Tuesday, January 21, 2025
HomeCVE/vulnerabilityOxeye Identifies Vulnerabilities Cloud Native Applications with CNAST Platform

Oxeye Identifies Vulnerabilities Cloud Native Applications with CNAST Platform

Published on

SIEM as a Service

Follow Us on Google News

According to Gartner’s 2021 Magic Quadrant for Application Security Testing, “Modern application design and the continued adoption of DevSecOps are expanding the scope of the AST market. Security and risk management leaders can meet tighter deadlines and test more complex applications by seamlessly integrating and automating AST in the software delivery life cycle.”

Unlike traditional AST, Oxeye’s Cloud Native Application Security Testing Platform (CNAST)identifies code vulnerabilities, open-source vulnerabilities, and secrets to highlight the most critical issues in the software development lifecycle. With this important intelligence, the platform delivers clear guidance for fast and accurate remediation.

Far beyond SAST, DAST, IAST and SCA, the Oxeye CNAST approach is focused on contextual analysis to point out the exploitable vulnerabilities and secrets. This includes analyzing all potential risks, deep mapping of all app components and how they communicate with each other, lightweight fuzzing for active validation and enrichment of the underlying container, cluster and cloud configurations.

Oxeye CNAST is centered on the cloud native segment of the AST market, which is rapidly accelerating as AppSec and DevSecOpsprofessionals scramble to protect more than 500 million cloud-native apps expected to be deployed by 2023. To secure these applications, developers will need to conduct testing and be absolutely sure they remain safe throughout deployment. Oxeye supports scalable, ever-changing environments and automatically adapts to changes for an agile testing scope without changes to code or the need to manually intervene.

Oxeye’s vulnerability profiling helps prioritize the most urgent areas to focus on, leveraging powerful capabilities that include:

  • Complete Cloud Native Application Security Testing for ModernArchitectures – Oxeye analyzes code across microservices to identify code vulnerabilities and other critical issues as part of the software development lifecycle for clear guidance that enables accurate remediation.
  • Multi-Layer/Multi-Service Identification of Exploitable Vulnerabilities –

Provides Runtime Code Analysis without the need for changes to application code, Vulnerable Flow Analysis to detect vulnerabilities across application microservices, and Active Validation with automatic creation and execution of security tests to validate vulnerabilities prior to reporting.

  • Contextual Risk Assessment – Enriches data with infrastructure configuration information from the container, cluster, and cloud layers to calculate risks based on Internet accessibility, sensitive data processing, flawed configuration, etc.
  • Clear Remediation Guidance for Developers – Provides developers with application analysis in runtime to reproduce each step of vulnerability exploitation, delivery of the exact line of code where the vulnerability has been executed, and vulnerability flow visibility for accurate execution flow tracing that allows for fast identification and remediation of actual issues.

“Pieces of code are located literally everywhere throughout cloud-native applications,” said Dean Agron, Co-Founder, and CEO of Oxeye. “The Oxeye platform provides a single unified platform for modern application security testing, providing highly accurate vulnerability testing prior to production. With it, users gain access to the most prominent, automated security risk testing solution for all important stages of software development.”

Pricing and Availability

Oxeye Cloud Native AST will be generally available in Q1, 2022. Oxeye invites IT professionals interested in learning more to visit https://www.oxeye.io/solution or to schedule a personalized demo at https://www.oxeye.io/get-a-demo.

Latest articles

PoC Exploit Released for TP-Link Code Execution Vulnerability(CVE-2024-54887)

A security researcher, exploring reverse engineering and exploit development, has successfully identified a critical...

Brave Browser Vulnerability Allows Malicious Website Appears as Trusted One

A security vulnerability has been identified in Brave Browser, potentially allowing malicious websites to...

Beware! Fake SBI Reward APK Attacking Users to Deliver Android Malware

A recent phishing campaign has targeted customers of SBI Bank through a deceptive message...

Gootloader Malware Employs Blackhat SEO Techniques To Attack Victims

The Gootloader malware family employs sophisticated social engineering tactics to infiltrate computers.By leveraging...

API Security Webinar

Free Webinar - DevSecOps Hacks

By embedding security into your CI/CD workflows, you can shift left, streamline your DevSecOps processes, and release secure applications faster—all while saving time and resources.

In this webinar, join Phani Deepak Akella ( VP of Marketing ) and Karthik Krishnamoorthy (CTO), Indusface as they explores best practices for integrating application security into your CI/CD workflows using tools like Jenkins and Jira.

Discussion points

Automate security scans as part of the CI/CD pipeline.
Get real-time, actionable insights into vulnerabilities.
Prioritize and track fixes directly in Jira, enhancing collaboration.
Reduce risks and costs by addressing vulnerabilities pre-production.

More like this

PoC Exploit Released for TP-Link Code Execution Vulnerability(CVE-2024-54887)

A security researcher, exploring reverse engineering and exploit development, has successfully identified a critical...

Brave Browser Vulnerability Allows Malicious Website Appears as Trusted One

A security vulnerability has been identified in Brave Browser, potentially allowing malicious websites to...

Apache CXF Vulnerability Triggers DoS Attack

Colm O hEigeartaigh announced a critical vulnerability affecting various versions of Apache CXF, a...