Saturday, March 25, 2023
AI Home Security
No Result
View All Result
  • Home
  • Home Security
  • Cyber Security
  • Biometric Technology
  • Home
  • Home Security
  • Cyber Security
  • Biometric Technology
No Result
View All Result
Morning News
No Result
View All Result
Home Cyber Security

Check Point Boosts AppSec Focus With CNAPP Enhancements

justmattg by justmattg
February 18, 2023
in Cyber Security
0
Check Point Boosts AppSec Focus With CNAPP Enhancements
0
SHARES
0
VIEWS
Share on FacebookShare on Twitter



When Check Point Software acquired Israeli startup Spectral a year ago, it joined the ranks of other network security providers acknowledging the growing threat of software supply chain attacks. Spectral helped fill a critical gap in CloudGuard, Check Point’s unified threat protection and network security platform for public and hybrid clouds, with its code scanning and leakage detection tools.

Spectral offers infrastructure as code (IaC) scanning, code-tampering prevention, hardcoded secrets detection source controls, and CI/CD security and source code leakage detection tools. It provided the underpinning of Check Point’s Cloud-Native Application Protection Platform (CNAPP), which is now part of CloudGuard, one of four core Check Point product lines.

Understanding the Role of CNAPP

CNAPP is gaining a lot of attention as developers shift to cloud-native application development to support new business applications and digital transformation initiatives. Gartner describes CNAPPs as “an integrated set of security and compliance capabilities designed to help secure and protect cloud-native applications across development and production.”

Developers are increasingly relying on open source code and microservices from a widely distributed and often vast community to compose their containers and serverless functions. While the source code may come from an established ecosystem, it is common for some components to have roots from unknown or obsolete sources. CNAPP enables organizations to establish DevSecOps processes where software developers take the lead in discovering potential flaws in code before deploying application runtimes into production, says Melinda Marks, a senior analyst at Enterprise Strategy Group.

“This is important for preventing security issues before you deploy your applications to the cloud because once you deploy them, they’re available for the hackers,” Marks says.

Agentless Scanning and Other New Features

After integrating Spectral’s tools into CloudGuard upon completing last year’s acquisition, Check Point added some critical new capabilities to the CNAPP, rolled out this month, including permissions and entitlement management, agentless scanning, and deeper risk scoring of an organization’s entire environment. Check Point officials underscored the company CNAPP push last week during its annual CPX 360 event in New York.

“We significantly enriched the platform to address many important elements of the cloud-native control environment,” Check Point chief product officer Dorit Dor tells Dark Reading. Check Point also announced plans to feed all data from CloudGuard to its new Horizon Events, a unified dashboard that gathers logs from the entire Check Point ecosystem. Check Point introduced Horizon Events late last year, and an early access version is now available.

For Check Point, adding CNAPP to CloudGuard was critical. Check Point’s key competitors are also on the CNAPP bandwagon. Among them, Palo Alto Networks has significantly emphasized its Prisma Cloud, which recently gained added Software Composition Analysis (SCA) and Secret Scanning capabilities. In December, Palo Alto Networks acquired supply chain security tool provider Cider Security.

Check Point Shares CNAPP Roadmap

Dor touted Spectral’s “very strong” secret scanning capabilities. She explained that developers could plug it into their CI/CD environments and implement policies as code through open policy agents.

Dor presented the roadmap for CloudGuard, noting that Check Point is looking to implement more AI. Check Point plans to improve observability and visibility to help developers identify malicious code. Also in the pipeline, Check Point is working on allowing CloudGuard to handle the entire software bill of materials (SBOM) lifecycle, ultimately enabling and enforcing them.

Check Point is also working on enhancing how CloudGuard works with network security. “Network Security has been there for a long time; we have a very mature network security solution,” Dor said. “But the challenge now is to make it speak more of the language of the developers.” Check Point is addressing that by integrating network security into its AWS Security framework and offering it with the AWS network security as a service. Dor noted that Check Point recently integrated CloudGuard network security with Microsoft Azure, allowing administrators to manage their Microsoft environments.

“It’s a space for continuous investment,” Dor said. With a direction toward multi-cloud coverage, the goal is to enable it to “support your developers natively and to support the system administration and giving you one cloud control plane.”



Source link

READ ALSO

Malicious Python Package Uses Unicode Trickery to Evade Detection and Steal Data

Red Teaming at Scale to Uncover Your Big Unknowns

Related Posts

Malicious Python Package Uses Unicode Trickery to Evade Detection and Steal Data
Cyber Security

Malicious Python Package Uses Unicode Trickery to Evade Detection and Steal Data

March 25, 2023
Red Teaming at Scale to Uncover Your Big Unknowns
Cyber Security

Red Teaming at Scale to Uncover Your Big Unknowns

March 24, 2023
Inside the High Risk of 3rd-Party SaaS Apps
Cyber Security

Inside the High Risk of 3rd-Party SaaS Apps

March 24, 2023
Open Source Vulnerabilities Still Pose a Big Challenge for Security Teams
Cyber Security

Open Source Vulnerabilities Still Pose a Big Challenge for Security Teams

March 24, 2023
Fake ChatGPT Chrome Browser Extension Caught Hijacking Facebook Accounts
Cyber Security

Fake ChatGPT Chrome Browser Extension Caught Hijacking Facebook Accounts

March 24, 2023
2023 Cybersecurity Maturity Report Reveals Organizational Unpreparedness for Cyberattacks
Cyber Security

2023 Cybersecurity Maturity Report Reveals Organizational Unpreparedness for Cyberattacks

March 23, 2023
Next Post
GoDaddy Discloses Multi-Year Security Breach Causing Malware Installations and Source Code Theft

GoDaddy Discloses Multi-Year Security Breach Causing Malware Installations and Source Code Theft

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

POPULAR NEWS

Hackers Create Malicious Dota 2 Game Modes to Secretly Access Players’ Systems

Hackers Create Malicious Dota 2 Game Modes to Secretly Access Players’ Systems

February 13, 2023
Trickbot Members Sanctioned for Pandemic-Era Ransomware Hits

Trickbot Members Sanctioned for Pandemic-Era Ransomware Hits

February 11, 2023
The New Threats to Cryptocurrency Users

The New Threats to Cryptocurrency Users

February 12, 2023
Do you know who is watching you?

Do you know who is watching you?

January 2, 2023
PopID announces big customer deployment for face biometric payments in UAE

PopID announces big customer deployment for face biometric payments in UAE

February 14, 2023

EDITOR'S PICK

New Linux Malware Exploiting Over Two Dozen CMS Flaws

New Linux Malware Exploiting Over Two Dozen CMS Flaws

January 2, 2023
Scammers Mimic ChatGPT to Steal Business Credentials

Scammers Mimic ChatGPT to Steal Business Credentials

February 23, 2023
Cacti Servers Under Attack as Majority Fail to Patch Critical Vulnerability

Cacti Servers Under Attack as Majority Fail to Patch Critical Vulnerability

January 14, 2023
Tainted VPNs Being Used to Spread EyeSpy Surveillanceware

Tainted VPNs Being Used to Spread EyeSpy Surveillanceware

January 13, 2023

About

We bring you the best news & updates related to Home security, Cyber security and Biometric technology. Keep visiting our website for latest updates.

Follow us

Categories

  • Biometric Technology
  • Cyber Security
  • Home Security

Recent Posts

  • Malicious Python Package Uses Unicode Trickery to Evade Detection and Steal Data
  • The NSA and CISA Highlight On-device Privacy: Identity News Digest
  • Red Teaming at Scale to Uncover Your Big Unknowns
  • Inside the High Risk of 3rd-Party SaaS Apps
  • Privacy Policy
  • Contact Us

© 2023 AI Home Security - All rights reserved.

No Result
View All Result
  • Home
  • Home Security
  • Cyber Security
  • Biometric Technology

© 2023 AI Home Security - All rights reserved.