Loading...
You are here:  Home  >  Education Resources For Use & Management of Data  >  Data Daily | Data News  >  Current Article

Fugue Risk Manager Protects Against Data Breaches with Self-Healing Cloud Infrastructure

By   /  November 29, 2018  /  No Comments

A recent press release reports, “Fugue, the company automating enterprise cloud security and compliance enforcement to prevent data breaches and policy violations due to misconfiguration, today announced the availability of Fugue Risk Manager. A Software-as-a-Service (SaaS) offering, Fugue Risk Manager can identify compliance violations in cloud environments and automatically remediate unauthorized infrastructure changes. Enterprise cloud teams can use Fugue Risk Manager to scan cloud infrastructure to identify policy violations for a number of compliance regimes, including Amazon Web Services (AWS) Center for Internet Security (CIS) Benchmarks, National Institute of Standards and Technology (NIST) 800-53 Rev. 4, General Data Protection Regulation (GDPR), Health Insurance Portability and Accountability Act (HIPAA), and custom, customer-specified controls. Fugue Risk Manager can then enforce known-good infrastructure baselines provisioned by the cloud team in order to identify configuration drift and automatically remediate it as soon as it occurs.”

The release goes on, “The cloud is fundamentally different than the datacenter, and it introduces new demands for security and compliance. The risk of infrastructure misconfiguration due to human error can increase with highly dynamic, API-driven cloud infrastructure and can result in data breaches, system downtime, and costly compliance violations. Fugue Risk Manager addresses this risk with a cloud-native solution to provide security, compliance, and infrastructure teams with a single source of truth for their cloud infrastructure and the assurance that it always remains in compliance with policy.”

Read more at Business Wire.

Image used under license from Shutterstock.com

You might also like...

Keeping Your Critical Data Secure

Read More →