Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


09:05 AM
Connect Directly

Adaptive Shield Emerges From Stealth

Israeli startup joins growing number of vendors offering platform for detecting and mitigating common configuration errors in cloud environments.

Numerous organizations have experienced major data breaches in recent years because of security configuration errors in their cloud applications.

A research report by Divvy Cloud earlier this year estimated as many as 33.4 billion records were exposed in breaches resulting from misconfigured cloud apps and services in 2018 and 2019 alone. Each year, the number of records exposed via such breaches has increased despite heightened awareness of the issue. Gartner estimates that through 2025, 99% of all breaches in the cloud will result from customer mistakes.

The trend has spawned the emergence of a relatively new category of security tools known as Cloud Security Posture Management (CSPM) or SaaS Security Posture Management (SSPM).

The newest entrant to that market category is Adaptive Shield, an Israel-based startup that this week emerged from stealth mode with $4 million in venture funding. Like the rapidly growing number of other vendors in the general space, Adaptive Shield's platform is designed to help organizations proactively find and address misconfigurations in their SaaS environment that could lead to exposing data.

The company claims that its technology can be deployed in minutes and can be used to automate discovery of configuration errors; to continuously monitor for them; and to provide alerts when potential new issues are discovered.

Maor Bin, co-founder and CEO of Adaptive Shield, says businesses today run nearly every facet of their operations on a wide array of interconnected cloud services. "The problem is that even though SaaS providers have been improving their native security capabilities and controls, each has its own security model and settings," Bin notes. "This makes maintaining a consistent policy across platforms, business units, and user groups an uphill battle."

Common Configuration Errors

According to Bin, the most common security problems resulting from poorly configured SaaS environments include: a failure by SaaS administrators to require multi-factor authentication for system owners and super users; the use of shared mailboxes for financial, customer, and other sensitive information; and overly permissive access for external users.

Other common security lapses include a failure to turn on auditing or logging functions for monitoring user and system activity, and leaving sensitive dashboards, forms, discussions, and other data publicly exposed and accessible over the Internet.

In many cases, SaaS platforms offer a wide range of built-in security configurations to minimize risk to enterprise data. But security teams can get overwhelmed trying to manage the settings across all of their apps, he notes.

Bin says aside from identifying and discovering configuration errors, the platform also can help speed up the remediation process. "Every issue that is presented in the platform comes with a remediation plan — step-by-step instructions on how to fix the issue," he says. Adaptive also offers automation in terms of transmitting configuration error details to the change board, and a remediation bot that performs automated fixes for simple configuration errors. The platform can be integrated with a SIEM to report configuration drifts, users who are violating policy, and other potential security issues.

Other vendors who offer similar SaaS security posture management and continuous compliance capabilities include AppOmni and Obsidian Security, for example, Bin says.

AppOmni has so far raised $13 million in funding from a multiple venture capital firms. The company has described its platform as a "Rosetta Stone" for translating and enforcing an organization's current security policies and configurations in the cloud. Obsidian, founded by former executives at Carbon Black, Cylance, AWS, and other companies, so far has raised close to $30 million in funding from an array of venture partners including Greylock and GV, a venture firm belonging to Google parent Alphabet.

Several other vendors, including Orca Security, Zscaler, Bitglass, Fugue - which has raised some $70 million in VC funding - and others, offer capabilities for cloud security posture-management.

Related Content:

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year ... View Full Bio

Recommended Reading:

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 9/21/2020
Hacking Yourself: Marie Moe and Pacemaker Security
Gary McGraw Ph.D., Co-founder Berryville Institute of Machine Learning,  9/21/2020
Startup Aims to Map and Track All the IT and Security Things
Kelly Jackson Higgins, Executive Editor at Dark Reading,  9/22/2020
Register for Dark Reading Newsletters
White Papers
Current Issue
Special Report: Computing's New Normal
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
How IT Security Organizations are Attacking the Cybersecurity Problem
How IT Security Organizations are Attacking the Cybersecurity Problem
The COVID-19 pandemic turned the world -- and enterprise computing -- on end. Here's a look at how cybersecurity teams are retrenching their defense strategies, rebuilding their teams, and selecting new technologies to stop the oncoming rise of online attacks.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-09-24
An XSS issue in Joplin desktop 1.0.190 to 1.0.245 allows arbitrary code execution via a malicious HTML embed tag.
PUBLISHED: 2020-09-24
SQL injection exists in the jdownloads 3.2.63 component for Joomla! com_jdownloads/models/send.php via the f_marked_files_id parameter.
PUBLISHED: 2020-09-24
A vulnerability in Cisco Aironet Access Points (APs) could allow an unauthenticated, remote attacker to cause a denial of service (DoS) on an affected device. The vulnerability is due to improper resource management while processing specific packets. An attacker could exploit this vulnerability by s...
PUBLISHED: 2020-09-24
A vulnerability in the DHCP message handler of Cisco IOS XE Software for Cisco cBR-8 Converged Broadband Routers could allow an unauthenticated, remote attacker to cause the supervisor to crash, which could result in a denial of service (DoS) condition. The vulnerability is due to insufficient error...
PUBLISHED: 2020-09-24
A vulnerability in the Umbrella Connector component of Cisco IOS XE Software for Cisco Catalyst 9200 Series Switches could allow an unauthenticated, remote attacker to trigger a reload, resulting in a denial of service condition on an affected device. The vulnerability is due to insufficient error h...