Attivo Networks introduces a new CIEM solution

Attivo Networks today announced a new Cloud Infrastructure Entitlement Management (CIEM) solution, IDEntitleX, designed to deliver visibility and reduce the attack surface for identities and entitlements in the cloud. IDEntitleX expands the company’s leadership position in providing unprecedented visibility and prevention of identity privilege escalation and lateral movement threat activity. With this new product introduction, Attivo becomes the only solution of its kind to provide end-to-end analysis of identity and entitlement exposures and risks on endpoints, Active Directory (AD), and the cloud.

Venu Vissamsetty, VP of Research at Attivo Networks.

The new IDEntitleX solution reduces the risk due to accelerated cloud migration by providing security teams with a unified view of identities and exposures across the organization to address provisioning management challenges while maintaining operational effectiveness. This includes multi-cloud support for AWS and Azure and provides detailed entitlement visibility for users, applications, virtual machines, containers, serverless functions and other objects which attackers seek to target.

“As organizations continue to adopt cloud infrastructure at an ever-increasing rate and human and non-human identities expand to match, CISOs must focus on identity-first security solutions that can keep pace with this growth,” said Venu Vissamsetty, VP of Research at Attivo Networks. “This CIEM solution gives security teams the optimal flexibility and visibility they need for continuous monitoring of identities, entitlements, as well as correlation across standard cloud-based services.”

The Attivo Networks IDEntitleX solution meets the challenges of identity and entitlement management with the following benefits:

• Broadest Range of Cloud Visibility: Understand exposures with identity and entitlement summaries across all platforms.

• Platform-Specific Cloud Visibility: Monitor entitlements to key cloud services, such as AWS S3 and Azure Key Vault.

• End-to-end Visibility: View endpoint, Active Directory, and cloud exposures from a centralized management console.

• Object-specific Risk Assessment: Isolate objects by risk and analyze the details of their entitlements.

Comments

Comments