Learn Why an App-centric Approach Is Critical to Securing the Cloud
Presented by Doug Dooley, COO
Cloud security solutions must go beyond a focus on infrastructure only and provide full discovery and remediation of interconnected apps and APIs.
Watch as Doug Dooley, COO at Data Theorem, provides analysis on the future of cloud security. Doug explains how Data Theorem’s newest product, Cloud Secure, expands beyond CSPM’s protection of infrastructure and network to a more app-centric cloud workload protection (CWPP) approach to protect core assets like code and serverless functions through offensive and defensive toolkits. Specifically, you’ll learn:
-
How offensive and defensive hacker toolkits protect against attacks that exploit misconfigurations errors around authentication, authorization, and encryption
-
Why agents and gateways cannot protect your core cloud assets, such as code and microservices
-
How to automate discovery and remediation of cloud misconfiguration and vulnerabilities
-
How to simplify auditing and reporting around compliance and risk policies
-
Why a comprehensive attack surface management strategy is critical to protect all black box and grey box assets in one central analyzer engine