{"id":1197,"date":"2021-11-27T11:20:51","date_gmt":"2021-11-27T11:20:51","guid":{"rendered":"http:\/\/www.cyberdna.com.au\/cyber-automation\/?page_id=1197"},"modified":"2021-12-03T16:35:47","modified_gmt":"2021-12-03T16:35:47","slug":"cloud-security","status":"publish","type":"page","link":"https:\/\/www.cyberdna.com.au\/cyber-automation\/cloud-security\/","title":{"rendered":"Cloud Security"},"content":{"rendered":"\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-eqpe4t-22227f829f7f7420ee4fb5a1910d71fc\">\n.avia-section.av-eqpe4t-22227f829f7f7420ee4fb5a1910d71fc .av-parallax .av-parallax-inner{\nbackground-repeat:no-repeat;\nbackground-image:url(https:\/\/www.cyberdna.com.au\/cyber-automation\/wp-content\/uploads\/2021\/11\/improving-cloud-security-1553193784543.jpg);\nbackground-position:50% 50%;\nbackground-attachment:scroll;\n}\n.avia-section.av-eqpe4t-22227f829f7f7420ee4fb5a1910d71fc .av-section-color-overlay{\nopacity:0.4;\nbackground-color:#474747;\n}\n<\/style>\n<div id='av_section_1'  class='avia-section av-eqpe4t-22227f829f7f7420ee4fb5a1910d71fc main_color avia-section-huge avia-no-border-styling  avia-builder-el-0  el_before_av_section  avia-builder-el-first  avia-full-stretch av-parallax-section avia-bg-style-parallax av-section-color-overlay-active  av-minimum-height av-minimum-height-20  container_wrap fullsize'  data-section-bg-repeat='stretch' data-av_minimum_height_pc='20'><div class='av-parallax' data-avia-parallax-ratio='0.3' ><div class='av-parallax-inner main_color avia-full-stretch'><\/div><\/div><div class='av-section-color-overlay-wrap'><div class=\"av-section-color-overlay\"><\/div><a href='#next-section' title='' class='scroll-down-link ' aria-hidden='true' data-av_icon='\ue877' data-av_iconfont='entypo-fontello'><\/a><div class='container av-section-cont-open' ><main  role=\"main\" itemprop=\"mainContentOfPage\"  class='template-page content  av-content-full alpha units'><div class='post-entry post-entry-type-page post-entry-1197'><div class='entry-content-wrapper clearfix'>\n<div class='flex_column av-17wj2l-b6395288084fbdde04998e6c0f8c2040 av_one_fifth  avia-builder-el-1  el_before_av_three_fifth  avia-builder-el-first  first flex_column_div '   ><\/div><div class='flex_column av-b9wxql-44f5984c3917382499bfd72bdc6a0c2b av_three_fifth  avia-builder-el-2  el_after_av_one_fifth  el_before_av_one_fifth  flex_column_div '   ><p>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-kwhq3ltu-5d475ec639e4f09ad4776c43cba9a0b1\">\n#top .av-special-heading.av-kwhq3ltu-5d475ec639e4f09ad4776c43cba9a0b1{\npadding-bottom:10px;\ncolor:#ffffff;\nfont-size:60px;\n}\n.av-special-heading.av-kwhq3ltu-5d475ec639e4f09ad4776c43cba9a0b1 .special-heading-inner-border{\nborder-color:#ffffff;\n}\n<\/style>\n<div  class='av-special-heading av-kwhq3ltu-5d475ec639e4f09ad4776c43cba9a0b1 av-special-heading-h1 custom-color-heading blockquote modern-quote modern-centered  avia-builder-el-3  el_before_av_hr  avia-builder-el-first  av-thin-font av-inherit-size '><h1 class='av-special-heading-tag '  itemprop=\"headline\"  ><strong>Cloud Security<\/strong><\/h1><div class='special-heading-border'><div class='special-heading-inner-border'><\/div><\/div><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-8qr9b1-4c9445b023afe91dc5ec7540948a0d40\">\n#top .hr.av-8qr9b1-4c9445b023afe91dc5ec7540948a0d40{\nmargin-top:40px;\nmargin-bottom:40px;\n}\n.hr.av-8qr9b1-4c9445b023afe91dc5ec7540948a0d40 .hr-inner{\nwidth:50px;\nborder-color:#ffffff;\n}\n<\/style>\n<div  class='hr av-8qr9b1-4c9445b023afe91dc5ec7540948a0d40 hr-custom  avia-builder-el-4  el_after_av_heading  avia-builder-el-last  hr-center hr-icon-no '><span class='hr-inner inner-border-av-border-fat'><span class=\"hr-inner-style\"><\/span><\/span><\/div><\/p><\/div><div class='flex_column av-skej1-fff81c2f7c354a94166f4074a6117314 av_one_fifth  avia-builder-el-5  el_after_av_three_fifth  avia-builder-el-last  flex_column_div '   ><\/div>\n\n<\/div><\/div><\/main><!-- close content main element --><\/div><\/div><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-kwhq4qsa-d7fc5a4f14379243186688f80f64326e\">\n.avia-section.av-kwhq4qsa-d7fc5a4f14379243186688f80f64326e{\nmargin-top:30px;\nmargin-bottom:30px;\n}\n<\/style>\n<div id='av_section_2'  class='avia-section av-kwhq4qsa-d7fc5a4f14379243186688f80f64326e main_color avia-section-no-padding avia-no-border-styling  avia-builder-el-6  el_after_av_section  el_before_av_section  avia-bg-style-scroll  container_wrap fullsize'  ><div class='container av-section-cont-open' ><div class='template-page content  av-content-full alpha units'><div class='post-entry post-entry-type-page post-entry-1197'><div class='entry-content-wrapper clearfix'>\n<div class='flex_column av-49ifjh-3eaf5ca94eeeb75a230c9e9755775de6 av_one_full  avia-builder-el-7  avia-builder-el-no-sibling  first flex_column_div '   ><style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-kwlqq423-fbfaf341ee66615cd07243fafc0afadc\">\n#top .av-special-heading.av-kwlqq423-fbfaf341ee66615cd07243fafc0afadc{\npadding-bottom:10px;\ncolor:#0a0a0a;\nfont-size:36px;\n}\n.av-special-heading.av-kwlqq423-fbfaf341ee66615cd07243fafc0afadc .special-heading-inner-border{\nborder-color:#0a0a0a;\n}\n<\/style>\n<div  class='av-special-heading av-kwlqq423-fbfaf341ee66615cd07243fafc0afadc av-special-heading-h1 custom-color-heading blockquote modern-quote modern-centered  avia-builder-el-8  avia-builder-el-no-sibling  av-thin-font av-inherit-size '><h1 class='av-special-heading-tag '  itemprop=\"headline\"  >Without hassle of agents, through Side Scanning technology you can have a complete view of your <strong>cloud-based assets across major cloud providers.<\/strong><\/h1><div class='special-heading-border'><div class='special-heading-inner-border'><\/div><\/div><\/div><\/div>\n\n<\/div><\/div><\/div><!-- close content main div --><\/div><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-kwhq6b79-ca96f1ddb1ff4e18ff08dd230694dd4c\">\n.avia-section.av-kwhq6b79-ca96f1ddb1ff4e18ff08dd230694dd4c{\nmargin-top:0px;\nmargin-bottom:30px;\n}\n<\/style>\n<div id='av_section_3'  class='avia-section av-kwhq6b79-ca96f1ddb1ff4e18ff08dd230694dd4c main_color avia-section-no-padding avia-no-border-styling  avia-builder-el-9  el_after_av_section  el_before_av_section  avia-bg-style-scroll  container_wrap fullsize'  ><div class='container av-section-cont-open' ><div class='template-page content  av-content-full alpha units'><div class='post-entry post-entry-type-page post-entry-1197'><div class='entry-content-wrapper clearfix'>\n<div class='flex_column_table av-kwhq6r8i-2e7d6895b208bc1845be83738ac9e891 sc-av_two_fifth av-equal-height-column-flextable'><div class='flex_column av-kwhq6r8i-2e7d6895b208bc1845be83738ac9e891 av_two_fifth  avia-builder-el-10  el_before_av_three_fifth  avia-builder-el-first  first flex_column_table_cell av-equal-height-column av-align-middle '   ><style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-kwhq8m7t-e9bc858a87471994df56b4973a462ee0\">\n.av_textblock_section.av-kwhq8m7t-e9bc858a87471994df56b4973a462ee0 .avia_textblock{\ncolor:#3b4a73;\nfont-size:16px;\n}\n<\/style>\n<section  class='av_textblock_section av-kwhq8m7t-e9bc858a87471994df56b4973a462ee0 '  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock av_inherit_color '  itemprop=\"text\" ><ul style=\"font-weight: 500;\">\n<li>Vulnerability management: Discover and prioritise vulnerabilities in your cloud environment<\/li>\n<li>Malware Detection: Cloud Malware detection without any performance impact<\/li>\n<li>Misconfigurations: Fix misconfigurations before attackers discover them<\/li>\n<li>Lateral Movement Risk: Expose hidden Lateral Movement risks<\/li>\n<li>Identity and Access Management: Discover common and obscure IAM misconfigurations<\/li>\n<li>Sensitive Data Detection: Locate misplaced and unprotected sensitive data<\/li>\n<\/ul>\n<\/div><\/section><\/div><div class='av-flex-placeholder'><\/div><div class='flex_column av-kwhq72y7-df89739a6dad1e8c842b24611c4d4d5a av_three_fifth  avia-builder-el-12  el_after_av_two_fifth  avia-builder-el-last  flex_column_table_cell av-equal-height-column av-align-middle '   ><style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-kwnpu69r-f2341c83f424fb66869e2b9c368f0a91\">\n.avia-image-container.av-kwnpu69r-f2341c83f424fb66869e2b9c368f0a91 .av-image-caption-overlay-center{\ncolor:#ffffff;\n}\n<\/style>\n<div  class='avia-image-container av-kwnpu69r-f2341c83f424fb66869e2b9c368f0a91 av-styling- avia-align-center  avia-builder-el-13  avia-builder-el-no-sibling  '  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" ><div class=\"avia-image-container-inner\"><div class=\"avia-image-overlay-wrap\"><img class='wp-image-1200 avia-img-lazy-loading-not-1200 avia_image' src=\"https:\/\/www.cyberdna.com.au\/cyber-automation\/wp-content\/uploads\/2021\/11\/sidescanning-technology.png\" alt='sidescanning technology' title='sidescanning technology'  height=\"439\" width=\"780\"  itemprop=\"thumbnailUrl\" srcset=\"https:\/\/www.cyberdna.com.au\/cyber-automation\/wp-content\/uploads\/2021\/11\/sidescanning-technology.png 780w, https:\/\/www.cyberdna.com.au\/cyber-automation\/wp-content\/uploads\/2021\/11\/sidescanning-technology-300x169.png 300w, https:\/\/www.cyberdna.com.au\/cyber-automation\/wp-content\/uploads\/2021\/11\/sidescanning-technology-768x432.png 768w, https:\/\/www.cyberdna.com.au\/cyber-automation\/wp-content\/uploads\/2021\/11\/sidescanning-technology-705x397.png 705w\" sizes=\"(max-width: 780px) 100vw, 780px\" \/><\/div><\/div><\/div><\/div><\/div><!--close column table wrapper. Autoclose: 1 -->\n\n<\/div><\/div><\/div><!-- close content main div --><\/div><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-2hjel9-d8294b88f7c4fc8f61f6e34e187cc361\">\n.avia-section.av-2hjel9-d8294b88f7c4fc8f61f6e34e187cc361{\nmargin-top:0px;\nmargin-bottom:30px;\n}\n<\/style>\n<div id='av_section_4'  class='avia-section av-2hjel9-d8294b88f7c4fc8f61f6e34e187cc361 main_color avia-section-no-padding avia-no-border-styling  avia-builder-el-14  el_after_av_section  el_before_av_section  avia-bg-style-scroll  container_wrap fullsize'  ><div class='container av-section-cont-open' ><div class='template-page content  av-content-full alpha units'><div class='post-entry post-entry-type-page post-entry-1197'><div class='entry-content-wrapper clearfix'>\n<div class='flex_column av-kwhqeg5z-235a0e000510e0a9864da92a45146e8f av_one_full  avia-builder-el-15  avia-builder-el-no-sibling  first flex_column_div '   ><style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-kwhqhrbf-1b5d6bd06b77f85569e80e309038cf0b\">\n.av_textblock_section.av-kwhqhrbf-1b5d6bd06b77f85569e80e309038cf0b .avia_textblock{\ncolor:#3b4a73;\nfont-size:16px;\n}\n<\/style>\n<section  class='av_textblock_section av-kwhqhrbf-1b5d6bd06b77f85569e80e309038cf0b '  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock av_inherit_color '  itemprop=\"text\" ><p>We solve several significant problems that exist in current cloud security solutions:<\/p>\n<ul style=\"font-weight: 500;\">\n<li>Cumbersome deployment: Installing and maintaining agents on every cloud workload results in performance degradation, organizational friction, and extremely high TCO.<\/li>\n<li>Coverage gaps: Partial deployment of agents causes serious blind spots. On average, we found that less than 50% of assets are covered by agent-based solutions.<\/li>\n<li>Performance degradation: Cloud security solutions based on agents or network scanners have a significant impact on application performance and system resources.<\/li>\n<li>Alert fatigue: Security teams waste valuable time manually sifting through high volume, low-risk alert data which lack prioritization and actionable details, resulting in alert fatigue<br \/>\nand missed critical issues.<\/li>\n<li>Multiple disparate tools: With no single pane of glass, overworked security teams face the complexity and heavy administrative burden of managing multiple siloed tools.<\/li>\n<\/ul>\n<\/div><\/section><\/div>\n\n<\/div><\/div><\/div><!-- close content main div --><\/div><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-469ekt-5f981fdbbf82ebcec293537e70d81e3e\">\n.avia-section.av-469ekt-5f981fdbbf82ebcec293537e70d81e3e{\nmargin-top:0px;\nmargin-bottom:30px;\n}\n<\/style>\n<div id='av_section_5'  class='avia-section av-469ekt-5f981fdbbf82ebcec293537e70d81e3e main_color avia-section-no-padding avia-no-border-styling  avia-builder-el-17  el_after_av_section  el_before_av_section  avia-bg-style-scroll  container_wrap fullsize'  ><div class='container av-section-cont-open' ><div class='template-page content  av-content-full alpha units'><div class='post-entry post-entry-type-page post-entry-1197'><div class='entry-content-wrapper clearfix'>\n<div class='flex_column av-2hh9fh-e773248f4c203f5532226c246bead5cb av_one_full  avia-builder-el-18  avia-builder-el-no-sibling  first flex_column_div '   ><style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-kwhqkd4v-6df416d7c9e11b105086b2418d9894f0\">\n.avia-image-container.av-kwhqkd4v-6df416d7c9e11b105086b2418d9894f0 .av-image-caption-overlay-center{\ncolor:#ffffff;\n}\n<\/style>\n<div  class='avia-image-container av-kwhqkd4v-6df416d7c9e11b105086b2418d9894f0 av-styling- avia-align-center  avia-builder-el-19  avia-builder-el-no-sibling  '  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" ><div class=\"avia-image-container-inner\"><div class=\"avia-image-overlay-wrap\"><img class='wp-image-1207 avia-img-lazy-loading-not-1207 avia_image' src=\"https:\/\/www.cyberdna.com.au\/cyber-automation\/wp-content\/uploads\/2021\/11\/sidescanning-technology-3.jpg.png\" alt='sidescanning technology 3.jpg' title='sidescanning technology 3.jpg'  height=\"466\" width=\"767\"  itemprop=\"thumbnailUrl\" srcset=\"https:\/\/www.cyberdna.com.au\/cyber-automation\/wp-content\/uploads\/2021\/11\/sidescanning-technology-3.jpg.png 767w, https:\/\/www.cyberdna.com.au\/cyber-automation\/wp-content\/uploads\/2021\/11\/sidescanning-technology-3.jpg-300x182.png 300w, https:\/\/www.cyberdna.com.au\/cyber-automation\/wp-content\/uploads\/2021\/11\/sidescanning-technology-3.jpg-705x428.png 705w\" sizes=\"(max-width: 767px) 100vw, 767px\" \/><\/div><\/div><\/div><\/div>\n\n<\/div><\/div><\/div><!-- close content main div --><\/div><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-av_section-f7a622a192eb4e7c4953e9c0865ff204\">\n.avia-section.av-av_section-f7a622a192eb4e7c4953e9c0865ff204{\nmargin-top:20px;\nmargin-bottom:0px;\n}\n.avia-section.av-av_section-f7a622a192eb4e7c4953e9c0865ff204 .av-parallax .av-parallax-inner{\nbackground-repeat:no-repeat;\nbackground-image:url(https:\/\/www.cyberdna.com.au\/cyber-automation\/wp-content\/uploads\/2021\/11\/pexels-eduardo-dutra-2115217.jpg);\nbackground-position:50% 50%;\nbackground-attachment:scroll;\n}\n.avia-section.av-av_section-f7a622a192eb4e7c4953e9c0865ff204 .av-section-color-overlay{\nopacity:0.5;\nbackground-color:#ffffff;\n}\n<\/style>\n<div id='av_section_6'  class='avia-section av-av_section-f7a622a192eb4e7c4953e9c0865ff204 main_color avia-section-default avia-no-border-styling  avia-builder-el-20  el_after_av_section  avia-builder-el-last  avia-full-stretch av-parallax-section avia-bg-style-parallax av-section-color-overlay-active  container_wrap fullsize'  data-section-bg-repeat='stretch'><div class='av-parallax' data-avia-parallax-ratio='0.3' ><div class='av-parallax-inner main_color avia-full-stretch'><\/div><\/div><div class='av-section-color-overlay-wrap'><div class=\"av-section-color-overlay\"><\/div><div class='container av-section-cont-open' ><div class='template-page content  av-content-full alpha units'><div class='post-entry post-entry-type-page post-entry-1197'><div class='entry-content-wrapper clearfix'>\n<div class='flex_column av-av_one_full-516b7eac7a9c6cd1b746245801c7486c av_one_full  avia-builder-el-21  avia-builder-el-no-sibling  first flex_column_div '   ><p>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-av_heading-8677320905dc9bdec3e6c88e4c576590\">\n#top .av-special-heading.av-av_heading-8677320905dc9bdec3e6c88e4c576590{\npadding-bottom:10px;\ncolor:#000000;\nfont-size:40px;\n}\n.av-special-heading.av-av_heading-8677320905dc9bdec3e6c88e4c576590 .special-heading-inner-border{\nborder-color:#000000;\n}\n<\/style>\n<div  class='av-special-heading av-av_heading-8677320905dc9bdec3e6c88e4c576590 av-special-heading-h1 custom-color-heading blockquote modern-quote modern-centered  avia-builder-el-22  el_before_av_button  avia-builder-el-first  av-thin-font av-inherit-size '><h1 class='av-special-heading-tag '  itemprop=\"headline\"  ><strong>Get in touch with us and receive more information on how it can help you<\/strong><\/h1><div class='special-heading-border'><div class='special-heading-inner-border'><\/div><\/div><\/div><br \/>\n<div  class='avia-button-wrap avia-button-center  avia-builder-el-23  el_after_av_heading  avia-builder-el-last ' ><a href='http:\/\/www.cyberdna.com.au\/cyber-automation\/contact\/'  class='avia-button av-av_button-4869be09c2e71144d3515a4d55b0849a avia-icon_select-no avia-size-large avia-position-center avia-color-theme-color ' ><span class='avia_iconbox_title' >Contact<\/span><\/a><\/div><\/p><\/div>\n\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":[],"_links":{"self":[{"href":"https:\/\/www.cyberdna.com.au\/cyber-automation\/wp-json\/wp\/v2\/pages\/1197"}],"collection":[{"href":"https:\/\/www.cyberdna.com.au\/cyber-automation\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cyberdna.com.au\/cyber-automation\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberdna.com.au\/cyber-automation\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberdna.com.au\/cyber-automation\/wp-json\/wp\/v2\/comments?post=1197"}],"version-history":[{"count":14,"href":"https:\/\/www.cyberdna.com.au\/cyber-automation\/wp-json\/wp\/v2\/pages\/1197\/revisions"}],"predecessor-version":[{"id":1460,"href":"https:\/\/www.cyberdna.com.au\/cyber-automation\/wp-json\/wp\/v2\/pages\/1197\/revisions\/1460"}],"wp:attachment":[{"href":"https:\/\/www.cyberdna.com.au\/cyber-automation\/wp-json\/wp\/v2\/media?parent=1197"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}