Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Cloud

10/27/2020
09:00 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Red Canary Enters Cloud Workload Protection Space

Red Canary Cloud Workload Protection secures cloud environments with a lightweight sensor, proven threat detection platform, and security expertise

DENVER, Oct. 27, 2020 (GLOBE NEWSWIRE) -- 

Red Canary, a leading provider of security operations solutions, announced the launch of Red Canary Cloud Workload Protection, a cloud workload protection (CWP) solution that provides visibility and threat detection for security and DevOps teams. This new solution is purpose-built for cloud Linux workloads, focuses on runtime threat protection and response, and integrates seamlessly into DevOps workflows without sacrificing system performance and reliability.

Key Quote(s):

Joren McReynolds, General Manager for CWP, Red Canary
“Most businesses don’t have an effective solution in place to identify compromises or adversary activity in their cloud environments. Great advances have been made in preventive controls and risk identification, but little traction has been made in threat detection outcomes. The market is ready for a product focused on this core area that will deliver exceptional results.”

Zachary Braun, Senior Manager of Security Operations and NOC, Ionic Security
“Ionic Security has a large, fast moving, and diverse cloud environment that has challenged existing security toolsets. Having used Red Canary’s CWP product for over a year now, we can happily say that CWP supports our diverse configurations with minimal performance impact, and it’s supported by the same passionate and knowledgeable resources behind all of Red Canary’s offerings.”

Explore Red Canary Cloud Workload Protection

Red Canary Cloud Workload Protection Overview:

  • Red Canary Cloud Workload Protection offers continuous collection and analysis of telemetry across physical, virtual, and containerized workloads.
  • The product provides a consolidated view of a customer’s entire cloud ecosystem, identifies potential risks and confirms threats to be actioned.
  • The lightweight, cloud-ready sensor is optimized for Linux with support for nearly all distributions, and can be deployed on all workload types, in AWS, Google Cloud and Azure - with minimal impact on CPU, memory, or stability.
  • Cloud Workload Protection continuously monitors processes, network traffic, and DNS alongside memory and runtime code integrity for all workloads in a single platform.
  • Cloud Workload Protection delivers confirmed threats with rich context, mapped to the latest MITRE ATT&CK® techniques so customers can take informed action.
  • Red Canary Cloud Workload Protection automatically locates unprotected workloads in your environment with workload discovery tools.
  • Red Canary Cloud Workload Protection offers a frictionless, free trial as the gateway to a forever-free telemetry collection solution, an enterprise SaaS product that provides high-fidelity threat alerts, or a fully-managed service delivering detailed, confirmed detections.

Additional Resources

About Red Canary

Red Canary is a security ally enabling every organization to make its greatest impact without fear of cyber-attack. The company provides outcome-focused solutions for security operations teams, who rely on Red Canary to analyze and respond to endpoint telemetry, manage alerts across the network, and provide cloud environment runtime threat detection. With Red Canary, security teams can make a measurable improvement to security operations within minutes. Learn more, visit RedCanary.com.

Social Media: Twitter | LinkedIn | YouTube

 

Media Contact Information
LeVar Battle
Senior Communications Manager
[email protected]
303-945-6425

 
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
News
FluBot Malware's Rapid Spread May Soon Hit US Phones
Kelly Sheridan, Staff Editor, Dark Reading,  4/28/2021
Slideshows
7 Modern-Day Cybersecurity Realities
Steve Zurier, Contributing Writer,  4/30/2021
Commentary
How to Secure Employees' Home Wi-Fi Networks
Bert Kashyap, CEO and Co-Founder at SecureW2,  4/28/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-31793
PUBLISHED: 2021-05-06
An issue exists on NightOwl WDB-20-V2 WDB-20-V2_20190314 devices that allows an unauthenticated user to gain access to snapshots and video streams from the doorbell. The binary app offers a web server on port 80 that allows an unauthenticated user to take a snapshot from the doorbell camera via the ...
CVE-2021-31916
PUBLISHED: 2021-05-06
An out-of-bounds (OOB) memory write flaw was found in list_devices in drivers/md/dm-ioctl.c in the Multi-device driver module in the Linux kernel before 5.12. A bound check failure allows an attacker with special user (CAP_SYS_ADMIN) privilege to gain access to out-of-bounds memory leading to a syst...
CVE-2021-31918
PUBLISHED: 2021-05-06
A flaw was found in tripleo-ansible version as shipped in Red Hat Openstack 16.1. The Ansible log file is readable to all users during stack update and creation. The highest threat from this vulnerability is to data confidentiality.
CVE-2019-25043
PUBLISHED: 2021-05-06
ModSecurity 3.x before 3.0.4 mishandles key-value pair parsing, as demonstrated by a "string index out of range" error and worker-process crash for a "Cookie: =abc" header.
CVE-2020-18889
PUBLISHED: 2021-05-06
Cross Site Request Forgery (CSRF) vulnerability in puppyCMS v5.1 that can change the admin's password via /admin/settings.php.