Security News

ePlus announced that it has strengthened its Managed Cloud Security Service portfolio by adding a market-leading managed detection and response solution to its lineup of capabilities. Utilizing Alert Logic MDR, ePlus can offer organizations an additional option to secure their cloud deployments, one that includes continuous threat monitoring and cutting-edge threat intelligence, enabling complete visibility across an organization's IT estate.

Trend Micro announced that its hybrid cloud security offerings have received the AWS Outposts Ready designation, part of the Amazon Web Services Service Ready Program. Teams using Trend Micro for their hybrid cloud security benefit from a truly consistent hybrid experience that combines the agility, breadth of services, and pace of innovation of AWS with seamless security protection across an enterprise infrastructure.

With these capabilities, Oracle is the only cloud service provider to offer a cloud security posture management dashboard at no additional cost, with numerous pre-built tools that automate response to reduce customer risk quickly and efficiently. Oracle Maximum Security Zones and Oracle Cloud Guard embed decades of enterprise security expertise and best practices into the Oracle public cloud in an autonomous fashion, accelerating customers' ability to ramp up to their cloud estate securely from inception.

You need to recognize the most critical cloud security challenges and develop a strategy for minimizing these risks. With that in mind, let's dive into the five most pressing cloud security challenges faced by modern organizations.

The latest release includes considerable security improvements to their Cloud PAM application, bolstering one of the only solutions to converge Identity Governance, Application Governance-Risk Management-and Compliance, and Privileged Access Management into a unified Identity Platform built for the cloud. The latest release of Saviynt's Cloud PAM provides improved governance, analytics, and access to privileged assets across enterprise applications and platforms including Google Cloud Platform.

Trend Micro has demonstrated the strength of its collaboration with AWS since 2012 with a deep understanding of customer use cases and by integrating with leading AWS security services at launch. Most recently, Trend Micro Cloud One offerings have been natively integrated with AWS Control Tower and AWS Systems Manager Distributor.

SecurityWeek will host its 2020 Cloud Security Summit virtual event on Thursday, August 13, 2020. Through a fully immersive virtual environment, attendees will be able to interact with leading solution providers and other end users tasked with securing various cloud environments and services.

SecurityWeek will host its 2020 Cloud Security Summit virtual eventon Thursday, August 13, 2020.

There are unrealized gaps between the rate of implementation or operation and the effective use of cloud security access brokers within the enterprise, according to a global Cloud Security Alliance survey of more than 200 IT and security professionals from a variety of organization sizes and locations. "CASB solutions have been underutilized on all the pillars but in particular on the compliance, data security, and threat protection capabilities within the service," said Hillary Baron, lead author and research analyst, Cloud Security Alliance.

The public cloud provides great flexibility and cost management for organizations, but what about security?