Close Menu
TechCentralTechCentral

    Subscribe to the newsletter

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    Facebook X (Twitter) YouTube LinkedIn
    WhatsApp Facebook X (Twitter) LinkedIn YouTube
    TechCentralTechCentral
    • News

      Four-day workweek in South Africa: surprising results in trial

      1 December 2023

      The rand’s dismal November

      1 December 2023

      A history of the decoders made by M-Net and DStv

      30 November 2023

      How South Africa’s banks became bakgat

      30 November 2023

      Putin’s daughter pursues digital plan in push to embrace Africa

      30 November 2023
    • World

      Microsoft developing Xbox store to take on Apple, Google

      1 December 2023

      ‘Go f… yourself’: Musk lashes out at fleeing advertisers

      30 November 2023

      Microsoft to take non-voting position on OpenAI board

      30 November 2023

      Hackers stole customer support data in Okta breach

      29 November 2023

      Orange withdraws from process to buy into Ethio Telecom

      28 November 2023
    • In-depth

      Africa has a feature phone problem

      23 November 2023

      Is your ISP monitoring your online activity?

      10 November 2023

      The real Big Brother Africa

      2 November 2023

      Compared: Starlink prices around the world – including Africa

      30 October 2023

      Africa is booming

      30 October 2023
    • TCS

      TCS+ | OneTrust’s Joseph Byrne: privacy risk management done right

      29 November 2023

      TCS+ | Ricoh – safe and secure role in today’s digital ecosystems

      27 November 2023

      TCS+ | NEC XON on going toe to toe with cybercriminals

      22 November 2023

      TCS | How ShotSpotter is fighting gun crime in Cape Town

      13 November 2023

      TCS+ | SOC-as-a-service: CYBER1 SOC and the future of cybersecurity

      13 November 2023
    • Opinion

      Could Cape Town become Africa’s Silicon Valley?

      14 November 2023

      Chris Kruger: What I learnt in my decades in IT leadership

      6 November 2023

      Ransomware attacks: how South African companies should respond

      6 November 2023

      Fibre providers urged to go ‘nano’ to cut costs

      31 October 2023

      Big banks, take note: PayShap should be free

      20 October 2023
    • Company Hubs
      • 4IRI
      • Africa Data Centres
      • Altron Document Solutions
      • Altron Systems Integration
      • Arctic Wolf
      • AvertITD
      • CallMiner
      • CoCre8
      • CYBER1 Solutions
      • Digicloud Africa
      • Digimune
      • E4
      • Entelect
      • ESET
      • Euphoria Telecom
      • iKhokha
      • Incredible Business
      • iONLINE
      • LSD Open
      • Maxtec
      • MiRO
      • NEC XON
      • Next DLP
      • Paratus
      • Ricoh
      • Skybox Security
      • SkyWire
      • Velocity Group
      • Videri Digital
    • Sections
      • AI and machine learning
      • Banking
      • Broadcasting and Media
      • Cloud computing
      • Consumer electronics
      • Cryptocurrencies
      • E-commerce
      • Education and skills
      • Energy
      • Fintech
      • Information security
      • Internet and connectivity
      • Internet of Things
      • Investment
      • IT services
      • Metaverse and gaming
      • Motoring and transport
      • Open-source software
      • Public sector
      • Science
      • Social media
      • Talent and leadership
      • Telecoms
    • Events
    • Advertise
    TechCentralTechCentral
    Home » Sections » Information security » Detect and prioritise cloud security risks in minutes, not months

    Detect and prioritise cloud security risks in minutes, not months

    By Maxtec17 May 2022
    Facebook Twitter LinkedIn WhatsApp Telegram Email

    The cloud “boom”, which refers to the innovations made by cloud users and providers to respond to threats and vulnerabilities, has grown immensely in the last two to three years. The challenges posed by the Covid-19 pandemic necessitated organisations to prioritise security, hence many are looking to build a digital strategy which includes approaches to combating security breaches.

    Gartner estimates that by 2024, more than 45% of IT spend on system infrastructure, infrastructure software, application software and business process outsourcing will shift from traditional on-premises solutions to the cloud.

    Cloud security innovation leader, Orca Security, which offers product capabilities that further simplify cloud security and compliance operations, joins a suite of offerings from Maxtec to its partners.

    Orca Security joins a suite of offerings from Maxtec to its partners

    Orca offers state-of-the-art, agentless cloud security and compliance that has 100% visibility and coverage of cloud configurations and workloads while eliminating the cost, organisational friction and performance hits associated with agent-based solutions. Its agentless approach enables Orca to be deployed in minutes and automatically cover new assets as they are added.

    It detects and prioritises risks such as vulnerabilities, misconfigurations, malware, misplaced sensitive data, lateral movement risk, and identity and access management (IAM) risk, eliminating the time necessary to patch together multiple tools for cloud security.

    It leverages context aware intelligence, prioritising the 1% of truly critical risks and discovering dangerous attack paths that would be completely missed by other solutions.

    Context engine

    Orca’s context engine understands each asset’s role within its context and is therefore able to prioritise the truly critical security issues instead of just alerting to all threats found.

    To determine the priority of an issue, Orca looks at the following three factors:

    • Severity of the security issue
    • Accessibility by attackers
    • Business impact of a potential breach

    Orca layers contextual information from cloud service providers to prioritise security risks based not only on underlying vulnerabilities but also on their exposure and breach impact. Due to this, security professionals quickly understand their cloud environment and attack surface as well as rapidly address their most significant risks and security gaps.

    Orca Security provides 100% agentless, full-stack, deep visibility into AWS, Azure and Google Cloud through a single Cloud Native Application Protection Platform (CNAPP).

    Organisations no longer need to rely on disparate products for cloud workload and data protection, vulnerability management, compliance or cloud security posture management (CSPM). It also eliminates the need to deploy and maintain multiple tools, such as cloud security posture managers and cloud workload protection platform (CWPPs).

    To set up a demo please visit maxtec.co.za/orca

    Orca Security leverages its unique SideScanning technology, which addresses the shortcomings of agent-based solutions by collecting data, with read-only access, from the workloads’ runtime block storage out-of-band.

    Orca’s dashboard is user friendly; it presents information on threats and vulnerabilities in a matrix, displaying useful categories such as the threat type, vulnerability, account, affected resource and more.

    Orca’s intuitive and flexible query language allows teams to quickly search cloud estate data for actionable intelligence. Once a potential risk such as data loss has been detected, an alert is sent. This gives teams an opportunity to remediate any issue long before it becomes a problem.

    It takes very little time to set up and fully deploy. With Orca, pivoting can be achieved without any disruption to business

    It leverages integrated workflows and immediately assigns issues to the appropriate teams to improve efficiency, speed up remediation and achieve better return on investment. Orca even discovers and monitors idle, paused and stopped workloads, orphaned systems and devices that can’t support agents.

    Organisations can maintain continuous cloud compliance with a single platform and replace multiple tools such as vulnerability management, malware scanning and file integrity monitoring. Orca supports over 40 CIS Benchmarks and key compliance frameworks such as PCI-DSS, GDPR, NIST and SOC 2 with built-in or customised templates to meet your specific needs.

    Moreover, it takes very little time to set up and fully deploy. With Orca, pivoting can be achieved without any disruption to business.

    To find out more, or to set up a demo please visit maxtec.co.za/orca.

    About Maxtec
    Maxtec distributes market-leading data security technologies that are trusted around the globe. We empower South African and SADC IT partners with advanced Security Fabric from Fortinet, Intelligent Broadband from Allot, SSL/TLS certification from Sectigo, Network Defence as a Service from Cyglass, Scattered Data Protection from ItsMine, Secure Cloud Backup from Acronis, Vulnerability Remediation from BigFix and Agentless Cloud Security from Orca.

    • This promoted content was paid for by the party concerned
    Gartner Maxtec Orca Orca Security
    Share. Facebook Twitter LinkedIn WhatsApp Telegram Email
    Previous ArticleMusk tells Twitter: prove your bot claims, or the deal is off
    Next Article Fibre break knocks out Telkom’s network

    Related Posts

    Microsoft developing Xbox store to take on Apple, Google

    1 December 2023

    The rand’s dismal November

    1 December 2023

    A history of the decoders made by M-Net and DStv

    30 November 2023
    Promoted

    5G home broadband a big opportunity for African operators

    30 November 2023

    DCA, Huawei and WBBA host Africa Fibre Forum 2023

    30 November 2023

    Accelerate innovation with platform engineering

    30 November 2023
    Opinion

    Could Cape Town become Africa’s Silicon Valley?

    14 November 2023

    Chris Kruger: What I learnt in my decades in IT leadership

    6 November 2023

    Ransomware attacks: how South African companies should respond

    6 November 2023

    Subscribe to Updates

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    © 2009 - 2023 NewsCentral Media

    Type above and press Enter to search. Press Esc to cancel.