-

Orca Security Launches First Attack Path Analysis and Business Impact Score for Cloud-Native Applications

Security teams can now go well beyond prioritizing siloed alerts to focus on the handful of toxic combinations of issues leading to their crown jewels

PORTLAND, Ore.--(BUSINESS WIRE)--Orca Security, the cloud security innovation leader, today announced the industry’s first Attack Path Analysis and Business Impact Score for Cloud-Native Applications. The new capability automatically combines cloud risks and insights, including vulnerabilities, misconfigurations, and trust privileges, to surface the most critical attack paths leading to an organization’s crown jewels.

Security teams can now easily visualize organizational risk through an interactive dashboard rather than chasing siloed alerts. This approach eliminates alert fatigue, reduces time-to-remediation, and helps avoid damaging data breaches.

“Orca has given us an unprecedented level of visibility into our cloud environments. Every business unit that has adopted it thinks it is a terrific tool,” said Stacey Halota, Vice President, Information Security and Privacy at Graham Holdings.

Orca Attack Path Analysis and Business Impact Score helps curb the cloud security alert fatigue problems. The Orca Security 2022 Cloud Security Alert Fatigue Report found that more than half of respondents (55%) say their team missed critical alerts in the past, due to ineffective alert prioritization – often on a weekly and even daily basis.

“Traditional security approaches prioritize individual risks, such as a known vulnerability or misconfiguration, without considering how these risks interact with each other to endanger the company’s most critical assets,” said Avi Shua, co-founder and CEO for Orca Security. “This is an extremely ineffective way to approach cloud security. Security teams need to be focused on the context surrounding each risk and how they can be combined. Orca Attack Path Analysis and Business Impact Score dramatically boosts the effectiveness of cloud defenders to focus on the risks and attack paths that matter most.”

Orca Security Attack Path Visualization, Scoring, and Prioritization

Orca Security provides a visual representation of an attack path, along with detailed information on each step within the chain. Orca Security also assigns an overall score (from 0 to 99) to each attack path.

To calculate the score, Orca Security uses an algorithm based on multiple factors found within the attack path such as the underlying severity of a specific vulnerability and its accessibility, lateral movement risk, and business impacts – such as providing access to sensitive data and critical assets including PII, secrets, entitlements, intellectual property, financial information, and more. Security teams can also tag their crown jewels in their cloud asset inventory.

Additional Resources:

About Orca Security

Orca Security provides instant-on security and compliance for AWS, Azure, and GCP - without the gaps in coverage, alert fatigue, and operational costs of agents or sidecars. Simplify cloud security operations with a single CNAPP platform for workload and data protection, cloud security posture management (CSPM), vulnerability management, and compliance.

Orca Security prioritizes risk based on the severity of the security issue, its accessibility, and business impact. This helps you focus on the critical alerts that matter most. Orca Security is trusted by global innovators, including Databricks, Autodesk, NCR, Gannett, and Robinhood. Connect your first account in minutes: https://orca.security or take the free cloud risk assessment.

Contacts

Brendan Hughes
RH Strategic for Orca Security
orcapr@rhstrategic.com
206-264-0246

Orca Security


Release Versions

Contacts

Brendan Hughes
RH Strategic for Orca Security
orcapr@rhstrategic.com
206-264-0246

Social Media Profiles
More News From Orca Security

Orca Security Adds Agentless Cloud Detection and Response to Stop Attackers from Exposing Sensitive Data

PORTLAND, Ore.--(BUSINESS WIRE)--Orca Security, the cloud security innovation leader, today added Cloud Detection & Response (CDR) capabilities to its agentless Cloud Security Platform to help organizations detect, investigate, and respond to in-progress attacks. The Orca Platform analyzes cloud provider logs and threat intelligence feeds using machine learning and rules-based heuristics, while also providing automated remediation to prevent security issues from progressing across the softw...

Orca Security Unveils Industry’s First Context-Aware Shift Left Security to Identify and Prevent Cloud Application Security Issues Earlier in the Development Cycle

PORTLAND, Ore.--(BUSINESS WIRE)--Orca Security, the cloud security innovation leader, today announced the industry’s first cloud security solution to provide context-aware Shift Left Security for cloud infrastructure and applications. Orca Security helps DevOps teams understand the potential impact of security issues on cloud application production environments, and fix those issues earlier in the software development lifecycle (SDLC), while also providing security teams with automated remediat...

Orca Security Survey Finds Cloud Security Tool Sprawl Increasing the Flood of False Positive Alerts, Missed Critical Issues, and Team Burnout

PORTLAND, Ore.--(BUSINESS WIRE)--Orca Security, the cloud security innovation leader, today released the Orca Security 2022 Cloud Security Alert Fatigue Report, the industry’s first research report on public cloud security alert fatigue. The survey, held among over 800 IT professionals across five countries and ten industries found that more than half (55%) of respondents use three or more cloud providers and 57% have five or more cloud security tools. This combination of multi-cloud adoption a...
Back to Newsroom