Find out what's inside the September 2020 edition of the Journal & download a free copy of this month's featured article
In the public cloud, thousands of human and machine identities, roles, policies, entitlements and configurations determine what hackers can do if they gain a foothold in your environment. One excess permission or open port can make the difference between a failed breach attempt and devastating data loss. By 2023, Gartner predicts that 75% of cloud security failures will result from inadequate management of identities, access and privileges. First-generation cloud security solutions do not give you visibility into access entitlements and risks. And the complexity of cloud infrastructure and development velocity make it virtually impossible to analyze and remediate at scale.
In this session we’ll discuss:
- The hidden threats to AWS, Azure and Google Cloud Platform
- The difference between managing human and machine identities
- How identity and network configuration affect data security
- Automating public cloud security throughout the software lifecycle