TownNews.com Content Exchange

WALTHAM, Mass., Jan. 13, 2021 /PRNewswire/ -- Uptycs, a leader in SQL-powered security analytics, announced today its advanced cloud security and compliance offering. The Uptycs Security Analytics Platform now provides its customers security and compliance for their AWS deployments. The new capabilities supply analytics for configuration, CloudTrail activity and VPC Flow Logs, which enable security teams to measure their posture and observe cloud provider activity alongside their cloud workload and endpoint activity all in one platform. The AWS analytics give security and compliance teams an end-to-end view of cloud accounts, services, and workloads. Security operations can now easily audit and spot misconfigurations and vulnerabilities, understand identity and configuration governance, meet compliance reporting requirements, and detect and investigate potential threats in their AWS cloud environments.

"Organizations continue to ramp up their cloud workloads and use of AWS services, where getting visibility into resources and assets across all their accounts is a high priority," said Ganesh Pai, CEO, Uptycs. "Security teams also need to implement controls representing best practices to reduce the risk of data leakage, resource hijacking and account takeover. Bottom line is that what you can't see, you can't secure. With the Uptycs Security Analytics Platform, now in one place, security teams can get answers to questions about their entire cloud infrastructure on AWS, including anything related to cloud resource usage, threats against those resources, and their cloud service configurations."

According to the (ISC) 2 2020 Cloud Security Report, the most worrisome security threats facing public clouds are misconfiguration of the cloud platform (68%), unauthorized access (58%), insecure APIs (52%), and account hijacking (50%). The Uptycs AWS security offering empowers teams to address these challenges by:

  • Equipping their organizations with instant inventory visibility for AWS assets, resources, and services. Users can group and tag their cloud-based assets and resources across accounts, and then run ad hoc queries and reports for information such as service configurations.
  • Ensuring that their AWS resources across accounts adhere to best practices. Uptycs alerts security teams to risks such as insecure configurations, tracks configuration history, and provides essential information that allows engineers to quickly remediate issues such as MFA for users, CloudTrail logging on resources, and unauthorized API activity.
  • Monitoring compliance of the entire AWS environment to CIS Benchmarks, SOC 2, and other standards. Users can view summary visualizations of their compliance posture and have the ability to drill down into non-compliant resources, associated evidence, and remediation guidance.
  • Detecting and investigating threats against AWS infrastructure, including credential misuse. Uptycs matches IPs and domains from AWS VPC Flow Logs against its threat intelligence platform to detect threats in the cloud. Uptycs also makes it easy for security teams to trace user activity during incident investigation with AWS CloudTrail log data. Finally, Uptycs analyzes IAM policy rules to help security teams implement and monitor least-privilege policies.

"As a cloud-based company running on AWS, finding a platform to solve all of our security needs across all of our accounts and services was a top priority," said Kevin Paige, CISO, Flexport. "But finding a single solution that could solve for audit and inventory of our cloud assets, as well as endpoint detection and response, was a challenge — until we found Uptycs. Now we're able to do more with less, and save time, while maintaining a strong cloud security posture."

About Uptycs
Uptycs provides a SaaS and on-prem SQL-powered security analytics platform for security analysts, site reliability engineers, incident response teams, and IT professionals to observe and secure their productivity endpoints (macOS, Windows), server endpoints (Linux, containers) and cloud providers. A growing number of enterprises are using Uptycs for comprehensive security visibility at scale. Common use cases include fleet visibility, intrusion detection, vulnerability management, audit, and compliance for their laptops, servers, and cloud workloads.

Learn more about Uptycs: https://www.uptycs.com

This article originally ran on curated.tncontentexchange.com.

TownNews.com Content Exchange

(0) comments

Welcome to the discussion.

Keep it Clean. Please avoid obscene, vulgar, lewd, racist or sexually-oriented language.
PLEASE TURN OFF YOUR CAPS LOCK.
Don't Threaten. Threats of harming another person will not be tolerated.
Be Truthful. Don't knowingly lie about anyone or anything.
Be Nice. No racism, sexism or any sort of -ism that is degrading to another person.
Be Proactive. Use the 'Report' link on each comment to let us know of abusive posts.
Share with Us. We'd love to hear eyewitness accounts, the history behind an article.