Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Cloud

10/27/2020
09:00 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Red Canary Enters Cloud Workload Protection Space

Red Canary Cloud Workload Protection secures cloud environments with a lightweight sensor, proven threat detection platform, and security expertise

DENVER, Oct. 27, 2020 (GLOBE NEWSWIRE) -- 

Red Canary, a leading provider of security operations solutions, announced the launch of Red Canary Cloud Workload Protection, a cloud workload protection (CWP) solution that provides visibility and threat detection for security and DevOps teams. This new solution is purpose-built for cloud Linux workloads, focuses on runtime threat protection and response, and integrates seamlessly into DevOps workflows without sacrificing system performance and reliability.

Key Quote(s):

Joren McReynolds, General Manager for CWP, Red Canary
“Most businesses don’t have an effective solution in place to identify compromises or adversary activity in their cloud environments. Great advances have been made in preventive controls and risk identification, but little traction has been made in threat detection outcomes. The market is ready for a product focused on this core area that will deliver exceptional results.”

Zachary Braun, Senior Manager of Security Operations and NOC, Ionic Security
“Ionic Security has a large, fast moving, and diverse cloud environment that has challenged existing security toolsets. Having used Red Canary’s CWP product for over a year now, we can happily say that CWP supports our diverse configurations with minimal performance impact, and it’s supported by the same passionate and knowledgeable resources behind all of Red Canary’s offerings.”

Explore Red Canary Cloud Workload Protection

Red Canary Cloud Workload Protection Overview:

  • Red Canary Cloud Workload Protection offers continuous collection and analysis of telemetry across physical, virtual, and containerized workloads.
  • The product provides a consolidated view of a customer’s entire cloud ecosystem, identifies potential risks and confirms threats to be actioned.
  • The lightweight, cloud-ready sensor is optimized for Linux with support for nearly all distributions, and can be deployed on all workload types, in AWS, Google Cloud and Azure - with minimal impact on CPU, memory, or stability.
  • Cloud Workload Protection continuously monitors processes, network traffic, and DNS alongside memory and runtime code integrity for all workloads in a single platform.
  • Cloud Workload Protection delivers confirmed threats with rich context, mapped to the latest MITRE ATT&CK® techniques so customers can take informed action.
  • Red Canary Cloud Workload Protection automatically locates unprotected workloads in your environment with workload discovery tools.
  • Red Canary Cloud Workload Protection offers a frictionless, free trial as the gateway to a forever-free telemetry collection solution, an enterprise SaaS product that provides high-fidelity threat alerts, or a fully-managed service delivering detailed, confirmed detections.

Additional Resources

About Red Canary

Red Canary is a security ally enabling every organization to make its greatest impact without fear of cyber-attack. The company provides outcome-focused solutions for security operations teams, who rely on Red Canary to analyze and respond to endpoint telemetry, manage alerts across the network, and provide cloud environment runtime threat detection. With Red Canary, security teams can make a measurable improvement to security operations within minutes. Learn more, visit RedCanary.com.

Social Media: Twitter | LinkedIn | YouTube

 

Media Contact Information
LeVar Battle
Senior Communications Manager
[email protected]
303-945-6425

 
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Oldest First  |  Newest First  |  Threaded View
Commentary
What the FedEx Logo Taught Me About Cybersecurity
Matt Shea, Head of Federal @ MixMode,  6/4/2021
Edge-DRsplash-10-edge-articles
A View From Inside a Deception
Sara Peters, Senior Editor at Dark Reading,  6/2/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-31811
PUBLISHED: 2021-06-12
In Apache PDFBox, a carefully crafted PDF file can trigger an OutOfMemory-Exception while loading the file. This issue affects Apache PDFBox version 2.0.23 and prior 2.0.x versions.
CVE-2021-31812
PUBLISHED: 2021-06-12
In Apache PDFBox, a carefully crafted PDF file can trigger an infinite loop while loading the file. This issue affects Apache PDFBox version 2.0.23 and prior 2.0.x versions.
CVE-2021-32552
PUBLISHED: 2021-06-12
It was discovered that read_file() in apport/hookutils.py would follow symbolic links or open FIFOs. When this function is used by the openjdk-16 package apport hooks, it could expose private data to other local users.
CVE-2021-32553
PUBLISHED: 2021-06-12
It was discovered that read_file() in apport/hookutils.py would follow symbolic links or open FIFOs. When this function is used by the openjdk-17 package apport hooks, it could expose private data to other local users.
CVE-2021-32554
PUBLISHED: 2021-06-12
It was discovered that read_file() in apport/hookutils.py would follow symbolic links or open FIFOs. When this function is used by the xorg package apport hooks, it could expose private data to other local users.