C3M Launches Cloud Security Assessment Service in North America

14
C3M Launches Cloud Security Assessment Service in North America

C3M, a leader in Cloud Security Posture Management (CSPM) and Cloud Identity and Entitlement Management (CIEM) today announces the launch of its Cloud Security Assessment as a Service in North America helping companies to gain immediate deep visibility into their cloud infrastructure and cloud security posture.

The fully automated, 100% API based and completely agentless service discovers cloud assets of an organisation and identifies risky configurations. Comparing baseline cloud security posture with industry best practices, the C3M assessment service also checks the company’s resources against security policies and multiple compliance standards including FedRamp and NIST.

Businesses migrating to the cloud are faced with a unique set of challenges including visibility of cloud resources and security posture. With 99% of misconfigurations going unnoticed the C3M platform assesses the company’s cloud for misconfigurations and cloud best practices, generating reports in real-time.

Also Read: Building a Robust Threat Hunting Program on a Limited Budget

“It’s imperative Enterprises identify risks within their cloud infrastructure,” said Paddy Viswanathan, CEO of C3M. “Our automated security assessment highlights the point in time limitations and weaknesses within an organization’s cloud. We’ve already achieved great success in North America, most notably, with Equifax as a major customer. We believe the launch of our new Cloud Security Assessment as a Service, will enable further market penetration.”

C3M Cloud Security Assessment as a Service works by the customer creating a read-only service account that C3M uses to onboard cloud accounts. Metadata of cloud accounts is pulled down using APIs and the data is evaluated for conformity to security and compliance policies.

Within 30 minutes, reports provide an inventory of all assets across AWS, GCP, and Azure clouds: best practice on avoiding misconfigurations across the cloud environment and policy compliance, including violating controls and recommended fixes.

For more such updates follow us on Google News ITsecuritywire News