Stop Unintended Exposure with RedSeal Stratus

Presented by

Kurt Van Etten, Chief Product Officer and Sukesh Garg, Vice President, Products

About this talk

Cloud security is complex and distributed. In organizations with on-premise environments, the controls sit with the network security team and in firewalls. In the cloud, controls sit with multiple DevOps teams, Kubernetes, 3rd parties, inside AWS, and more. Cloud security controls may not be implemented by security teams but by numerous application developers. The impact is an exponential growth in misconfigurations that are leaving resources with unintended or accidental exposure to the Internet. Security challenges in the cloud have become so prevalent that Gartner has defined Cloud Security Posture Management (CSPM) as a new category of security products designed to identify misconfiguration issues and risks in the cloud. Join us on Wednesday, December 8th at 11:00am PT for an exclusive overview of RedSeal’s new SaaS-based CSPM solution, RedSeal Stratus, with Kurt Van Etten, Chief Product Officer and Sukesh Garg, Vice President, Products. We'll show you how RedSeal Stratus can help security teams better manage this increased risk with: - Complete and up-to-date visualization of cloud infrastructure - Detailed knowledge of Amazon Kubernetes accounts and policies - Out-of-the-box dashboard that identifies resources that exposed to the Internet

Related topics:

More from this channel

Upcoming talks (2)
On-demand talks (26)
Subscribers (2518)
By focusing on cybersecurity fundamentals, RedSeal helps government agencies and Global 2000 companies measurably reduce their cyber risk. With RedSeal’s cyber terrain analytics platform and professional services, enterprises improve their resilience to security events by understanding what’s on their networks and how it’s all connected. RedSeal verifies that network devices are securely configured; validates network segmentation policies; and continuously monitors compliance with policies and regulations. It also prioritizes mitigation based on each vulnerability’s associated risk.