Data Theorem Launches Industry’s First App-Aware Full Stack Cloud Security Product

Cloud Secure Product Uniquely Combines Attack Surface Management, Cloud Security Posture Management and Defensive Protections to Prevent Cloud Data Breaches

Data Theorem Inc., today introduced the industry’s first application-aware full stack cloud security product with attack surface management (ASM) for protecting data in cloud-native apps, API services and serverless cloud functions. As Data Theorem’s latest product powered by its award-winning Analyzer Engine, Cloud Secure is available today to identify and remediate potential data breaches found in public cloud services used to power today’s modern web and mobile applications.

The explosion of applications built in the cloud creates new cloud data privacy concerns, but security tools and IT security practices have been slow to modernize for newer applications. Security professionals need better tools and software services for cloud data protection that provide automated end-to-end vulnerability assessment and remediation. The practices of manual pen-testing and consulting engagements do not keep pace with DevOps teams building and updating cloud-native applications.

According to IDC, “By 2023, more than 500 million digital apps and services will be developed and deployed using cloud-native approaches – the same number of apps developed in the last 40 years. Most of these will be targeted at industry-specific digital transformation use cases.”

Cloud Secure is the industry’s first solution delivering attack surface management security for cloud-native applications that starts at the client layer (mobile and web), protects the network layer (REST and GraphQL APIs), and extends down through the underlying infrastructure (cloud services). Its combination of attack surface management and defensive protections enables both offensive and defensive security capabilities to best prevent data breaches of cloud-native applications and serverless cloud functions.

Most enterprises today build applications with multiple third-party code sources and distribute their application backend services across multiple clouds. However, data leaks and misconfiguration of code and underlying cloud services can have disastrous impacts on APIs, and mobile and web applications built and deployed in the cloud. Any business with cloud-native applications needs full stack application protection from offensive tools (attack surface management) that attackers employ daily to look for exploits and vulnerabilities in applications. However, offensive tools alone are insufficient for a comprehensive AppSec program. Customers need defensive tools such as cloud security posture management (CSPM) for compliance monitoring and policy enforcement along with auto-remediation to immediately fix cloud configuration mishaps that can directly lead to a breach of sensitive data. Data Theorem has delivered multiple Cloud Hacker Toolkits, including a new Defensive Protection Toolkit for Serverless apps. The Serverless Hacker Toolkit provides an AWS Lambda Extension to enforce policy controls around authentication, authorization, encryption, API throttling, and attack protections such as OWASP API Top 10, SSRF, SQLi, and XSS.

According to Gartner, “Eighty-five percent of all enterprise web traffic is toward cloud-based applications. Almost half of all enterprise data is stored in the cloud, and nearly a third of all confirmed data breaches in 2019 were caused by application security issues.”1

Cloud Secure, Data Theorem’s latest product powered by its award-winning Analyzer Engine, is designed specifically to help organizations secure their cloud-native applications and address regulatory compliance for cloud monitoring and reporting. Data Theorem is one of the first vendors to provide a full stack application security analyzer that connects attack surfaces of applications starting at the client layers found in mobile and web, the network layers found in APIs, and the infrastructure layers found in cloud services.

“Organizations have long utilized Data Theorem for securing their apps and API services,” said Doug Dooley, Data Theorem COO. “Our Hacker Toolkits are uncovering new attack vectors in their applications and preventing data breaches for our customers. Now we are delivering the latest in cloud data security innovations to help protect applications and sensitive data found in multi-cloud environments. Cloud Secure helps round out Data Theorem’s full stack AppSec portfolio with both offensive and defensive protections.”

For years, partners have counted on Data Theorem for API, mobile and web application security software. Now they can provide a broader set of capabilities that uniquely address their clients’ cloud-native application security needs. This also positions Data Theorem as a complementary offering for cloud compliance and cloud-centric security audits.

Data Theorem’s broad AppSec portfolio protects organizations from data breaches with application security testing and protection for modern web frameworks, API-driven microservices and cloud resources. Its solutions are powered by its award-winning Analyzer Engine, which leverages a new type of dynamic and run-time analysis that is fully integrated into the CI/CD process, and enables organizations to conduct continuous, automated security inspection and remediation. Data Theorem’s AppSec portfolio secures mobile apps, cloud-driven APIs, and modern web applications.

Featured

  • Live From ISC West 2023: Day 1

    ISC West 2023 in Las Vegas, Nevada, has officially begun! Make sure to keep an eye on Security Today’s ISCW Live 2023 page, as well as our associated Twitter accounts—@SecurToday and @CampusSecur—for the latest updates from the show floor at the Venetian Expo. Read Now

    • Industry Events
    • ISC West
  • It Happened Again

    Just yesterday (as of this writing), it happened again. A 28-year-old woman shot her way into a Christian elementary school in Nashville, Tenn., on Monday and killed three children and three adults, according to national news. AP News reports that the victims were three 9-year-old children, a top school administrator, a substitute teacher, and a school custodian Read Now

  • Let's Get to Work

    You are standing at the conference center doors just waiting to get into the exhibit hall. I know you are because I’m standing next to you. This week at ISC West has been three years in the making. Last year was encouraging, and here we are waiting for the Big Show. Read Now

    • Industry Events
    • ISC West
  • Using Modern Technology

    Using Modern Technology

    Workplace violence is a serious and growing challenge for many organizations — including those in the healthcare industry. Read Now

Featured Cybersecurity

New Products

  • Tyco Kantech EntraPass security management software

    Tyco Kantech EntraPass security management software

    Johnson Controls, the global leader in smart, healthy and sustainable buildings, and architect of the Open Blue digital connected platforms, has released the newest version of the Tyco Kantech EntraPass security management software. 3

  • FlexPower® Global™ Series (FPG) from LifeSafety Power

    FlexPower® Global™ Series (FPG) from LifeSafety Power

    The FlexPower® Global™ Series (FPG) from LifeSafety Power—designed to provide DC power for access control systems in international applications—is now PSE listed for Japan and compatible with the country’s 100VAC applications. 3

  • ComNet CNGE6FX2TX4PoE

    The ComNet cost-efficient CNGE6FX2TX4PoE is a six-port switch that offers four Gbps TX ports that support the IEEE802.3at standard and provide up to 30 watts of PoE to PDs. It also has a dedicated FX/TX combination port as well as a single FX SFP to act as an additional port or an uplink port, giving the user additional options in managing network traffic. The CNGE6FX2TX4PoE is designed for use in unconditioned environments and typically used in perimeter surveillance. 3