VALTIX BLOG
We’re excited to share news of another industry recognition to add to our trophy cabinet! Today, Business Intelligence Group announced…
Valtix (a Cisco company) Recognized As Finalist in 2023 Fortress Cyber Security Awards
For years legacy firewall vendors have received criticism from customers on operations in the cloud. This is why Valtix built…
Legacy Firewall Vendors: Having Somebody Else Operate It Doesn’t Fix What’s Broken
Recently, AWS announced the availability of VPC resource map. Resource map shows all of the resources in a VPC and…
AWS Resource Map vs. Valtix: Generic or Security-Specific Visibility
One of the impacts of the enterprise transition to cloud is confusion. From a security perspective, what no longer needs…
Why AWS GuardDuty Isn’t Enough for PCI Compliance
Recently, CSPM vendors have started partnering with CWPP vendors (here & here). This highlights enterprise demand that we at Valtix…
Why Enterprise Cloud Architects Are Prioritizing Secure Cloud Networking in 2023
Last month, we released the second annual Multi-Cloud Security Report, in which we surveyed 200 IT leaders from across the…
Ready or Not: Companies Plan for Multi-Cloud Environments, but Security Lags
Point of View From Valtix CEO and Co-founder, Vishal Jain When enterprises first experimented with the cloud, developers using what…
Current Practices Make Securing Cloud Networks Unsustainable
Organizations often encounter difficulties when IP ranges (or CIDR) overlap within their network. This could occur for several reasons: Mergers…
How to Secure Public Cloud Networks With Overlapping IP Ranges (CIDR)
This is part 2 of 2 on URL filtering. In part 1 we reviewed why URL and domain filtering is…
How to Effectively Implement URL and Domain (FQDN) Filtering on Egress in Public Clouds
As we kick off 2023, we wanted to explore important cloud security controls organizations should think about but might not…
Egress Filtering: The Most Important Cloud Security Control You’re Probably Missing
Securing Apps Requires a Different Approach In the cloud era, much of the security attention has focused on securing user…
Why Zero Trust for Public Cloud Apps Is Different Than Zero Trust for Users
This is the third blog in our series on GCP security. If you haven’t parts 1 & 2, definitely have…
Securing Apps on Google Cloud Platform, Part 3: Securing Apps With Valtix
The second blog in our series on GCP security is about "GCP security best practices". If you haven’t checked out…
GCP Security Best Practices
The Bar is Rising for Securing Workloads in the Public Cloud – Will it Affect Cloud Adoption? Enterprise cloud adoption…
The Bar is Rising for Securing Workloads in the Public Cloud
Secure access service edge (SASE) enabled companies across industries to move their computing processes from a centralized approach and closer…
Apps: The Key to the Expansion of SASE
Data centers are losing workloads to cloud computing. Where the workloads go, the money goes. By 2022, public cloud spending…
Legacy Network Security Leaders Must Reinvent Themselves for the Cloud Era
Azure Microsegmentation Strategies Segmentation in the public cloud usually starts with network security groups (NSGs). In an Azure virtual network,…
How to Implement Network Segmentation at Scale in Azure
Security in Google Cloud Platform (GCP) is straightforward, right? GCP gives you everything you need to secure your workloads? If…
Securing Apps on Google Cloud Platform, Part 1: Finding Your Missing Pieces
Note: This is an update to a previous blog on network security for PaaaS workloads published in 2019. The challenges…
Network Security for PaaS Workloads
Recent vulnerabilities and customer conversations have made a few things crystal clear in the last few months: There is no…
Every App Will Be Vulnerable. Security Needs to Be Automated Inside and Outside the App.
This is a detailed follow-up to our initial analysis of the Palo Alto Networks Cloud NGFW for AWS announcement. In this…
7 Critical Flaws of the Palo Alto Networks Cloud Next-Gen Firewall Service
Summary: Spring4Shell Zero-day POC leaked online, confirmed to be a critical vulnerability in Java Spring Framework. Dubbed Spring4Shell, as a…
Valtix Threat Response: Spring4Shell
This week, Palo Alto Networks (PAN) announced a new Cloud NGFW offering with Amazon Web Services (AWS) to provide PAN…
Palo Alto Networks, Welcome to the Party. You’re Underdressed.
Verizon DBIR continues to be an extremely valuable analysis of security incidents and breaches year over year (and some of…
7 Interesting Findings On Cloud Security From the 2021 Verizon Data Breach Investigations Report (DBIR)
In the datacenter, the practice of workload and application security hasn’t changed much over the years and it all started…
Best Practices: A Better Way to Identify Workloads (and Their Context) in the Cloud
“Our recent initiative was the result of LOG4SHELL, which I think made a lot of organizations take a hard look…
A Wake-Up Call: Why More Organizations Now Believe IDS / IPS Is Essential in the Public Cloud
At the end of last year, Valtix released our first annual 2022 Multi-Cloud Security Report based on an independent research…
Multi-Cloud Security Report: Five Surprising Findings
A few things are becoming clear as we near the end of the first month of the Log4Shell vulnerability: Attacks…
How to Detect and Respond to Log4Shell Exploits in AWS, Azure, GCP and OCI
This blog provides a follow up to our blogs from 12/13 and 12/14 detailing early observations and quick steps organizations…
Log4Shell Observations: Threat Actors Weaponize Log4j, New CVEs, Relentless Scanning, Make an Already Bad Situation Worse
Monitoring of current Log4J attack vectors reveals that defense in depth provides effective mitigation as teams work to find, patch,…
Log4Shell Observations: Why Protecting Workloads with Native, Layered Defense Is Essential
Also, see our second blog titled: "Log4Shell Observations: Why Protecting Workloads with Native, Layered Defense Is Essential" LOG4J Overview When…
How to Virtual Patch LOG4J in AWS, AZURE, GCP, and OCI
For enterprises, security-related visibility in the cloud is critical. For many, especially as they try to gain an understanding of…
Not All Visibility Is Created Equal – What Are You Looking For?
10 Network Security Mistakes in AWS, and How to Fix Them In talking with end-user organizations, we’ve seen and heard…
Top 10 Network Security Mistakes in AWS
We’re Committing to Global Efforts Advocating for Cybersecurity and Online Safety during Cybersecurity Awareness Month October is Cybersecurity Awareness Month,…
Cybersecurity Awareness: Our Commitment to Security in the Cloud and Beyond
Another week, another exploit in public cloud infrastructure. What’s going on? Overall, what’s broken here are issues in what the…
How to Mitigate the OMIGOD Exploit in Minutes
In my last blog, I talked about how cloud enables business agility. How cloud-first organizations can focus on the app…
Cloud brings a new set of security problems and benefits. But like everything in cloud, we can only solve by focusing on the App.
Sometimes the smallest of features makes a world of a difference. This post details the recent Amazon VPC routing enhancements…
Making East-West Security More Robust on AWS with More Specific Routing (MSR)
Cloud Network Security - How to Get the Benefits With a Lot Less Cost Ask an accomplished photographer, “what’s the…
Getting the Benefits of Cloud Network Security
Our perspective on the latest Google Cloud announcement Last week, Google Cloud Platform and Palo Alto Networks announced a GCP IDS based…
Do You Care About Network Security in Public Cloud? You Certainly Should.
Cloud Visibility Insights for Public Clouds The perennial challenge in security is finding what is insecure and securing it quickly…
Cloud Visibility Insights for Exfiltration in Egress Traffic
Summary On 08-Dec-2020, FireEye revealed{: target="blank"} that a state-sponsored adversary stole red team tools used by their internal security researchers…
Response to FireEye Red Team Tool Breach
Welcome AWS to the Cloud-Native Network Security Club Last week, AWS announced the AWS Network Firewall - a managed network…
Welcome AWS to the Cloud-Native Network Security Club
Valtix, SaaS, and Cloud Service Providers: How Our Innovation is Built on Innovation Recently, I was asked to provide a…