Skyhawk Introduces Interactive Cloud Threat Detection To Enable Multi-Factor Cloud Native Zero Trust


(MENAFN- GlobeNewsWire - Nasdaq) LAS VEGAS, Dec. 02, 2024 (GLOBE NEWSWIRE) -- AWS re:Invent 2024 - Skyhawk Security , the originator of cloud threat detection and response (CDR), is adding an Interactive Cloud Threat Detection and Response capability to its groundbreaking platform. The new capability adds real-time user interaction to verify suspicious activity of both human and non-human identities (NHIs) that are the root cause of an alert. This closes context gaps between SOCs, cloud teams and identity owners, which reduces the load on the SOC, dramatically shortens Mean Time to Respond (MTTR), better protects against cloud breaches and aligns with zero trust frameworks.

Typically, there is very little context when a real-time alert comes into the SOC, along with hundreds of others, as part of the threat detection flow. This makes it difficult for the team to understand if a legitimate user's anomalous activity or an attacker's activity triggered the alert. Today 70% of attacks and data breaches in the cloud involve stolen or leaked identity credentials, in which hackers use compromised logins without penetrating the cloud infrastructure security.

To cut through this confusion, Skyhawk continuously monitors cloud asset behaviors, including users, roles, machines, functions and more. If a behavior deviates from the norm, the new Interactive CDR automatically sends a notification to the user owning the asset or identity, asking them to authorize and validate the activities that triggered the alert. This aligns with zero trust and the core concept of CDR's detection flow, which happens regardless of the user's role or location, even inside the network, eliminating the assumption that users inside the perimeter are trustworthy.

Interactive CDR goes to the source via a different factor not connected to the cloud nor the enterprise identity, which may be compromised, adding a multi-factor layer of verification. The response gives the SOC the missing context from the best source of information – the owner of the asset or the user who is supposedly executing these activities in the cloud.

Putting the suspected source in the loop quickly verifies whether the activity is legitimate or indicates compromised credentials, aligning with the zero trust principle of“never trust, always verify.” The results make threat detection crowd sourced, thus more accurate, shortens MTTR to seconds, reduces the load on the SOCs, puts focus on the real threats and helps prevent breaches.

The groundbreaking Interactive CDR technology is built on an AI agent framework that decides the best interactive action to take in each case. End-user interaction notifications can leverage existing enterprise applications, including Teams and Slack, or a dedicated Skyhawk mobile application. The capability to automatically respond, such as by disabling an identity and its sessions, provides immediate containment strategies, preventing the potential lateral movement of malicious actors and reducing the risk of a breach.

Other advantages of interactive response include:

  • Faster MTTR: Faster incident resolution through enhanced user engagement to secure accounts and a stronger, more efficient defense against cloud data breaches
  • Interactive Protection: Real-time distributed detection and verification of activities verified with the source or owner, reducing the window of opportunity for attackers to exploit compromised credentials or vulnerabilities
  • Minimized Disruption: Legitimate actions are quickly cleared, avoiding unnecessary investigations, allowing the SOC to focus on real suspicious activities to immediately address
  • Improved Security Efficiency: Security teams can focus on actual threats, as context-aware false positives are resolved quickly through user verification, reducing manual investigation efforts
  • Added on top of Skyhawk's Proactive CDR: Proactive CDR helps pre-verify scenarios that are agreed to be malicious and their response. The new capability adds another protection mechanism on top

“Skyhawk's Interactive Cloud Threat Detection is a powerful new capability and a result of our continuous innovation and commitment to prevent cloud breaches for our many customers,” said Chen Burshan, CEO of Skyhawk Security.“Interactive CDR, when combined with our proactive CDR, which helps prepare for incidents before they occur, interactively adds context when alerts do occur. It bridges the gap between SOC and cloud teams, adds real-time activity context and closes the gap between threat exposure and threat management in a single comprehensive, synergetic platform.”

Organizations interested in learning more about interactive response can visit Skyhawk's website . To learn more about Skyhawk Security's comprehensive product offering, visit . For continuing updates follow Skyhawk Security on LinkedIn and Twitter .

About Skyhawk Security
Skyhawk Security is the originator of Cloud Threat Detection and Response (CDR), leveraging a multi-layer AI-based approach to identify and stop cloud threats before they become breaches. Skyhawk revolutionizes CDR with its Continuous Proactive Protection , an AI-powered Autonomous Purple Team, enabling security teams to take a proactive approach to cloud security for the very first time. Led by a team of cyber security and cloud professionals who built the original CSPM category, Skyhawk's platform evolves cloud security posture management far beyond scanning and static configuration analysis, continuously adapting and improving threat detection so that it is always aligned with the cloud architecture. Skyhawk Security is a spin-off of Radware® (NASDAQ:RDWR).

Media Contact:
Sherlyn Rijos-Altman
Montner Tech PR
...


MENAFN02122024004107003653ID1108946732


GlobeNewsWire - Nasdaq

Legal Disclaimer:
MENAFN provides the information “as is” without warranty of any kind. We do not accept any responsibility or liability for the accuracy, content, images, videos, licenses, completeness, legality, or reliability of the information contained in this article. If you have any complaints or copyright issues related to this article, kindly contact the provider above.