Saturday, March 25, 2023
  • Events
  • Interviews
  • Jobs
  • Opinion
  • Whitepapers
  • Podcasts
  • Web Hosting Directory
  • Login
  • Register
Cloud7 News
  • Cloud Computing
  • Web Hosting
  • Data Center
  • Linux
  • Cybersecurity
  • More
    • Software
    • Network/Internet
    • Hardware
    • Artificial Intelligence
    • Windows
    • Policy/Legislation
    • Blockchain
    • Troubleshooting
    • How-Tos
    • Articles
No Result
View All Result
Cloud7 News
  • Cloud Computing
  • Web Hosting
  • Data Center
  • Linux
  • Cybersecurity
  • More
    • Software
    • Network/Internet
    • Hardware
    • Artificial Intelligence
    • Windows
    • Policy/Legislation
    • Blockchain
    • Troubleshooting
    • How-Tos
    • Articles
No Result
View All Result
Cloud7 News
No Result
View All Result

Home > Cybersecurity > Aqua Security expands its CSPM with the acquisition of CloudSploit

Aqua Security expands its CSPM with the acquisition of CloudSploit


Seda Nur Cinar Seda Nur Cinar
November 13, 2019
2 min read
Aqua Security expands its CSPM with the acquisition of CloudSploit

Aqua Security, a security platform for container-based and cloud-native applications from development to production, announced its acquisition of CloudSploit.

Aqua Security accelerating container adoption and fixing the gap between DevOps and IT security expands its cloud security posture management (CSPM) service by acquiring CloudSploit. CloudSploit provides its users to monitor their public cloud accounts within minutes, as well as provides to access their entire estate of cloud resources with its SaaS-based platform. Moreover, the SaaS-based platform of CloudSploit reduces security risks that are caused by misconfiguration and vulnerabilities.

Monitor and manage easily cloud security posture across

“We are excited to add CloudSploit to Aqua’s cloud-native security portfolio. Aqua protects the world’s largest cloud native environments; with CloudSploit our customers can now continuously monitor and manage their cloud security posture across their multi-cloud infrastructures,” said Dror Davidoff, CEO of Aqua Security.

This acquisition means addressing both Container Security and Cloud Security Posture Management (CSPM) for Aqua Security. Aqua improved Cloud Native Security Platform (CSP) capacity by the protection of virtual machines and now Aqua CSP provides protection VMs for complete cloud workload protection.

According to Gartner’s In its Market Guide for Cloud Workload Protection Platforms, with the growing complexity of cloud-based configurations, complete protection strategies will require a CSPM to ensure continuous, correct and compliant cloud configuration and identification of excessive risk.

Second open-source investment

From now on, customers of the company can lead the protection of their cloud-native workloads by using a single control plane that gives more visibility and efficient remediation. CloudSploit that was co-founded by Matthew Fuller and Josh Rosenthal, is the second open-source investment by Aqua since August after the acquisition of Trivy Vulnerability Scanner.

See more Cybersecurity News

A comprehensive guide to understanding Cybersecurity: What is Cybersecurity?


Tags: Aqua SecurityCloudSploitSaaS
Seda Nur Cinar

Seda Nur Cinar

Seda Nur Cinar is the news editor of the Cloud7 News. With more than 8 years of Linux and cloud experience, Seda is a Linux and opensource enthusiast, security researcher and a web application developer.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

I agree to the Terms & Conditions and Privacy Policy.

Next Post
Magento released the security update to patch a vulnerability

Magento released the security update to patch a vulnerability

Related News

7 best practices and tools to use for Linux security

7 best practices and tools to use for Linux security

March 24, 2023 5:00 pm
Gcore launches Zero-Trust 5G eSIM Cloud platform

Gcore launches Zero-Trust 5G eSIM Cloud platform

March 23, 2023 6:10 pm
CISA aims to identify vulnerabilities that attract ransomware

CISA aims to identify vulnerabilities that attract ransomware

March 22, 2023 2:10 pm
7 best cybersecurity schools

7 best cybersecurity schools

March 21, 2023 9:00 pm
Get free daily newsletters from Cloud7 News Get the Cloud7 Newsletter
Select list(s):

Check your inbox or spam folder to confirm your subscription.

By subscribing, you agree to our
Copyright Policy and Privacy Policy

Get the free newsletter

Subscribe to receive the latest IT business updates straight to your inbox.

Select list(s):

Check your inbox or spam folder to confirm your subscription.

Recent News

  • Podman Desktop – Containers & Kubernetes (Podcast #15 w/ Markus Eisele)
  • What is a Daemon in Linux?
  • 7 best practices and tools to use for Linux security
  • Photopea review: The best free Photoshop alternative for Linux
  • CloudFest 2023 is completed

Cloud7 News
Cloud7 is a news source that publishes the latest news, reviews, comparisons, opinions, and exclusive interviews to help tech users of high-experience levels in the IT industry.

EXPLORE

  • Web Hosting
  • Cloud Computing
  • Data Center
  • Cybersecurity
  • Linux
  • Network/Internet
  • Software
  • Hardware
  • Artificial Intelligence
  • How-Tos
  • Troubleshooting

RESOURCES

  • Events
  • Interviews
  • Jobs
  • Opinion
  • Whitepapers
  • Podcasts
  • Web Hosting Directory

Get the Cloud7 Newsletter

Get FREE daily newsletters from Cloud7 delivering the latest news and reviews.

  • About Us
  • Privacy & Policy
  • Copyright Policy
  • Contact

© 2023, Cloud7 News. All rights reserved.

No Result
View All Result
  • Cloud Computing
  • Web Hosting
  • Data Center
  • Linux
  • Cybersecurity
  • More
    • Software
    • Network/Internet
    • Hardware
    • Artificial Intelligence
    • Windows
    • Policy/Legislation
    • Blockchain
    • Troubleshooting
    • How-Tos
    • Articles
  • Events
  • Interviews
  • Jobs
  • Opinion
  • Whitepapers
  • Podcasts
  • Web Hosting Directory

© 2023, Cloud7 News. All rights reserved.

Welcome Back!

Sign In with Facebook
Sign In with Google
Sign In with Linked In
OR

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Sign Up with Facebook
Sign Up with Google
Sign Up with Linked In
OR

Fill the forms below to register

*By registering into our website, you agree to the Terms & Conditions and Privacy Policy.
All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.