Cloud Security

Uptycs Strengthens Cloud Security Offering with CDR

New Detection Capabilities Focus on Cloud Exploitation Tactics, Automatically Correlating Events to Reduce Alert Noise and Give Analysts Greater Context

Uptycs, provider of the first cloud-native security analytics platform enabling cloud and endpoint security from a common solution, today announced new cloud detection and response (CDR) capabilities for detecting and remediating sophisticated attacks against cloud infrastructure. The new CDR feature will help organizations quickly detect malicious behaviors such as discovery, privilege escalation, remote code execution, and data exfiltration in their AWS cloud environment.

Attackers that have cloud credentials typically need to discover what is in the environment and escalate their privileges before they can achieve their goal, whether stealing data, installing coin mining software, or deploying ransomware. As they go about reconnoitering the environment and move laterally their activity is frequently logged, but someone with cloud security expertise needs to examine the sequence of events to discern malicious behavior. The new Uptycs CDR capabilities automate this analysis, alerting cloud security teams to attacks in progress.

“Threat actors today have become cloud experts. Their tactics and techniques are evolving quicker than most want to believe. When (not if) a threat actor steals credentials to your cloud environment, time is of the essence to detect their activity before they achieve their goal,” says Andre Rall, Director of Cloud Security at Uptycs. “The new CDR function in Uptycs evens the playing field for defenders, giving them automated expertise so they can detect and respond to these sophisticated threats.”

“Detection and response capabilities are essential to reducing risk and securing cloud infrastructure,” says Ganesh Pai, Co-Founder and CEO at Uptycs. “Our vision is to enable companies to innovate with cloud-native applications in a secure manner. That means securing the entire cloud-native application lifecycle, from the point where the code is written on developers’ laptops to the application workload run in the cloud. CDR plays a critical role, providing security teams with the ability to quickly detect stealthy attacks against cloud infrastructure as they unfold.”

Unlike other products announced to the market, Uptycs CDR detections correlate discrete events so that alerts are only fired when there is a high-confidence of malicious behavior. For example, Uptycs correlates together the following sequence of events into a single privilege escalation detection:

  1. Using stolen credentials, the attacker uses the CLI and retrieves details about the user whose credentials they’ve stolen
  2. The attacker lists the policies attached to that user, along with the number of versions of those policies
  3. The attacker gets details about previous policy versions to find one that has elevated privileges
  4. The attacker elevates their privileges by reverting to the previous policy version with elevated privileges

Read the Uptycs blog to learn more about how Uptycs automates the analysis of malicious cloud behavior.

The new CDR functionality is included in the Uptycs cloud security offering and is currently available for AWS. Visit the Uptycs booth at AWS re:Inforce (#317) to view a demo of its cloud security offering including CDR.

Visit AITechPark for cutting-edge Tech Trends around AI, ML, Cybersecurity, along with AITech News, and timely updates from industry professionals!

Related posts

Cloud Security Outlook 2023: ManageEngine

Business Wire

Cloud Inventory® Recognized for Excellent Security with Veracode

PR Newswire

zeroRISC launches with $5 Million in Seed Funding

Business Wire