Amir Jerbi, CTO of Aqua Security, explores how best to ensure new products hit their mark from day one – and continue to evolve and succeed.
“From our founding days, our mission has been to protect cloud native assets with a platform built specifically to meet the unique needs of cloud native environments,” says Chris Zamagias, Head of Channels JAPAC, Aqua Security.
BOSTON—November 15, 2022—Aqua Security, the leading pure-play cloud native security provider, today announced its new Lightning Enforcer to stop zero-day attacks and shield critical vulnerabilities in production until a patch can be applied. With its new eBPF technology, Aqua’s Lightning Enforcer provides total visibility into running workloads and allows security professionals to quickly and easily …
Aqua Security is the first software supply chain security platform provider to meet the attestation requirements as defined by an executive order issued to federal agencies last year by the Biden administration.
This order has a vast impact on global software suppliers. If you sell to the government, or you sell to a company that sells to the government, you need to prove compliance,” explains Aqua Security CEO and cofounder Dror Davidoff.
BOSTON—November 9, 2022—Aqua Security, the leading pure-play cloud native security provider, today announced that it is the only enterprise-grade vendor providing software supply chain security attestation to meet the requirements of Executive Order (EO) 14028. The Executive Order on Improving the Nation’s Cybersecurity lists out all the software supply chain requirements that third-party software companies …
Recent high-profile incidents have been a wake-up call for the software development industry, says Rani Osnat, senior vice president of strategy at Aqua Security. “We’ve uncovered decades of opacity and lack of transparency and that’s why it’s such a big deal.”
BOSTON—October 27, 2022—Aqua Security, the leading pure-play cloud native security provider, today announced that it has been named a leader in GigaOm’s 2022 Radar Report for Vulnerability Management. Solutions were compared based on feature coverage and product execution, top vendor strengths and challenges, and the analyst’s take on the current and future Continuous Vulnerability Management …