Security Boulevard (Original)

PingSafe Emerges to Launch CNAPP That Simulates Cyberattacks

PingSafe today emerged from stealth to launch a cloud-native application protection platform (CNAPP) based on an engine that both detects vulnerabilities that cybercriminals might potentially exploit and enables cybersecurity teams to simulate cyberattacks.

Fresh from raising $3.3 million in seed funding, PingSafe CEO Anand Prakash said the Offensive Security Engine provides cybersecurity teams with the ability to launch novel attacks against their own IT environments and provide cloud security posture management (CSPM) and a cloud workload protection platform (CWPP).

PingSafe invokes application programming interfaces (APIs) exposed by multiple platforms to aggregate data in a graph database that is at the core of the Offensive Security Engine. It then detects vulnerabilities so that cybersecurity teams can better prioritize their remediation efforts, noted Prakash.

That approach generates more accurate alerts and reduces the level of noise that CNAPPs typically generate while at the same time providing cybersecurity teams with an ability to simulate attacks against cloud computing environments, he added.

There is also no-code policy builder that allows cybersecurity teams to define custom policies for the cloud services and various technology stacks they might have deployed in a cloud environment.

CNAPPs have emerged as a new class of cybersecurity platforms that combine CSPM and CWPP capabilities within a single platform to enable cybersecurity teams to streamline workflows and reduce the total cost of cybersecurity by eliminating the need to integrate multiple cybersecurity point products.

Interest in CNAPPs has risen sharply as the number of workloads deployed in the cloud and concerns about the total cost of cybersecurity have increased. There is generally less pressure to reduce the cost of cybersecurity than other IT functions, but as always, cybersecurity teams are looking for ways to become more efficient by, for example, reducing the time and effort required to integrate disparate platforms. Most organizations also continue to be shorthanded in terms of cybersecurity expertise. One of the reasons organizations don’t acquire another cybersecurity tool or platform is they don’t have anybody to manage it. A CNAPP provides a centralized approach to managing cybersecurity that is simpler to extend as additional capabilities are added.

It’s too early to tell how quickly organizations are transitioning to CNAPPs, but as the number of attack surfaces that need to be defended in the clous era continues to increase, the need for a different approach to managing cybersecurity has become self-evident. The number of application workloads deployed in cloud computing environments continues to exponentially increase with each passing month and many cybersecurity teams have still yet to master the nuances that are unique to cloud security.

One way or another, the need to manage cybersecurity at scale will require organizations to embrace a different approach. The only issue that remains to be resolved now is the pace at which that change will occur at a time when many cybersecurity teams are still trying to justify the cost of investing in previous generations of cybersecurity platforms.

Michael Vizard

Mike Vizard is a seasoned IT journalist with over 25 years of experience. He also contributed to IT Business Edge, Channel Insider, Baseline and a variety of other IT titles. Previously, Vizard was the editorial director for Ziff-Davis Enterprise as well as Editor-in-Chief for CRN and InfoWorld.

Recent Posts

Account takeover fraud: 5 steps for protecting your customers

According to research by the Aite Group, financial institutions are facing a 64% uptick in account takeover attacks than before…

4 hours ago

Seven Common Lateral Movement Techniques

Inside the Attacker’s Playbook: Unmasking the most common lateral movement techniques   Lateral movement techniques refer to the methods employed by…

5 hours ago

Antisocial Media and Critical National Infrastructure

[For some reason I posted this several months ago on my Dataholics blog, when this one might have been at…

5 hours ago

API Discovery: Definition, Importance, and Step-by-Step Guide on AppTrana WAAP

The growing use of APIs in various business areas exposes organizations to new security risks. An analysis of data breaches…

6 hours ago

Infoline launches LogRhythm-Powered SOC to Deliver Crucial Cybersecurity Services in Malaysia

SINGAPORE, July 25, 2023— LogRhythm, the company helping security teams stop breaches by turning disconnected data and signals into trustworthy…

11 hours ago

What Comes After Your SIEM Purchase?

Let’s say you recently acquired a security information and event Management (SIEM) solution and have a new layer of defense…

15 hours ago