CipherCloud, the market’s leading provider of integrated cloud security and data privacy, today announced that it has formally introduced its Cloud Security Posture Management (CSPM) and SaaS Security Posture Management (SSPM) solutions capabilities. This new offering enables CipherCloud customers to prevent unintended cloud misconfigurations that lead to data loss, while enabling more consistent compliance with industry standards such as GDPR, CCPA, HIPAA and PCI.
Read More : BMC Increases Global SaaS Delivery With AWS
Delivered as an integrated component of the market-leading CASB+ solution, CipherCloud CSPM and SSPM directly address the leading cause of cloud security and data breaches — unseen cloud configuration errors. CipherCloud CSPM and SSPM deliver continuous oversight and real-time guardrails that enable practitioners to protect critical administrative and configuration controls across their numerous SaaS and IaaS environments, including Salesforce.com, Office 365, Amazon AWS, Microsoft Azure, and Google Cloud.
In the Gartner 2020 “Magic Quadrant for Cloud Access Security Brokers” CipherCloud was highlighted for market-leading CSPM/SSPM capabilities suitable to replace stand-alone tools.
Read More : SalesTechStar Interview with Kevin Baumgart, VP of Sales at Hologram
Integrated Multi-Cloud Configuration Monitoring and Remediation
CipherCloud’s CSPM and SSPM continuously scan SaaS and cloud services to discover problematic configurations, user errors, and perform automatic remediation of identified exposures, securing cloud accounts from unintended data loss due to security blindspots or configuration oversight.
The solution also defines pre-built rules to reflect leading security methodologies and compliance frameworks, including CIS Foundations Benchmarks, GDPR Compliance, HIPAA Compliance, and PCI DSS Best Practices, along with providing the option to validate cloud security posture against the native CipherCloud Best Practices framework.
Key processes addressed by CipherCloud CSPM and SSPM include:
- Configuration changes: Detecting less secure configurations on new resources and unintentional access/configuration changes on all existing resources.
- Compliance: Ensuring that the IaaS platform is deployed securely and appropriately configured to meet regulatory standards, security policies & CIS benchmarks.
- Continuous Monitoring: Continuously monitoring configuration changes to alert on insecure configurations, applying tags to inform further analysis.
- Reporting: Periodically running security assessments to analyze and detail changes, and generate corrective actions.
Read More : What Sales Executives Need to Know About AI Contract Management