IT Central Station is now PeerSpot: Here's why

Top 8 Cloud Security Posture Management (CSPM)

Prisma Cloud by Palo Alto NetworksMicrosoft Defender for CloudCheck Point CloudGuard Posture ManagementSkyhigh SecurityOrca SecurityC3M Cloud Control LaceworkThreat Stack Cloud Security Platform
  1. leader badge
    It has improved the overall collaboration between SecOps and DevOps. Now, instead of asking people to do something, it is a default offering in the CI/CD. There is less manual intervention and more seamless integration. It is why we don't have many dependencies across many teams, which is definitely a better state.
  2. leader badge
    When you have commissioned Defender, you have these things visible already on your dashboard. This gives the efficiency to the people to do their actual work rather than bothering about the email, sorting out the email, or looking at it through an ITSM solution, whey they have to look at the description and use cases. Efficiency increases with this optimized, ready-made solution since you don't need to invest in something externally. You can start using the dashboard and auditing capability provided from day one. Thus, you have fewer costs with a more optimized, easier-to-use solution, providing operational efficiency for your team.
  3. Buyer's Guide
    Cloud Security Posture Management (CSPM)
    August 2022
    Find out what your peers are saying about Palo Alto Networks, Microsoft, Check Point and others in Cloud Security Posture Management (CSPM). Updated: August 2022.
    620,600 professionals have used our research since 2012.
  4. leader badge
    The administration portal panel is very intuitive.The most valuable feature of Check Point CloudGuard Posture Management is the training.
  5. What I found most valuable in Skyhigh Security is its stability. The solution also has good KB articles that make it simple for users to do the deployment of Skyhigh Security themselves, without the need for integrators.
  6. Orca gives you great visibility into your assets. It shows you the issues and the things that you need to attend to first, by prioritizing things. You can see a lot of information that is not always visible, even to DevOps, to help you know about the machines and their status. It's very easy to see everything in a single dashboard. That makes it a very useful tool.
  7. We haven't had an issue with stability so far.
  8. report
    Use our free recommendation engine to learn which Cloud Security Posture Management (CSPM) solutions are best for your needs.
    620,600 professionals have used our research since 2012.
  9. The best feature, in my opinion, is the ease of use.
  10. Technical support is very helpful.The most valuable feature is the SecOps because they have our back and they help us with the reports... It's like having an extension of your team. And then, it grows with you.

Advice From The Community

Read answers to top Cloud Security Posture Management (CSPM) questions. 620,600 professionals have gotten help from our community of experts.
Netanya Carmi - PeerSpot reviewer
Netanya Carmi
Content Manager
PeerSpot (formerly IT Central Station)
Jun 01 2022

How do CSPM tools help?

Janet Staver - PeerSpot reviewer
Janet StaverHaving a CSPM is crucial for any organization, since it identifies and… more »
2 Answers
Netanya Carmi - PeerSpot reviewer
Netanya Carmi
Content Manager
PeerSpot (formerly IT Central Station)
Evgeny Belenky - PeerSpot reviewer
Evgeny Belenky
PeerSpot (formerly IT Central Station)
May 20 2022

Hi infosec professionals,

Can you share your best practices and advice to follow (by an enterprise) when implementing IAM in the Cloud?

Thanks for your help in educating our community!

Ladislav Nyiri - PeerSpot reviewer
Ladislav NyiriIdentity and access management in the cloud - there are more interpretations of… more »
6 Answers

Cloud Security Posture Management (CSPM) Articles

Evgeny Belenky - PeerSpot reviewer
Evgeny Belenky
PeerSpot (formerly IT Central Station)
Aug 02 2022
Dear professionals, Welcome back to PeerSpot's Community Spotlight! Below you can find the latest hot topics posted by your fellow PeerSpot Community members. Read articles, answer questions, and contribute to discussions that are relevant to you and your expertise. Or ask your peers for insight...
Read More »
Evgeny Belenky - PeerSpot reviewer
Evgeny Belenky@Chris Childerhose, @PraveenKambhampati, @Deena Nouril, @Shibu Babuchandran and… more »
1 Comment
Janet Staver - PeerSpot reviewer
Janet Staver
Tech Blogger
Jun 20 2022
As more organizations shift to the cloud, securing those cloud environments has become a top priority. With cloud environments, companies are facing challenges, with more regulations, a higher rate of data loss, and an increase in the number of attacks. To handle these challenges, organizations...
Read More »
Netanya Carmi - PeerSpot reviewer
Netanya Carmi
Content Manager
PeerSpot (formerly IT Central Station)
May 03 2022
PeerSpot’s crowdsourced user review platform helps technology decision-makers around the world to better connect with peers and other independent experts who provide advice without vendor bias. Our users have ranked these solutions according to their valuable features, and discuss which features...
Read More »

Cloud Security Posture Management (CSPM) Topics

How does cloud security posture management work?

There are three ways cloud security posture management works to offer protection:

1. Visibility: Enterprise CSPMs provide visibility into your cloud assets and configurations to discover misconfigurations, changes in policy or metadata, and more. They also help your organization manage all of these policies through the use of a centralized console.

    2. Manages and remediates: A CSPM eliminates security risks and accelerates the delivery process by comparing cloud application configurations to industry and organizational benchmarks so that violations can be identified and remediated. A CSPM also reduces human error that could increase your risk of costly breaches.

      3. Identifies new potential threats: CSPMs proactively detect threats across the application development lifecycle by monitoring your cloud environments for inappropriate access and anomalies that may indicate malicious activity.

        Why do you need a CSPM?

        A CSPM is necessary for discovering and automatically remediating threats, misconfigurations, misuse, and compliance violations in public clouds. Because misconfigurations in the cloud are one of the most common causes of data breaches, CSPM tools come forth as the clear solution to bringing organizations peace of mind.

        Who needs CSPM?

        CSPMs are typically used by organizations that have adopted a cloud-first strategy and want to extend their cloud best practices to hybrid cloud and multi-cloud environments. However, a CSPM is recommended for all enterprises, big or small. CSPMs are beneficial for all organizations because traditional security doesn’t work in the cloud since there is no perimeter to protect, manual processes cannot occur with the necessary scale or speed, and the lack of centralization makes visibility extremely difficult to achieve.

        Which policy or security violations can a CSPM help uncover?

        By leveraging the potential of a CSPM, organizations can uncover:

        • Data storage exposed to public
        • Lack of encryption
        • Permission errors
        • Misconfigurations
        • Missing multi-factor authentication
        • Infrequent encryption key rotation
        What is CSPM and CWPP?

        A CWPP, otherwise known as a cloud workload protection platform, is an agent-based solution that helps address the unique requirements of server workload protection. A CWPP offers network segmentation, traffic visibility, and firewalling, anti-malware scanning and system integrity management, and application control, along with log management, monitoring, and much more. Some of the major benefits of a CWPP are that it scales easily, provides threat and data protection across the board, and leverages user workflows by synthesizing them into an ongoing continuum. The main differences between CSPM and CWPP are that CSPMs work to prevent software configuration vulnerabilities, while CWPPs perform security functions across a plethora of environments. In addition, while a CSPM is primarily used to identify vulnerable cloud configuration settings, CWPPs manage cloud vulnerabilities.

        What is the difference between SSPM and CSPM?

        While both CSPMs and SSPMs (SaaS security posture management solutions) evaluate security posture, CSPMs focus on cloud services [like Amazon Web Services (AWS), Microsoft Azure, Google Cloud, and other Cloud Service Provider (CSP) infrastructure-as-a-service (IaaS) environments], and SSPMs focus on SaaS applications. CSPMs analyze entire cloud deployments at multiple levels of the computing stack and can scan IaaS, PaaS, SaaS, containers, and serverless code. CSPM tools also have some capabilities that SSPM tools do not have, such as incident response and vulnerability detection.

        CSPM Tools Benefits

        CSPM tools offer several benefits, including:

        • Unified visibility: CSPMs work to stop accidental vulnerabilities by providing unified visibility across multi-cloud environments. This eliminates the need to check multiple consoles and normalize data from multiple vendors.
        • Detects hidden threats: Through its continuous scans of the entire infrastructure, CSPM uncovers hidden threats, enabling faster detection, which results in shorter time to remediation.
        • Single console: With a CSPM, all security group policies across accounts, regions, projects, and virtual networks can be managed through a single console.
        • Reduced number of alerts: CSPMs reduce the number of alerts because they focus on the areas attackers are most likely to exploit; vulnerabilities are prioritized based on the environment; and vulnerable code is prevented from reaching production.
        • Data risk assessment: With a CSPM, you can easily spot potential data risks that could be caused by human error, such as vulnerabilities caused by developers attempting to launch a new application or virtual machines that could leave the organization’s network exposed. If a CSPM solution is in place, data risks in cloud environments can be proactively identified and mitigated.
        • Account permissions: CSPMs continuously monitor account privileges. If a user accesses a resource that is not permitted in their department or job role, then it will be flagged instantly and prevented.
        • Enforced governance: Having a CSPM can help enforce governance everywhere and alleviate pressure for security and dev teams.
        • Compliance: A CSPM can evaluate your cloud security posture against common compliance frameworks and flag potential vulnerabilities. It also provides on-demand and audit-ready reports that span multiple data sources.
        • Automatic remediation of misconfigurations: A CSPM sends reports and provides recommended solutions to fix a detected misconfiguration. In some instances, they automatically remedy the misconfiguration, which ensures that any potential vulnerability is immediately patched and the risk of exploitation is removed.
        CSPM Tools Features

        When selecting a CSPM solution, look for one with the following features:

        • Follows a central policy system
        • Interactive dashboard
        • Easy to use
        • User-friendly interface
        • Straightforward setup
        • Risk identification
        • Incident response
        • Improved efficiency and collaboration
        • Enables users to refuse any critical operations based on the roles assigned to them
        • Users can view the inventory of the servers across multiple accounts
        • Automatic cloud advancement tools to update users' data
        • Scans and checks data regularly to ensure that your system remains secured
        • Regular backups and updates
        • Integrated data security and entitlement controls
        • Integration with third-party systems
        • Seamless integration with DevOps pipeline stages
        • Tools to track activities in real time
        • Limited manual intervention to solve issues at the earliest
        • Ability to produce configurable, detailed reporting
        • Granular controls
        • Ability to assess cloud service provider settings and asset configurations accurately
        Buyer's Guide
        Cloud Security Posture Management (CSPM)
        August 2022
        Find out what your peers are saying about Palo Alto Networks, Microsoft, Check Point and others in Cloud Security Posture Management (CSPM). Updated: August 2022.
        620,600 professionals have used our research since 2012.