Data Theorem Launches Industry’s First App-Aware Full Stack Cloud Security Product

Cloud Secure Product Uniquely Combines Attack Surface Management, Cloud Security Posture Management and Defensive Protections to Prevent Cloud Data Breaches

Data Theorem Inc., today introduced the industry’s first application-aware full stack cloud security product with attack surface management (ASM) for protecting data in cloud-native apps, API services and serverless cloud functions. As Data Theorem’s latest product powered by its award-winning Analyzer Engine, Cloud Secure is available today to identify and remediate potential data breaches found in public cloud services used to power today’s modern web and mobile applications.

The explosion of applications built in the cloud creates new cloud data privacy concerns, but security tools and IT security practices have been slow to modernize for newer applications. Security professionals need better tools and software services for cloud data protection that provide automated end-to-end vulnerability assessment and remediation. The practices of manual pen-testing and consulting engagements do not keep pace with DevOps teams building and updating cloud-native applications.

According to IDC, “By 2023, more than 500 million digital apps and services will be developed and deployed using cloud-native approaches – the same number of apps developed in the last 40 years. Most of these will be targeted at industry-specific digital transformation use cases.”

Cloud Secure is the industry’s first solution delivering attack surface management security for cloud-native applications that starts at the client layer (mobile and web), protects the network layer (REST and GraphQL APIs), and extends down through the underlying infrastructure (cloud services). Its combination of attack surface management and defensive protections enables both offensive and defensive security capabilities to best prevent data breaches of cloud-native applications and serverless cloud functions.

Most enterprises today build applications with multiple third-party code sources and distribute their application backend services across multiple clouds. However, data leaks and misconfiguration of code and underlying cloud services can have disastrous impacts on APIs, and mobile and web applications built and deployed in the cloud. Any business with cloud-native applications needs full stack application protection from offensive tools (attack surface management) that attackers employ daily to look for exploits and vulnerabilities in applications. However, offensive tools alone are insufficient for a comprehensive AppSec program. Customers need defensive tools such as cloud security posture management (CSPM) for compliance monitoring and policy enforcement along with auto-remediation to immediately fix cloud configuration mishaps that can directly lead to a breach of sensitive data. Data Theorem has delivered multiple Cloud Hacker Toolkits, including a new Defensive Protection Toolkit for Serverless apps. The Serverless Hacker Toolkit provides an AWS Lambda Extension to enforce policy controls around authentication, authorization, encryption, API throttling, and attack protections such as OWASP API Top 10, SSRF, SQLi, and XSS.

According to Gartner, “Eighty-five percent of all enterprise web traffic is toward cloud-based applications. Almost half of all enterprise data is stored in the cloud, and nearly a third of all confirmed data breaches in 2019 were caused by application security issues.”1

Cloud Secure, Data Theorem’s latest product powered by its award-winning Analyzer Engine, is designed specifically to help organizations secure their cloud-native applications and address regulatory compliance for cloud monitoring and reporting. Data Theorem is one of the first vendors to provide a full stack application security analyzer that connects attack surfaces of applications starting at the client layers found in mobile and web, the network layers found in APIs, and the infrastructure layers found in cloud services.

“Organizations have long utilized Data Theorem for securing their apps and API services,” said Doug Dooley, Data Theorem COO. “Our Hacker Toolkits are uncovering new attack vectors in their applications and preventing data breaches for our customers. Now we are delivering the latest in cloud data security innovations to help protect applications and sensitive data found in multi-cloud environments. Cloud Secure helps round out Data Theorem’s full stack AppSec portfolio with both offensive and defensive protections.”

For years, partners have counted on Data Theorem for API, mobile and web application security software. Now they can provide a broader set of capabilities that uniquely address their clients’ cloud-native application security needs. This also positions Data Theorem as a complementary offering for cloud compliance and cloud-centric security audits.

Data Theorem’s broad AppSec portfolio protects organizations from data breaches with application security testing and protection for modern web frameworks, API-driven microservices and cloud resources. Its solutions are powered by its award-winning Analyzer Engine, which leverages a new type of dynamic and run-time analysis that is fully integrated into the CI/CD process, and enables organizations to conduct continuous, automated security inspection and remediation. Data Theorem’s AppSec portfolio secures mobile apps, cloud-driven APIs, and modern web applications.

Featured

  • Security Industry Association Announces the 2026 Security Megatrends

    The Security Industry Association (SIA) has identified and forecasted the 2026 Security Megatrends, which form the basis of SIA’s signature annual Security Megatrends report defining the top 10 factors influencing both near- and long-term change in the global security industry. Read Now

  • The Future of Access Control: Cloud-Based Solutions for Safer Workplaces

    Access controls have revolutionized the way we protect our people, assets and operations. Gone are the days of cumbersome keychains and the security liabilities they introduced, but it’s a mistake to think that their evolution has reached its peak. Read Now

  • A Look at AI

    Large language models (LLMs) have taken the world by storm. Within months of OpenAI launching its AI chatbot, ChatGPT, it amassed more than 100 million users, making it the fastest-growing consumer application in history. Read Now

  • First, Do No Harm: Responsibly Applying Artificial Intelligence

    It was 2022 when early LLMs (Large Language Models) brought the term “AI” into mainstream public consciousness and since then, we’ve seen security corporations and integrators attempt to develop their solutions and sales pitches around the biggest tech boom of the 21st century. However, not all “artificial intelligence” is equally suitable for security applications, and it’s essential for end users to remain vigilant in understanding how their solutions are utilizing AI. Read Now

  • Improve Incident Response With Intelligent Cloud Video Surveillance

    Video surveillance is a vital part of business security, helping institutions protect against everyday threats for increased employee, customer, and student safety. However, many outdated surveillance solutions lack the ability to offer immediate insights into critical incidents. This slows down investigations and limits how effectively teams can respond to situations, creating greater risks for the organization. Read Now

New Products

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings.

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.

  • HD2055 Modular Barricade

    Delta Scientific’s electric HD2055 modular shallow foundation barricade is tested to ASTM M50/P1 with negative penetration from the vehicle upon impact. With a shallow foundation of only 24 inches, the HD2055 can be installed without worrying about buried power lines and other below grade obstructions. The modular make-up of the barrier also allows you to cover wider roadways by adding additional modules to the system. The HD2055 boasts an Emergency Fast Operation of 1.5 seconds giving the guard ample time to deploy under a high threat situation.