Check Point® Software Technologies Ltd. introduces Check Point Quantum Force series: an innovative lineup of ten high-performance firewalls designed to meet and exceed the stringent security demands of enterprise data centers, network perimeters, campuses, and businesses of all dimensions.
XM Cyber announced new capabilities that provide complete and continuous visibility into risks and vulnerabilities in Kubernetes environments.
Kubernetes Exposure Management helps security teams protect critical assets running in Kubernetes clusters across public cloud, private cloud, and on-premises infrastructure.
The new solution delivers continuous visibility into vulnerabilities, risky permissions, and misconfigurations that could allow attackers to breach Kubernetes environments and access valuable data and applications. By extending XM Cyber’s industry-leading XM Attack Graph Analysis™ to Kubernetes, organizations can now see integrated risks across hybrid environments and intelligently prioritize remediation based on potential impact to critical assets.
Key benefits of XM Cyber’s Kubernetes Exposure Management include:
- 360-Degree Visibility: Gain a comprehensive view of risks and excessive permissions across all Kubernetes assets.
- Protection for Sensitive Resources: Ensure the security of vital Kubernetes resources like ConfigMaps and Secrets.
- Cross-Environment Analysis that Reduces Remediation Efforts: Perform multi-step attack modeling, risk assessment, and prioritization that considers the needs of multiple domains.
- Rapid Time-to-Value: Initial deployment can be completed in hours to unlock actionable exposure insights from day one.
XM Cyber’s Kubernetes Exposure Management capabilities are aimed at helping security teams tackle this emerging risk vector head-on.
“Kubernetes adoption is accelerating, but securing these highly complex environments remains a huge challenge,” said Boaz Gorodissky, CTO and Co-Founder at XM Cyber. “Our new Kubernetes Exposure Management equips security teams with the comprehensive visibility and automated control they urgently need to reduce attack surfaces and proactively protect critical container workloads.”