more, in multicloud environments.
Using analytics-driven policies, Ermetic continuously analyzes access behavior, creates a baseline for every identity and monitors for anomalous activity in AWS, Microsoft Azure, and Google Cloud Platform.
"Detecting suspicious access, privilege escalation or infrastructure configuration changes across thousands of identities in cloud platforms is manually impossible," said Sivan Krigsman, Chief Product Officer for Ermetic.
"Our unique combination of advanced analytics and granular visibility into access, entitlements and infrastructure configuration changes allows us to identify, alert on and respond to anomalies in expected behavior with very few false positives."
The new version of the Ermetic platform with anomaly detection is available immediately from Ermetic and its business partners worldwide.
News URL
http://feedproxy.google.com/~r/HelpNetSecurity/~3/vihIxHhKxFg/
Related news
- Obsidian Security Warns of Rising SaaS Threats to Enterprises (source)
- Eliminating AI Deepfake Threats: Is Your Identity Security AI-Proof? (source)
- AWS security essentials for managing compliance, data protection, and threat detection (source)
- Strategies for CISOs navigating hybrid and multi-cloud security (source)
- Privileged Accounts, Hidden Threats: Why Privileged Access Security Must Be a Top Priority (source)
- Enhancing visibility for better security in multi-cloud and hybrid environments (source)