Connect with us

Hi, what are you looking for?

HEADLINES

Sophos unveils advancements to Sophos Cloud Optix

Sophos unveiled advancements to Sophos Cloud Optix that automate and simplify the detection and response of cloud security vulnerabilities and misconfigurations to reduce risk exposure.

Sophos unveiled advancements to Sophos Cloud Optix that automate and simplify the detection and response of cloud security vulnerabilities and misconfigurations to reduce risk exposure.

Cloud Optix is easily managed on the unified cloud-based Sophos Central platform alongside Sophos’ entire portfolio of next-generation cybersecurity solutions – including Sophos’ endpoint, network, mobile, Wi-Fi, email and encryption products. Real-time information sharing and threat response on Sophos Central empowers organizations to improve threat detection and response times, simplify investigations and minimize threat impact.

Cloud Optix answers a critical market need for cloud security through unmatched visibility into risky blind spots. Using artificial intelligence to automate detection of cloud architecture vulnerabilities and misconfigurations, security teams gain complete visibility into everything they have in the cloud as well as the ability to respond and remediate security risks in minutes. Available in AWS Marketplace, Cloud Optix provides automatic discovery of an organization’s assets across Amazon Web Services (AWS) and multi-cloud environments.

Here are the new features and capabilities of Cloud Optix:

  • Accelerate threat investigation: Cloud Optix transforms the visualization of AWS infrastructure, so organizations can identify and eliminate hidden security threats. Cloud Optix now extends support for the newly launched Amazon Detective with interactive and intuitive data about potential threats, such as failed login attempts and suspicious API calls across AWS workloads 
  • Identify Kubernetes security vulnerabilities: Amazon Elastic Kubernetes Service (Amazon EKS) clusters and native Kubernetes deployments are now tracked by Cloud Optix, providing comprehensive inventory and visualization of clusters, nodes, node pools, pods, containers and more; New security benchmark checks enable organizations to continuously assess the security posture of their container orchestration platform
  • Detect cloud spend abnormalities: New security-focused cloud spend monitoring capabilities flag unexpected abnormalities potentially indicative of abuse, so organizations can take action. Cloud Optix monitors daily cloud spend and identifies unusual activity, highlighting top environments and services by spend with customizable spend threshold alerts
  • Detect unintended public or cross-account access: Integration with the new AWS Identity and Access Management (IAM) Access Analyzer provides detail and context needed to quickly determine whether resource policies have been misconfigured to allow unintended public or cross-account access
  • Secure cloud traffic: Extending security to the network, Sophos UTM support for the new Amazon Virtual Private Cloud (VPC) Ingress Routing, ensures traffic flowing in and out of VPCs and other virtual appliances is secure. With the new ability to restrict north-south traffic, Sophos provides an added layer of protection to secure cloud infrastructure

Advertisement
Advertisement
Advertisement

Like Us On Facebook

You May Also Like

HEADLINES

Smart and its value brand TNT do not send text messages with clickable links. If you receive one—even if it looks like it’s from...

HEADLINES

Bringing more than 25 years of experience in enterprise technology, sales leadership, and channel management, Selamat is well-positioned to enhance Sophos’ partner-driven approach and...

White Papers

n the Philippines, industry players are taking a more proactive approach to building a security framework for digital resilience.

HEADLINES

This marks the company’s first participation in the region’s premier tech event, where it will showcase its groundbreaking cybersecurity solutions to industry leaders, innovators,...

HEADLINES

A report found that the primary way attackers gained initial access to networks (56% of all cases across MDR and IR) was by exploiting...

White Papers

The Department of Information and Communications Technology (DICT) reports that government agencies, academic institutions, and telecommunications companies remain prime targets for cyber criminals, with...

HEADLINES

The exploit, discovered by Kaspersky’s Global Research and Analysis Team (GReAT), required no user interaction beyond clicking a malicious link and demonstrated exceptional technical...

HEADLINES

At the end of 2023, Sophos X-Ops noted a significant increase in ‘remote encryption’ attacks – where ransomware attackers breach a compromised and often...

Advertisement