Cybersecurity cloud company Imperva launched its Sonar platform in beta to assist enterprises manage attacks across applications, data, and therefore the edge by automating their workflows and accelerating incident responses. Imperva Sonar’s UI uses ML to surface key risk areas and offers single-action resolution capabilities to streamline enterprise IT team efforts. consistent with materials Imperva provided, the company’s internal lab found that data leakage attacks — incidents involving data erroneously being transferred from an enterprise’s internal network to an external network — jumped 93% over the course of 2020. Imperva Sonar looks to fill gaps within the data lifecycle, or how sensitive data is accessed, by providing visibility into IT environments, whose multi-cloud application environments and alternative API ecosystems have grown increasingly diverse — and sophisticated .
In an interview with VentureBeat, Imperva product marketing VP Matt Hathaway explained that the goal isn’t just to scale back the amount of security providers an enterprise uses, but also to streamline the amount of consoles and sources of truth. He said companies may even see traffic across some user endpoints by watching patterns and analytics across very different use cases and getting obviate tons of point products that don’t have context. “The lateral movement brings them to databases, then piecing all of that together may be a real challenge … we add context in order that they will investigate and detect,” he added.
Imperva Sonar’s three security vectors exist at the sting , data, and applications. and therefore the company’s main focuses for the sting vector are twofold. First, the platform uses load-balancing and cache management to form websites run and access information more quickly. Second, it supports distributed denial-of-service (DDoS) and name system (DNS) protection on its content delivery network.
The applications vector aims to deconstruct advanced attacks with a unified web application and API (WAAP) protection solution that mixes a firewall, runtime protection, bot protection, client-side protection, and API security. The runtime protection, for instance , analyzes micro-services to spot which a part of an application is high risk and potentially connected to the surface world. consistent with Hathaway, Imperva has been ready to use these tools to guard the newer, cloud-distributed application types that have arisen within the last five years.