With three in five enterprises now going or planning to go serverless, the attack surface widens. At least one in five organizations, 21%, have implemented serverless computing as part of their cloud-based infrastructure. That’s the finding of a recent survey of 108 IT managers conducted by Datamation. Another 39% are planning or considering serverless resources. The question is, will serverless computing soon gain critical mass, used by a majority of enterprises? Along with this, what are the ramifications for security?
Paul Asadorian, CEO of Security Weekly, and John Strand, Founder of Black Hills Information Security, discuss the companies that Paul had briefings with this week. In the podcast (around 6:30), Paul highlights the Attivo ThreatDefend™ platform’s latest Container and Serverless deception enhancements. Additionally, they share how the deception technology space is evolving and maturing through innovative companies, like Attivo Networks.
Attivo Networks, the 2017 Platinum ‘ASTORS’ Homeland Security Award-Winning leader in deception for cybersecurity threat detection, is further enhancing its portfolio with advanced deception techniques designed specifically to accurately detect and derail sophisticated attacks targeting serverless applications in cloud and data center environments.
Attivo’s ThreatDefend deception platform can now enable organizations to create decoy containers and serverless functions, in an attempt to trap attackers. As organizations begin to embrace container and serverless technologies, there is a corresponding need to secure those deployment models. On Sept. 24, Attivo Networks announced its entry into the container and serverless security market with an update of its ThreatDefend cyber-security deception platform.
FREMONT, CA – Sept. 24, 2018 – Attivo Networks® announced today that the company has further enhanced its portfolio with advanced deception techniques designed to accurately detect and derail sophisticated attacks targeting serverless applications in cloud and data center environments. Designed for the dynamic nature of cloud environments and shared security models, organizations can now add a proactive defense across traditional data centers and within popular public cloud platforms such as Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform (GCP).