Advanced Exposure Investigation and AI-Powered Remediation Capabilities Now Available 

 

TEL AVIV – March 28, 2024 – Stream.Security, a leading platform for cloud solutions specializing in real-time digital twin technology, announced today the release of new advanced threat investigation and AI-powered remediation capabilities. The new real-time attack path detection and generative artificial intelligence (AI)-powered remediation tools are part of the industry-shaping, real-time exposure management features that the cloud security company is rolling out. With these capabilities, customers can see all aspects of a potential cloud attack instantly and map ways to prevent it, resulting in faster time to response (reducing MTTR). 

 

“We’re excited to share these new features with our customers today,” said Or Shoshani, CEO and co-founder of Stream.Security. “Without this technology, users would need to combine individual SIEM, threat detection and configuration management tools to identify attacks, leaving security teams to connect the dots. The features we’re launching today are designed to detect, analyze and patch flaws in the cloud environment in one platform, making it easier for security teams to react immediately and unveil the adversary intent and harder for cyber attackers to compromise an organization’s cloud infrastructure. We look forward to finding more unique ways to create solutions that keep our customers’ clouds safe.”  

 

Cloud infrastructures are facing increased pressure as the frequency and severity of attacks continue to grow. Hackers worldwide find new ways, like generative AI, to steal cloud data, holding it for ransom and propagate attacks faster than ever. Stream.Security’s new features map out potential attacks per every change in the environment, gather insights, investigate threatening activities and take steps to remediate any issues, preventing attacks before they can occur, eliminating the need to conduct a new scan to unveil the changes impact.  

 

The solution’s latest suite of capabilities include: 

 

  • Real-Time Attack Path Detection – This innovative feature provides immediate insights into potential attack scenarios upon any configuration change that exposes a vulnerable asset. Unlike traditional solutions requiring an additional scan, Stream.Security’s real-time attack path graph instantly detects all possible exposures upon every change in their cloud, enabling security teams to manage their exposure in real-time. 

 

  • Generative AI-powered Remediation– Stream.Security leverages the power of generative AI to suggest remediation steps for any security flaw detected in the cloud environment. This feature significantly reduces Mean Time to Remediate (MTTR) by automatically generating tailored solutions, allowing security teams to address vulnerabilities as they arise with precise remediation steps. 

This latest suite of next-gen AI-powered capabilities set the stage for what’s to come from Stream, which announced its move from DevOps to SecOps in November of 2023, launching its Cloud Twin technology and taking the industry by storm. The organization is slated to share more product and feature news in 2024.  

For more information on the latest capabilities released by Stream, click here.  

 

About Stream.Security 

 

Stream.Security, formerly known as Lightlytics, is a leading platform for cloud solutions specializing in real-time cloud twin technology. The platform constantly models enterprises’ cloud environments to pinpoint how threats emerge and demystifies the impact of remediating them instantly. 

 

Media Contact 

Sam Aurilia  

Touchdown PR 

streamsecurity@touchdownpr.com 

The post Stream.Security Releases Suite of Next-Gen Features appeared first on Cybersecurity Insiders.

The cybersecurity industry has been rapidly transforming for well over a decade. With threat actors rapidly finding unique ways to expose vulnerabilities, organizations are constantly seeking the latest technology to protect their proprietary information, such as Intrusion Detection Systems (IDS) or Security Information and Event Management (SIEM). In recent years, the shift to cloud infrastructure has presented a new obstacle for cybersecurity experts’ threat detection and response toolkit.

From SIEM to Cloud

In the early aughts, IT pros interested in having a precise log of events across their systems invested in SIEM. SIEM tools offer on-premises monitoring capabilities with real-time insights for these IT teams. This software can log and manage events, provide analyses, and store information, and it still exists today.

As the technology industry grew, cloud computing became more common. Moving data and tech infrastructure into the cloud became a significant priority for many organizations. Most companies broadened their SIEM reach into the cloud to keep up with technology and monitor the events occurring within, but there was a deep contrast between the on-premises and cloud environments, involving more strategic coordination.

Keeping Up With The Cloud

The cloud is a new space involving careful, research-based adjustments to reduce significant consequences. While SIEM was able to provide real-time insights for IT teams, it simply couldn’t accurately offer predictive results to users, focusing solely on the “what” rather than the “so what.”

Security teams investigating concerning activities must focus on the “so what” to evaluate the potential impact threat activity can present to an organization. SIEM technology is unclear to many, and assigning specific assets to team members can lead to misunderstandings. Security teams using SIEM require more legwork to identify risk by mapping permissions, putting up safety precautions, and determining motives.

As a result of the effort required to use SIEM for security, there is a further cost to the organization in the form of time. Investigations have the potential to take hours or days, and inaccuracies can be extremely risky. Attackers gaining access to specific databases and exposing them online present detrimental ramifications to a business. Because of this challenge, security, and operations (SecOps) teams must evaluate the impact of each adjustment made in the cloud. The ability to accurately and promptly investigate events is rare, which leads teams to choose between ignoring suspicious events or spending time and resources on proper investigation.

CDR Solutions

The resolution to this predicament is Cloud Detection and Response (CDR), which spans beyond the limitations presented by SIEM solutions used in the cloud. CDR solutions streamline processes to give security teams the necessary information rather than an overwhelming log of events. These systems analyze the impact of events within the cloud, predicting potential effects for teams to save time and remain focused on the most critical parts of the cloud security system.

In order to address these security issues and the broader shift to CDR, Stream Security announced a significant expansion into the cloud security space. By analyzing potential threats, considering identifying exposures, unveiling security gaps and assessing the impact of their remediation efforts, Stream Security enables improved collaboration between security and operations teams with precise insights into their cloud environment.

With this expansion, Stream Security is giving their proprietary Cloud Twin technology a major upgrade that empowers security and operations teams to detect and investigate their exposure and threats. Cloud Twin models evaluate the environmental posture continuously, offering real-time insights into data traffic and correlating this information to each organization’s unique needs and guardrails. Intended for a dynamic cloud environment, Cloud Twin technology provides security and DevOps teams with the tools to detect threats and exposure without inaccuracies, allowing operations teams to react quickly.

Stream Security’s tech is currently the only known solution of its kind to map cloud dependencies in real-time. The update to their solution comes with significant new features, including Azure Integration, Vulnerability Correlation, and Threat Anomaly Detection.

Image by rawpixel.com on Freepik

The post Stream Security Takes on CloudSecOps appeared first on Cybersecurity Insiders.