Data Theorem Launches Industry’s First App-Aware Full Stack Cloud Security Product Protecting Cloud-Native Apps, API Services and Serverless Cloud Functions

By Associated Press 26 March 2021, 12:00AM

PALO ALTO, Calif.--(BUSINESS WIRE)--Mar 25, 2021--

Data Theorem, Inc., a leading provider of modern application security, today introduced Cloud Secure, the industry’s first application-aware full stack cloud security product with attack surface management (ASM) for protecting data in cloud-native apps, API services and serverless cloud functions. As Data Theorem’s latest product powered by its award-winning Analyzer Engine, Cloud Secure is available today to identify and remediate potential data breaches found in public cloud services used to power today’s modern web and mobile applications.

This press release features multimedia. View the full release here: https://www.businesswire.com/news/home/20210325005281/en/

Data Theorem’s Analyzer Engine provides Full Stack Attack Surface Management including API, Mobile, Web, and Cloud Security. (Graphic: Data Theorem)

The explosion of applications built in the cloud creates new cloud data privacy concerns, but security tools and IT security practices have been slow to modernize for newer applications. Security professionals need better tools and software services for cloud data protection that provide automated end-to-end vulnerability assessment and remediation. The practices of manual pen-testing and consulting engagements do not keep pace with DevOps teams building and updating cloud-native applications.

According to IDC, “By 2023, over 500 million digital apps and services will be developed and deployed using cloud-native approaches – the same number of apps developed in the last 40 years. Most of these will be targeted at industry-specific digital transformation use cases.”

Cloud Secure is the industry’s first solution delivering attack surface management security for cloud-native applications that starts at the client layer (mobile and web), protects the network layer (REST and GraphQL APIs), and extends down through the underlying infrastructure (cloud services). Its combination of attack surface management and defensive protections enables both offensive and defensive security capabilities to best prevent data breaches of cloud-native applications and serverless cloud functions.

Most enterprises today build applications with multiple third-party code sources and distribute their application backend services across multiple clouds. However, data leaks and misconfiguration of code and underlying cloud services can have disastrous impacts on APIs, and mobile and web applications built and deployed in the cloud. Any business with cloud-native applications needs full stack application protection from offensive tools (attack surface management) that attackers employ daily to look for exploits and vulnerabilities in applications. However, offensive tools alone are insufficient for a comprehensive AppSec program. Customers need defensive tools such as cloud security posture management (CSPM) for compliance monitoring and policy enforcement along with auto-remediation to immediately fix cloud configuration mishaps that can directly lead to a breach of sensitive data. Data Theorem has delivered multiple Cloud Hacker Toolkits, including a new Defensive Protection Toolkit for Serverless apps. The Serverless Hacker Toolkit provides an AWS Lambda Extension to enforce policy controls around authentication, authorization, encryption, API throttling, and attack protections such as OWASP API Top 10, SSRF, SQLi, and XSS.

According to Gartner, “Eighty-five percent of all enterprise web traffic is toward cloud-based applications. Almost half of all enterprise data is stored in the cloud, and nearly a third of all confirmed data breaches in 2019 were caused by application security issues.” 1

Cloud Secure, Data Theorem’s latest product powered by its award-winning Analyzer Engine, is designed specifically to help organizations secure their cloud-native applications and address regulatory compliance for cloud monitoring and reporting. Data Theorem is one of the first vendors to provide a full stack application security analyzer that connects attack surfaces of applications starting at the client layers found in mobile and web, the network layers found in APIs, and the infrastructure layers found in cloud services.

“Organizations have long utilized Data Theorem for securing their apps and API services,” said Doug Dooley, Data Theorem COO. “Our Hacker Toolkits are uncovering new attack vectors in their applications and preventing data breaches for our customers. Now we are delivering the latest in cloud data security innovations to help protect applications and sensitive data found in multi-cloud environments. Cloud Secure helps round out Data Theorem’s full stack AppSec portfolio with both offensive and defensive protections.”

For years, partners have counted on Data Theorem for API, mobile and web application security software. Now they can provide a broader set of capabilities that uniquely address their clients’ cloud-native application security needs. This also positions Data Theorem as a complementary offering for cloud compliance and cloud-centric security audits.

Data Theorem’s broad AppSec portfolio protects organizations from data breaches with application security testing and protection for modern web frameworks, API-driven microservices and cloud resources. Its solutions are powered by its award-winning Analyzer Engine, which leverages a new type of dynamic and run-time analysis that is fully integrated into the CI/CD process, and enables organizations to conduct continuous, automated security inspection and remediation. Data Theorem’s AppSec portfolio secures mobile apps, cloud-driven APIs, and modern web applications.

Availability and Pricing

Cloud Secure is available today for a free 30-day trial on the AWS Marketplace, Azure Marketplace, and Google Marketplace. Pricing starts at $200 USD monthly for Cloud Security Posture Management (CSPM) and $4,000 USD monthly for the Cloud Hacker Toolkits (CHT). Enterprise customers can contact [email protected] for large-scale pricing options.

For more information, see https://www.datatheorem.com/products/cloud-secure.

Note 1 – Gartner, Inc. “Security of Applications and Data Primer for 2021,” by Dionisio Zumerle and Bart Willensen. Jan. 29, 2021.

About Data Theorem

Data Theorem is a leading provider of modern application security. Its core mission is to analyze and secure any modern application anytime, anywhere. The award-winning Data Theorem Analyzer Engine continuously analyzes APIs, Web, Mobile, and Cloud applications in search of security flaws and data privacy gaps. Data Theorem products help organizations prevent AppSec data breaches. The company has detected more than 1 billion application eavesdropping incidents and currently secures more than 8,000 modern applications for its enterprise customers around the world. Data Theorem is headquartered in Palo Alto, Calif., with offices in New York and Paris. For more information visit www.datatheorem.com.

Data Theorem and TrustKit are trademarks of Data Theorem, Inc. All other trademarks are the property of their respective owners.

View source version on businesswire.com:https://www.businesswire.com/news/home/20210325005281/en/

CONTACT: Dan Spalding

[email protected]

(408) 960-9297

KEYWORD: CALIFORNIA UNITED STATES NORTH AMERICA

INDUSTRY KEYWORD: SOFTWARE NETWORKS INTERNET DATA MANAGEMENT TECHNOLOGY MOBILE/WIRELESS OTHER TECHNOLOGY SECURITY

SOURCE: Data Theorem

Copyright Business Wire 2021.

PUB: 03/25/2021 08:00 AM/DISC: 03/25/2021 08:01 AM

http://www.businesswire.com/news/home/20210325005281/en

By Associated Press 26 March 2021, 12:00AM

Trending Stories

Samoa Observer

Upgrade to Premium

Subscribe to
Samoa Observer Online

Enjoy unlimited access to all our articles on any device + free trial to e-Edition. You can cancel anytime.

>