Company’s Adaptive Intention Engine Deploys Without Friction and Enables Customers to Instantly Identify and React to Changes in the Cloud
San Jose, CA, October 17, 2018 – ShieldX, the pioneer in elastic security, today announced the release of the Adaptive Intention Engine to help security teams instantly identify and react to changes in cloud environments, empowering security to operate at the speed of business. Traditionally, enterprise cloud environments change at such a fast pace that security teams struggle to adapt since legacy tools require manual intervention. With this release, ShieldX is delivering automated streaming protection and adaption so organizations can ensure cloud investments stay secure in the face of rapid changes.
To protect multi-cloud environments, vendors require agents which severely hamper enterprise multi-cloud security initiatives since they are:
- Hard to use—Whenever enterprises add new software to mission critical systems, especially within the data center, IT groups must test the configuration to ensure nothing breaks. Agents, by nature, add tremendous deployment and maintenance costs. Worse, deploying agents requires coordinating and executing a distributed QA effort, potentially across every enterprise business unit. And when agents change, the process repeats again.
- Limited in security functionality—Agents act as a parasite on workloads, draining valuable compute cycles. ShieldX is the only vendor providing multi-cloud security without agents.
The key capabilities included in the ShieldX Adaptive Intention Engine include:
- Continuous discovery— ShieldX continuously discovers and catalogs assets to provide visibility across cloud environments and within virtualized data centers. Then, using machine learning, ShieldX leverages internal and external intelligence to automatically define and implement security policies at the perimeter and within the data center. ShieldX provides situational awareness about applications running in the dark corners of virtualized data centers that users typically didn’t know about without introducing new loads on existing security tools.
- Intent-based security: With ShieldX, teams apply their security intention through a broad set of ShieldX controls that include application visibility, workload protection, microsegmentation, IPS, firewall, malware detection and more. The security policies enforced by ShieldX not only factor in application connectivity models, but also the high-level intent of the connection based on business policies. Once the policy is defined, ShieldX inserts the security controls via each cloud provider’s orchestration engines to realize security intent automatically, providing a consistent security model regardless of the location of the application and data.
“With the maturation of the cloud, we’re at a pivot point as more organizations look toward the cloud as a viable, affordable and easily manageable option for technology infrastructure. However, migration to the cloud comes with the stark realization that traditional network security tools are ill-equipped for dynamic cloud environments,” stated Dr. Ratinder Ahuja, ShieldX founder and CEO. “Cloud environments change at such a rapid pace, most solutions cannot keep track of the assets in the environment, let alone threats that may be coming in. With this update, no one else in the market can detect and act on changes as fast as ShieldX with the same level of elastic security we provide.”
The ShieldX elastic security platform provides a scalable and flexible network security platform for highly-virtualized data center and IaaS networks. Featuring an elastic microservices-based technology that doesn’t require agents, enterprises can automatically define and enforce a full-stack security strategy for multi-cloud or virtualized environments, regardless of enterprise size or rate of change. With ShieldX, organizations can discover assets in the cloud, use machine learning to automate internal and external intelligence to define and implement security policies, and automatically insert security controls via microservices. With this, enterprises can implement and apply a consistent set of security controls including application visibility, workload protection, microsegmentation, IPS, firewall, malware detection and more ore.