blog.aquasec.com
Open in
urlscan Pro
2606:2c40::c73c:67e4
Public Scan
URL:
https://blog.aquasec.com/workload-protection-realtime-security
Submission: On August 16 via api from US — Scanned from DE
Submission: On August 16 via api from US — Scanned from DE
Form analysis
3 forms found in the DOMGET https://blog.aquasec.com/hs-search-results
<form action="https://blog.aquasec.com/hs-search-results" method="GET">
<input type="text" class="navbar_search_input" name="term" autocomplete="off" placeholder="Enter a keyword to search the blog">
<input type="hidden" name="type" value="BLOG_POST">
<input type="hidden" name="length" value="SHORT">
<input type="submit" class="navbar_submit_button" value="Search">
</form>
POST https://forms.hsforms.com/submissions/v3/public/submit/formsnext/multipart/1665891/bcc43e1c-30ef-4ea4-9582-44bff8d5ad4c
<form novalidate="" accept-charset="UTF-8" action="https://forms.hsforms.com/submissions/v3/public/submit/formsnext/multipart/1665891/bcc43e1c-30ef-4ea4-9582-44bff8d5ad4c" enctype="multipart/form-data"
id="hsForm_bcc43e1c-30ef-4ea4-9582-44bff8d5ad4c_1" method="POST"
class="hs-form stacked hs-form-private hsForm_bcc43e1c-30ef-4ea4-9582-44bff8d5ad4c hs-form-bcc43e1c-30ef-4ea4-9582-44bff8d5ad4c hs-form-bcc43e1c-30ef-4ea4-9582-44bff8d5ad4c_ca8994a8-4629-4a97-b723-682fd3419690"
data-form-id="bcc43e1c-30ef-4ea4-9582-44bff8d5ad4c" data-portal-id="1665891" target="target_iframe_bcc43e1c-30ef-4ea4-9582-44bff8d5ad4c_1" data-reactid=".hbspt-forms-1">
<div class="hs_firstname hs-firstname hs-fieldtype-text field hs-form-field" data-reactid=".hbspt-forms-1.1:$0"><label id="label-firstname-bcc43e1c-30ef-4ea4-9582-44bff8d5ad4c_1" class="" placeholder="Enter your First Name"
for="firstname-bcc43e1c-30ef-4ea4-9582-44bff8d5ad4c_1" data-reactid=".hbspt-forms-1.1:$0.0"><span data-reactid=".hbspt-forms-1.1:$0.0.0">First Name</span></label>
<legend class="hs-field-desc" style="display:none;" data-reactid=".hbspt-forms-1.1:$0.1"></legend>
<div class="input" data-reactid=".hbspt-forms-1.1:$0.$firstname"><input id="firstname-bcc43e1c-30ef-4ea4-9582-44bff8d5ad4c_1" class="hs-input" type="text" name="firstname" value="" placeholder="" autocomplete="given-name"
data-reactid=".hbspt-forms-1.1:$0.$firstname.0" inputmode="text"></div>
</div>
<div class="hs_lastname hs-lastname hs-fieldtype-text field hs-form-field" data-reactid=".hbspt-forms-1.1:$1"><label id="label-lastname-bcc43e1c-30ef-4ea4-9582-44bff8d5ad4c_1" class="" placeholder="Enter your Last Name"
for="lastname-bcc43e1c-30ef-4ea4-9582-44bff8d5ad4c_1" data-reactid=".hbspt-forms-1.1:$1.0"><span data-reactid=".hbspt-forms-1.1:$1.0.0">Last Name</span></label>
<legend class="hs-field-desc" style="display:none;" data-reactid=".hbspt-forms-1.1:$1.1"></legend>
<div class="input" data-reactid=".hbspt-forms-1.1:$1.$lastname"><input id="lastname-bcc43e1c-30ef-4ea4-9582-44bff8d5ad4c_1" class="hs-input" type="text" name="lastname" value="" placeholder="" autocomplete="family-name"
data-reactid=".hbspt-forms-1.1:$1.$lastname.0" inputmode="text"></div>
</div>
<div class="hs_email hs-email hs-fieldtype-text field hs-form-field" data-reactid=".hbspt-forms-1.1:$2"><label id="label-email-bcc43e1c-30ef-4ea4-9582-44bff8d5ad4c_1" class="" placeholder="Enter your Email"
for="email-bcc43e1c-30ef-4ea4-9582-44bff8d5ad4c_1" data-reactid=".hbspt-forms-1.1:$2.0"><span data-reactid=".hbspt-forms-1.1:$2.0.0">Email</span><span class="hs-form-required" data-reactid=".hbspt-forms-1.1:$2.0.1">*</span></label>
<legend class="hs-field-desc" style="display:none;" data-reactid=".hbspt-forms-1.1:$2.1"></legend>
<div class="input" data-reactid=".hbspt-forms-1.1:$2.$email"><input id="email-bcc43e1c-30ef-4ea4-9582-44bff8d5ad4c_1" class="hs-input" type="email" name="email" required="" placeholder="" value="" autocomplete="email"
data-reactid=".hbspt-forms-1.1:$2.$email.0" inputmode="email"></div>
</div>
<div class="hs_comment hs-comment hs-fieldtype-textarea field hs-form-field" data-reactid=".hbspt-forms-1.1:$3"><label id="label-comment-bcc43e1c-30ef-4ea4-9582-44bff8d5ad4c_1" class="" placeholder="Enter your Comment"
for="comment-bcc43e1c-30ef-4ea4-9582-44bff8d5ad4c_1" data-reactid=".hbspt-forms-1.1:$3.0"><span data-reactid=".hbspt-forms-1.1:$3.0.0">Comment</span><span class="hs-form-required" data-reactid=".hbspt-forms-1.1:$3.0.1">*</span></label>
<legend class="hs-field-desc" style="display:none;" data-reactid=".hbspt-forms-1.1:$3.1"></legend>
<div class="input" data-reactid=".hbspt-forms-1.1:$3.$comment"><textarea id="comment-bcc43e1c-30ef-4ea4-9582-44bff8d5ad4c_1" class="hs-input" name="comment" required="" placeholder="" data-reactid=".hbspt-forms-1.1:$3.$comment.0"></textarea>
</div>
</div>
<div class="hs_lifecyclestage hs-lifecyclestage hs-fieldtype-radio field hs-form-field" style="display:none;" data-reactid=".hbspt-forms-1.1:$4"><label id="label-lifecyclestage-bcc43e1c-30ef-4ea4-9582-44bff8d5ad4c_1" class=""
placeholder="Enter your Lifecycle Stage" for="lifecyclestage-bcc43e1c-30ef-4ea4-9582-44bff8d5ad4c_1" data-reactid=".hbspt-forms-1.1:$4.0"><span data-reactid=".hbspt-forms-1.1:$4.0.0">Lifecycle Stage</span></label>
<legend class="hs-field-desc" style="display:none;" data-reactid=".hbspt-forms-1.1:$4.1"></legend>
<div class="input" data-reactid=".hbspt-forms-1.1:$4.$lifecyclestage"><input name="lifecyclestage" class="hs-input" type="hidden" value="subscriber" data-reactid=".hbspt-forms-1.1:$4.$lifecyclestage.0"></div>
</div>
<div class="hs_utm_source hs-utm_source hs-fieldtype-text field hs-form-field" style="display:none;" data-reactid=".hbspt-forms-1.1:$5"><label id="label-utm_source-bcc43e1c-30ef-4ea4-9582-44bff8d5ad4c_1" class="" placeholder="Enter your UTM_Source"
for="utm_source-bcc43e1c-30ef-4ea4-9582-44bff8d5ad4c_1" data-reactid=".hbspt-forms-1.1:$5.0"><span data-reactid=".hbspt-forms-1.1:$5.0.0">UTM_Source</span></label>
<legend class="hs-field-desc" style="display:none;" data-reactid=".hbspt-forms-1.1:$5.1"></legend>
<div class="input" data-reactid=".hbspt-forms-1.1:$5.$utm_source"><input name="utm_source" class="hs-input" type="hidden" value="" data-reactid=".hbspt-forms-1.1:$5.$utm_source.0"></div>
</div>
<div class="hs_utm_campaign hs-utm_campaign hs-fieldtype-text field hs-form-field" style="display:none;" data-reactid=".hbspt-forms-1.1:$6"><label id="label-utm_campaign-bcc43e1c-30ef-4ea4-9582-44bff8d5ad4c_1" class=""
placeholder="Enter your UTM_Campaign" for="utm_campaign-bcc43e1c-30ef-4ea4-9582-44bff8d5ad4c_1" data-reactid=".hbspt-forms-1.1:$6.0"><span data-reactid=".hbspt-forms-1.1:$6.0.0">UTM_Campaign</span></label>
<legend class="hs-field-desc" style="display:none;" data-reactid=".hbspt-forms-1.1:$6.1"></legend>
<div class="input" data-reactid=".hbspt-forms-1.1:$6.$utm_campaign"><input name="utm_campaign" class="hs-input" type="hidden" value="" data-reactid=".hbspt-forms-1.1:$6.$utm_campaign.0"></div>
</div>
<div class="hs_utm_medium hs-utm_medium hs-fieldtype-text field hs-form-field" style="display:none;" data-reactid=".hbspt-forms-1.1:$7"><label id="label-utm_medium-bcc43e1c-30ef-4ea4-9582-44bff8d5ad4c_1" class="" placeholder="Enter your UTM_Medium"
for="utm_medium-bcc43e1c-30ef-4ea4-9582-44bff8d5ad4c_1" data-reactid=".hbspt-forms-1.1:$7.0"><span data-reactid=".hbspt-forms-1.1:$7.0.0">UTM_Medium</span></label>
<legend class="hs-field-desc" style="display:none;" data-reactid=".hbspt-forms-1.1:$7.1"></legend>
<div class="input" data-reactid=".hbspt-forms-1.1:$7.$utm_medium"><input name="utm_medium" class="hs-input" type="hidden" value="" data-reactid=".hbspt-forms-1.1:$7.$utm_medium.0"></div>
</div>
<div class="hs_utm_content hs-utm_content hs-fieldtype-text field hs-form-field" style="display:none;" data-reactid=".hbspt-forms-1.1:$8"><label id="label-utm_content-bcc43e1c-30ef-4ea4-9582-44bff8d5ad4c_1" class=""
placeholder="Enter your UTM_Content" for="utm_content-bcc43e1c-30ef-4ea4-9582-44bff8d5ad4c_1" data-reactid=".hbspt-forms-1.1:$8.0"><span data-reactid=".hbspt-forms-1.1:$8.0.0">UTM_Content</span></label>
<legend class="hs-field-desc" style="display:none;" data-reactid=".hbspt-forms-1.1:$8.1"></legend>
<div class="input" data-reactid=".hbspt-forms-1.1:$8.$utm_content"><input name="utm_content" class="hs-input" type="hidden" value="" data-reactid=".hbspt-forms-1.1:$8.$utm_content.0"></div>
</div>
<div class="hs_utm_term hs-utm_term hs-fieldtype-text field hs-form-field" style="display:none;" data-reactid=".hbspt-forms-1.1:$9"><label id="label-utm_term-bcc43e1c-30ef-4ea4-9582-44bff8d5ad4c_1" class="" placeholder="Enter your UTM_Term"
for="utm_term-bcc43e1c-30ef-4ea4-9582-44bff8d5ad4c_1" data-reactid=".hbspt-forms-1.1:$9.0"><span data-reactid=".hbspt-forms-1.1:$9.0.0">UTM_Term</span></label>
<legend class="hs-field-desc" style="display:none;" data-reactid=".hbspt-forms-1.1:$9.1"></legend>
<div class="input" data-reactid=".hbspt-forms-1.1:$9.$utm_term"><input name="utm_term" class="hs-input" type="hidden" value="" data-reactid=".hbspt-forms-1.1:$9.$utm_term.0"></div>
</div>
<div class="hs_gclid hs-gclid hs-fieldtype-text field hs-form-field" style="display:none;" data-reactid=".hbspt-forms-1.1:$10"><label id="label-gclid-bcc43e1c-30ef-4ea4-9582-44bff8d5ad4c_1" class="" placeholder="Enter your GCLID"
for="gclid-bcc43e1c-30ef-4ea4-9582-44bff8d5ad4c_1" data-reactid=".hbspt-forms-1.1:$10.0"><span data-reactid=".hbspt-forms-1.1:$10.0.0">GCLID</span></label>
<legend class="hs-field-desc" style="display:none;" data-reactid=".hbspt-forms-1.1:$10.1"></legend>
<div class="input" data-reactid=".hbspt-forms-1.1:$10.$gclid"><input name="gclid" class="hs-input" type="hidden" value="" data-reactid=".hbspt-forms-1.1:$10.$gclid.0"></div>
</div><noscript data-reactid=".hbspt-forms-1.2"></noscript>
<div class="hs_recaptcha hs-recaptcha field hs-form-field" data-reactid=".hbspt-forms-1.3">
<div class="input" data-reactid=".hbspt-forms-1.3.0">
<div class="grecaptcha-badge" data-style="inline" style="width: 256px; height: 60px; box-shadow: gray 0px 0px 5px;">
<div class="grecaptcha-logo"><iframe title="reCAPTCHA"
src="https://www.google.com/recaptcha/enterprise/anchor?ar=1&k=6Ld_ad8ZAAAAAAqr0ePo1dUfAi0m4KPkCMQYwPPm&co=aHR0cHM6Ly9ibG9nLmFxdWFzZWMuY29tOjQ0Mw..&hl=de&v=mq0-U1BHZ5YTcoDC-CvsLPNc&size=invisible&badge=inline&cb=ibeiguttj9wb"
width="256" height="60" role="presentation" name="a-t87d8e3kvd34" frameborder="0" scrolling="no" sandbox="allow-forms allow-popups allow-same-origin allow-scripts allow-top-navigation allow-modals allow-popups-to-escape-sandbox"></iframe>
</div>
<div class="grecaptcha-error"></div><textarea id="g-recaptcha-response" name="g-recaptcha-response" class="g-recaptcha-response"
style="width: 250px; height: 40px; border: 1px solid rgb(193, 193, 193); margin: 10px 25px; padding: 0px; resize: none; display: none;"></textarea>
</div><iframe style="display: none;"></iframe>
</div><input type="hidden" name="g-recaptcha-response" id="hs-recaptcha-response" value="" data-reactid=".hbspt-forms-1.3.1">
</div>
<div class="hs_submit hs-submit" data-reactid=".hbspt-forms-1.5">
<div class="hs-field-desc" style="display:none;" data-reactid=".hbspt-forms-1.5.0"></div>
<div class="actions" data-reactid=".hbspt-forms-1.5.1"><input type="submit" value="Submit Comment" class="hs-button primary" data-reactid=".hbspt-forms-1.5.1.0"></div>
</div><noscript data-reactid=".hbspt-forms-1.6"></noscript><input name="hs_context" type="hidden"
value="{"rumScriptExecuteTime":682.1000003814697,"rumServiceResponseTime":971.2999992370605,"rumFormRenderTime":1.7000007629394531,"rumTotalRenderTime":973.3999996185303,"rumTotalRequestTime":288,"embedAtTimestamp":"1660663034348","formDefinitionUpdatedAt":"1647963475056","pageUrl":"https://blog.aquasec.com/workload-protection-realtime-security","pageTitle":"Protecting Workloads Against Real-World Attacks With Ease","source":"FormsNext-static-5.519","sourceName":"FormsNext","sourceVersion":"5.519","sourceVersionMajor":"5","sourceVersionMinor":"519","timestamp":1660663034355,"userAgent":"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/104.0.5112.79 Safari/537.36","originalEmbedContext":{"portalId":"1665891","formId":"bcc43e1c-30ef-4ea4-9582-44bff8d5ad4c","pageId":"80985379464","region":"na1","pageName":"Protecting Workloads Against Real-World Attacks With Ease","contentType":"blog-post","formsBaseUrl":"/_hcms/forms/","target":"#hs_form_target_bcc43e1c-30ef-4ea4-9582-44bff8d5ad4c","type":"BLOG_COMMENT","submitButtonClass":"hs-button primary","formInstanceId":"1"},"canonicalUrl":"https://blog.aquasec.com/workload-protection-realtime-security","pageId":"80985379464","pageName":"Protecting Workloads Against Real-World Attacks With Ease","formInstanceId":"1","renderedFieldsIds":["firstname","lastname","email","comment"],"formTarget":"#hs_form_target_bcc43e1c-30ef-4ea4-9582-44bff8d5ad4c","correlationId":"612dd78f-ff5b-4ae9-ad09-005b57190c80","contentType":"blog-post","hutk":"50aa2eb1a672a91e4afeab1e06995673","captchaStatus":"LOADED","isHostedOnHubspot":true}"
data-reactid=".hbspt-forms-1.7"><iframe name="target_iframe_bcc43e1c-30ef-4ea4-9582-44bff8d5ad4c_1" style="display:none;" data-reactid=".hbspt-forms-1.8"></iframe>
</form>
POST https://forms.hsforms.com/submissions/v3/public/submit/formsnext/multipart/1665891/fc3a461b-474b-4bd2-b409-c41d4ec09d8a
<form novalidate="" accept-charset="UTF-8" action="https://forms.hsforms.com/submissions/v3/public/submit/formsnext/multipart/1665891/fc3a461b-474b-4bd2-b409-c41d4ec09d8a" enctype="multipart/form-data"
id="hsForm_fc3a461b-474b-4bd2-b409-c41d4ec09d8a_1" method="POST"
class="hs-form stacked hs-form-private hsForm_fc3a461b-474b-4bd2-b409-c41d4ec09d8a hs-form-fc3a461b-474b-4bd2-b409-c41d4ec09d8a hs-form-fc3a461b-474b-4bd2-b409-c41d4ec09d8a_dd1883bc-7502-464a-8c9b-86f2ad16f81c"
data-form-id="fc3a461b-474b-4bd2-b409-c41d4ec09d8a" data-portal-id="1665891" target="target_iframe_fc3a461b-474b-4bd2-b409-c41d4ec09d8a_1" data-reactid=".hbspt-forms-0">
<div class="hs_email hs-email hs-fieldtype-text field hs-form-field" data-reactid=".hbspt-forms-0.1:$0"><label id="label-email-fc3a461b-474b-4bd2-b409-c41d4ec09d8a_1" class="" placeholder="Enter your Email Address"
for="email-fc3a461b-474b-4bd2-b409-c41d4ec09d8a_1" data-reactid=".hbspt-forms-0.1:$0.0"><span data-reactid=".hbspt-forms-0.1:$0.0.0">Email Address</span><span class="hs-form-required" data-reactid=".hbspt-forms-0.1:$0.0.1">*</span></label>
<legend class="hs-field-desc" style="display:none;" data-reactid=".hbspt-forms-0.1:$0.1"></legend>
<div class="input" data-reactid=".hbspt-forms-0.1:$0.$email"><input id="email-fc3a461b-474b-4bd2-b409-c41d4ec09d8a_1" class="hs-input" type="email" name="email" required="" placeholder="" value="" autocomplete="email"
data-reactid=".hbspt-forms-0.1:$0.$email.0" inputmode="email"></div>
</div>
<div class="hs_blog_default_hubspot_blog_subscription hs-blog_default_hubspot_blog_subscription hs-fieldtype-radio field hs-form-field" style="display:none;" data-reactid=".hbspt-forms-0.1:$1"><label
id="label-blog_default_hubspot_blog_subscription-fc3a461b-474b-4bd2-b409-c41d4ec09d8a_1" class="" placeholder="Enter your Notification Frequency" for="blog_default_hubspot_blog_subscription-fc3a461b-474b-4bd2-b409-c41d4ec09d8a_1"
data-reactid=".hbspt-forms-0.1:$1.0"><span data-reactid=".hbspt-forms-0.1:$1.0.0">Notification Frequency</span></label>
<legend class="hs-field-desc" style="display:none;" data-reactid=".hbspt-forms-0.1:$1.1"></legend>
<div class="input" data-reactid=".hbspt-forms-0.1:$1.$blog_default_hubspot_blog_subscription"><input name="blog_default_hubspot_blog_subscription" class="hs-input" type="hidden" value="instant"
data-reactid=".hbspt-forms-0.1:$1.$blog_default_hubspot_blog_subscription.0"></div>
</div>
<div class="hs_lifecyclestage hs-lifecyclestage hs-fieldtype-radio field hs-form-field" style="display:none;" data-reactid=".hbspt-forms-0.1:$2"><label id="label-lifecyclestage-fc3a461b-474b-4bd2-b409-c41d4ec09d8a_1" class=""
placeholder="Enter your Lifecycle Stage" for="lifecyclestage-fc3a461b-474b-4bd2-b409-c41d4ec09d8a_1" data-reactid=".hbspt-forms-0.1:$2.0"><span data-reactid=".hbspt-forms-0.1:$2.0.0">Lifecycle Stage</span></label>
<legend class="hs-field-desc" style="display:none;" data-reactid=".hbspt-forms-0.1:$2.1"></legend>
<div class="input" data-reactid=".hbspt-forms-0.1:$2.$lifecyclestage"><input name="lifecyclestage" class="hs-input" type="hidden" value="subscriber" data-reactid=".hbspt-forms-0.1:$2.$lifecyclestage.0"></div>
</div>
<div class="hs_utm_source hs-utm_source hs-fieldtype-text field hs-form-field" style="display:none;" data-reactid=".hbspt-forms-0.1:$3"><label id="label-utm_source-fc3a461b-474b-4bd2-b409-c41d4ec09d8a_1" class="" placeholder="Enter your UTM_Source"
for="utm_source-fc3a461b-474b-4bd2-b409-c41d4ec09d8a_1" data-reactid=".hbspt-forms-0.1:$3.0"><span data-reactid=".hbspt-forms-0.1:$3.0.0">UTM_Source</span></label>
<legend class="hs-field-desc" style="display:none;" data-reactid=".hbspt-forms-0.1:$3.1"></legend>
<div class="input" data-reactid=".hbspt-forms-0.1:$3.$utm_source"><input name="utm_source" class="hs-input" type="hidden" value="" data-reactid=".hbspt-forms-0.1:$3.$utm_source.0"></div>
</div>
<div class="hs_utm_campaign hs-utm_campaign hs-fieldtype-text field hs-form-field" style="display:none;" data-reactid=".hbspt-forms-0.1:$4"><label id="label-utm_campaign-fc3a461b-474b-4bd2-b409-c41d4ec09d8a_1" class=""
placeholder="Enter your UTM_Campaign" for="utm_campaign-fc3a461b-474b-4bd2-b409-c41d4ec09d8a_1" data-reactid=".hbspt-forms-0.1:$4.0"><span data-reactid=".hbspt-forms-0.1:$4.0.0">UTM_Campaign</span></label>
<legend class="hs-field-desc" style="display:none;" data-reactid=".hbspt-forms-0.1:$4.1"></legend>
<div class="input" data-reactid=".hbspt-forms-0.1:$4.$utm_campaign"><input name="utm_campaign" class="hs-input" type="hidden" value="" data-reactid=".hbspt-forms-0.1:$4.$utm_campaign.0"></div>
</div>
<div class="hs_utm_medium hs-utm_medium hs-fieldtype-text field hs-form-field" style="display:none;" data-reactid=".hbspt-forms-0.1:$5"><label id="label-utm_medium-fc3a461b-474b-4bd2-b409-c41d4ec09d8a_1" class="" placeholder="Enter your UTM_Medium"
for="utm_medium-fc3a461b-474b-4bd2-b409-c41d4ec09d8a_1" data-reactid=".hbspt-forms-0.1:$5.0"><span data-reactid=".hbspt-forms-0.1:$5.0.0">UTM_Medium</span></label>
<legend class="hs-field-desc" style="display:none;" data-reactid=".hbspt-forms-0.1:$5.1"></legend>
<div class="input" data-reactid=".hbspt-forms-0.1:$5.$utm_medium"><input name="utm_medium" class="hs-input" type="hidden" value="" data-reactid=".hbspt-forms-0.1:$5.$utm_medium.0"></div>
</div>
<div class="hs_utm_content hs-utm_content hs-fieldtype-text field hs-form-field" style="display:none;" data-reactid=".hbspt-forms-0.1:$6"><label id="label-utm_content-fc3a461b-474b-4bd2-b409-c41d4ec09d8a_1" class=""
placeholder="Enter your UTM_Content" for="utm_content-fc3a461b-474b-4bd2-b409-c41d4ec09d8a_1" data-reactid=".hbspt-forms-0.1:$6.0"><span data-reactid=".hbspt-forms-0.1:$6.0.0">UTM_Content</span></label>
<legend class="hs-field-desc" style="display:none;" data-reactid=".hbspt-forms-0.1:$6.1"></legend>
<div class="input" data-reactid=".hbspt-forms-0.1:$6.$utm_content"><input name="utm_content" class="hs-input" type="hidden" value="" data-reactid=".hbspt-forms-0.1:$6.$utm_content.0"></div>
</div>
<div class="hs_utm_term hs-utm_term hs-fieldtype-text field hs-form-field" style="display:none;" data-reactid=".hbspt-forms-0.1:$7"><label id="label-utm_term-fc3a461b-474b-4bd2-b409-c41d4ec09d8a_1" class="" placeholder="Enter your UTM_Term"
for="utm_term-fc3a461b-474b-4bd2-b409-c41d4ec09d8a_1" data-reactid=".hbspt-forms-0.1:$7.0"><span data-reactid=".hbspt-forms-0.1:$7.0.0">UTM_Term</span></label>
<legend class="hs-field-desc" style="display:none;" data-reactid=".hbspt-forms-0.1:$7.1"></legend>
<div class="input" data-reactid=".hbspt-forms-0.1:$7.$utm_term"><input name="utm_term" class="hs-input" type="hidden" value="" data-reactid=".hbspt-forms-0.1:$7.$utm_term.0"></div>
</div><noscript data-reactid=".hbspt-forms-0.2"></noscript>
<div class="hs_submit hs-submit" data-reactid=".hbspt-forms-0.5">
<div class="hs-field-desc" style="display:none;" data-reactid=".hbspt-forms-0.5.0"></div>
<div class="actions" data-reactid=".hbspt-forms-0.5.1"><input type="submit" value="Subscribe" class="hs-button primary large" data-reactid=".hbspt-forms-0.5.1.0"></div>
</div><noscript data-reactid=".hbspt-forms-0.6"></noscript><input name="hs_context" type="hidden"
value="{"rumScriptExecuteTime":682.1000003814697,"rumServiceResponseTime":900.1000003814697,"rumFormRenderTime":2.5,"rumTotalRenderTime":903.5,"rumTotalRequestTime":215.20000076293945,"isLegacyThemeAllowed":"true","renderRawHtml":"true","embedAtTimestamp":"1660663034330","formDefinitionUpdatedAt":"1616699269240","pageUrl":"https://blog.aquasec.com/workload-protection-realtime-security","pageTitle":"Protecting Workloads Against Real-World Attacks With Ease","source":"FormsNext-static-5.519","sourceName":"FormsNext","sourceVersion":"5.519","sourceVersionMajor":"5","sourceVersionMinor":"519","timestamp":1660663034330,"userAgent":"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/104.0.5112.79 Safari/537.36","originalEmbedContext":{"portalId":"1665891","formId":"fc3a461b-474b-4bd2-b409-c41d4ec09d8a","formInstanceId":"1","pageId":"80985379464","region":"na1","pageName":"Protecting Workloads Against Real-World Attacks With Ease","contentType":"blog-post","formsBaseUrl":"/_hcms/forms/","inlineMessage":true,"target":"#hs_form_target_module_14538258496742317_1","formData":{"cssClass":"hs-form stacked"}},"canonicalUrl":"https://blog.aquasec.com/workload-protection-realtime-security","pageId":"80985379464","pageName":"Protecting Workloads Against Real-World Attacks With Ease","formInstanceId":"1","renderedFieldsIds":["email"],"formTarget":"#hs_form_target_module_14538258496742317_1","correlationId":"ad4c5038-8115-42a5-be47-e5ddb8349ce7","contentType":"blog-post","hutk":"50aa2eb1a672a91e4afeab1e06995673","captchaStatus":"NOT_APPLICABLE","isHostedOnHubspot":true}"
data-reactid=".hbspt-forms-0.7"><iframe name="target_iframe_fc3a461b-474b-4bd2-b409-c41d4ec09d8a_1" style="display:none;" data-reactid=".hbspt-forms-0.8"></iframe>
</form>
Text Content
Aqua uses website cookies to give visitors a better service. To find out more about the cookies we use, see our Privacy Policy Accept Decline Aqua Security * Products * Solutions * Resources * Company Search Sign In Try Aqua Aqua Blog Story Tweedie-Yates August 04, 2022 PROTECTING WORKLOADS AGAINST REAL-WORLD ATTACKS WITH EASE Attackers are sophisticated, there is always a lag between zero days and mitigation, and production workloads are critical. So why is the adoption of runtime security for cloud native applications still lower than shift-left security practices for the same applications? We will discuss this, along with the solution, in this blog. Earlier this week, we introduced the next-generation of our runtime security solution. It is effective at stopping attacks, easy to deploy and manage, and nothing short of transformational for your security posture. RUNTIME SECURITY MATTERS Let’s face it, your production workloads are both the most sensitive and critical part of the software development lifecycle, as well as generally what attackers are trying to access. And yet, in the cloud native application landscape, shift-left and vulnerability scanning at both the application and infrastructure layers are relatively well-adopted security capabilities, while adoption of runtime security controls at the application layer lags behind. (It’s important to note that security capabilities in runtime at the infrastructure layer are well-known and mature in the form of Cloud Security Posture Management (CSPM). It’s really runtime protection at the application layer where adoption falls behind). Why would this be? Well, for some teams, adoption of runtime security can be fraught with a perception of complexity and risk. * First, security measures on running production workloads can be viewed as risky, especially by DevOps teams whose primary mission is speed. Today, many companies build on this perception to push the idea of ‘agentless’ security in runtime (see here for our blog on why agent vs agentless is a false choice); a concept that we will address in-depth. * Second, for many teams, runtime protection requires knowledge of the application to know which policies to set. Security teams would have to work with engineering to understand the particularities of the application, which was a prohibitive practice in some organizations. And while many teams have been successful with this paradigm, some have been unable to overcome the internal obstacles to implementation. We set about solving these challenges, and today, we are here to tell you that runtime protection is accessible for all teams. Runtime protection has never been optional to an effective security posture; and as a result, we are making it easier than ever. THE RIGHT KIND OF VISIBILITY Let’s start with the FUD. As mentioned above, some vendors will use the historical, perceived complexity of runtime security to push snapshot scanning technology, creating a false dichotomy between ‘agent and agentless’ protection. But in runtime, agentless technologies will only provide visibility into the runtime environment. Which is a good thing; Aqua offers snapshot scanning as a key part of our Cloud Native Application Protection Platform (CNAPP) because we think it’s a great way to achieve immediate visibility into risk. Snapshot scanning identifies top risks in cloud runtime environments by combining cloud account misconfigurations at the infrastructure layer with sensitive data exposure, known vulnerabilities, and malware at the application layer. But snapshot scanning has never been an answer to the perceived complexity of runtime protection and it doesn’t provide the same kind of visibility. Snapshot scanning is time interval based and the data provided is based on whenever the cloud API did its last scan. These intervals can differ across vendors and there can be as much as a 15 minute gap between scans. This matters the most to security operations teams that understand the impact of mean time to detect (MTTD) and mean time to respond (MTTR) metrics on their ability to adequately mitigate incidents. Mean time to detect, or MTTD, indicates the amount of time it takes your team to discover a potential security incident. Mean time to respond, or MTTR, indicates the amount of time it takes to control, remediate, and/or eradicate a threat after it has been discovered. Dwell time defines the entire length of a security incident, the duration from which an attack first occurs in your network to the time it has been eradicated and your stack has returned to a balanced, healthy state. Fileless malware attacks and techniques like executing from /tmp will have too much space to play with snapshot scanning. If an attacker injects malware into /tmp, runs it, then deletes it before the next screenshot, they can clear their tracks seamlessly, without you realizing they were even there. LOW-LEVEL, AND KERNEL LEVEL VISIBILITY MATTERS Ultimately, snapshot scanning does not give you visibility into the kernel level. It does not capture syscalls and attempts to execute from memory. This results in lower data resolution. Without realizing it, you might have advanced malware like rootkits hiding themselves within the kernel. Snapshot scanning also can’t give you the in-depth data needed to construct an attack timeline to quickly decide impact, mitigate it, and provide that data to governing and compliance bodies. Post-incident investigation is impossible for ephemeral workloads if you don’t have the syscalls of the container, and there are no leads to understand what happened. If something was downloaded from an IP or a storage service, you at least have data points to start connecting. Without that information, even if you detect a malicious event, you won’t know where it came from or who did it. You might save new files written to the disk to contain the malware file for investigation. But it would take an enormous amount of time and effort to formulate an adequate resolution and response. GRANULAR VISIBILITY AND PROTECTION; WHY IT IS ESSENTIAL TO MAKE RUNTIME ACCESSIBLE TO EVERY TEAM Moving to reality and the benefits of runtime protection, MTTD and MTTR for attacks such as log4j or Spring4Shell demonstrate why the realtime and response elements of runtime protection are critical. When the world became aware of those two vulnerabilities and a fix was made available, there was an unavoidable lag between the time to mitigate and the announcement of the issue. This means attackers had exactly as much time as that lag to exploit the vulnerabilities as you had to find and fix your exposure. Runtime protection is what keeps that inevitable lag from becoming an incident. In the time that you are spending patching and preventing the issue, runtime protection will keep your exposed workloads from being exploited. Not to mention the fact that the right kind of runtime protection will stop unknown attacks and sophisticated attackers targeting your workloads. THE NEXT GENERATION OF RUNTIME PROTECTION We get it. No more political battles implementing runtime. No more blind spots in your production workloads. You need immediate protection and deep, realtime visibility today. Recently, we introduced Aqua’s new out-of-the-box, advanced runtime solution for seeing and stopping zero day threats. Protection is composed of a set of new, curated, and optimized default security controls that are based on years of experience deploying industry-leading granular runtime security. Using eBPF technology and threat intel from cyber research team Aqua Nautilus to identify advanced threats, Aqua surfaces the most critical issues in realtime while also implementing a set of controls to protect running workloads immediately, without disrupting the business. As a result, you get protection in minutes without an in-depth knowledge of their applications and without unnecessary risk to production workloads. Policies are applicable for containers, VMs, and Kubernetes workloads. For example, here are the curated container policies. Container policies eBPF technology makes deployments safe and provides kernel level visibility. Behavioral indicators from Aqua Nautilus pick out advanced attacks based on observations of real cloud native attacks in the wild. This gives you the information you need to contain and mitigate an attack in realtime, identifying sophisticated attacks like fileless malware and rootkits. PROTECT YOUR WORKLOADS Use these questions to evaluate runtime solutions: * Ask whether a product can see fileless malware attacks or a process executing from memory. * Ask whether a product can stop an attack in production without stopping the workload. * What mechanisms are in place to stop attack escalation or lateral movement? * What are the estimations of your MTTD and MTTR? * Which type of coverage do you have during Dwell Time, or even before it? * Do you have an out-of-the-box runtime capability that can stop advanced attacks? Watch how Aqua’s Runtime protection solution can protect you against zero day attacks in realtime, with rapid deployment in this runtime security demo. Learn about the continuing importance of runtime security and how to build an effective runtime strategy in this webinar. Reach out to our sales team today to see the next generation of runtime first-hand in a live environment. STORY TWEEDIE-YATES Story is the VP of Product Marketing at Aqua Security, where she is passionate about helping to define the future of cloud native security. In her time off, you will find her scooting her twins around Montreal’s parks or exploring underwater treasures with a scuba mask alongside her husband. Runtime Security, CNAPP * * Share * READ MORE First Name Last Name Email* Comment* Lifecycle Stage UTM_Source UTM_Campaign UTM_Medium UTM_Content UTM_Term GCLID SUBSCRIBE TO EMAIL UPDATES Email Address* Notification Frequency Lifecycle Stage UTM_Source UTM_Campaign UTM_Medium UTM_Content UTM_Term POPULAR POSTS * A Brief History of Containers: From the 1970s Till Now * Protecting Kubernetes Secrets: A Practical Guide * Top 20 Docker Security Best Practices: Ultimate Guide * Which Kubernetes Management Platform is Right for You? * 10 Essential Container CI/CD Tools FILTER BY TOPIC * Container Security (105) * Kubernetes Security (84) * Security Threats (62) * Cloud Native Security (59) * Image Vulnerability Scanning (45) * Open Source (44) * Docker Security (35) * AWS Security (30) * Runtime Security (30) * Vulnerability Management (26) * Container Vulnerability (24) * Cloud Native Computing (22) * Cloud Security CSPM (20) * Compliance (20) * DevSecOps (20) * CI/CD (12) * Secrets (11) * Application Security (10) * Host Security (10) * Serverless-Security (10) * Aqua Security (8) * Dynamic Container Analysis (7) * Fargate (7) * Hybrid Cloud Security (7) * Software Supply Chain Security (7) * ebpf (7) * Events and Conferences (6) * Google Cloud Platform (6) * OpenShift (6) * Supply Chain Attacks (6) * Attack Vector (5) * Azure Containers (5) * Cloud Operations (5) * Container Tools (5) * DockerCon (5) * Security Automation (5) * Virtualized Containers (5) * Azure Cloud (4) * Cloud Workload Protection Platform CWPP (4) * Microservices (4) * Nano-Segmentation (4) * Orchestration (4) * Service Mesh (4) * Windows Containers (4) * CNAPP (3) * Case Study (3) * Container Deployment (3) * IBM Cloud (3) * Infrastructure-as-Code (IaC) (3) * Malware Attacks (3) * Network (3) * Pivotal (3) * Role Based Access Control RBAC (3) * Secure-vm (3) * Security Policy (3) * Thin OS (3) * EKS (2) * FaaS (2) * Integration (2) * Multi-tenancy (2) * Network Firewall (2) * SBOMs (2) * VMware (2) * Advanced Threat Mitigation (1) * Agentless Security (1) * Cisco (1) * Cloud Native Application Protection Platform (1) * Cloud VM (1) * Container Influencers (1) * Data Protection (1) * Drift Prevention (1) * Dynamic Threat Analysis (1) * EKS Security (1) * IoT (1) * Kubernetes Authorization (1) * Machine Learning (1) * Management Platform (1) * Mesosphere (1) * Microsoft (1) * Moby (1) * Seccomp Demo (1) * User Namespace (1) * VPC (1) * Wiki (1) Show more... Aqua Container Security Aqua Security is the largest pure-play cloud native security company, providing customers the freedom to innovate and accelerate their digital transformations. The Aqua Platform provides prevention, detection, and response automation across the entire application lifecycle to secure the build, secure cloud infrastructure and secure running workloads, wherever they are deployed. Aqua customers are among the world’s largest enterprises in financial services, software, media, manufacturing and retail, with implementations across a broad range of cloud providers and modern technology stacks spanning containers, serverless functions and cloud VMs. Copyright © 2022 Aqua Security Software Ltd. Use Cases * Automate DevSecOps * Modernize Security * Compliance and Auditing * Serverless Containers & Functions * Hybrid and Multi Cloud Environments * Kubernetes Security * OpenShift Security * Docker Security * AWS Cloud Security * Azure Cloud Security * Google Cloud Security * VMware PKS Security Contact Us * Contact Us * Contact Support Products * Aqua Cloud native security) * Open Source Container Security * Platform Integrations Resources * Live Webinars * O’Reilly Book: Kubernetes Security * Cloud native Wiki About Us * About Aqua * Newsroom * Careers Get the Cloud Native News Be the first to get expert insight, best practices and advice on cloud native security, trends, threat intelligence and compliance email address Subscribe Thank you!