blog.aquasec.com Open in urlscan Pro
2606:2c40::c73c:67e4  Public Scan

URL: https://blog.aquasec.com/workload-protection-realtime-security
Submission: On August 16 via api from US — Scanned from DE

Form analysis 3 forms found in the DOM

GET https://blog.aquasec.com/hs-search-results

<form action="https://blog.aquasec.com/hs-search-results" method="GET">
  <input type="text" class="navbar_search_input" name="term" autocomplete="off" placeholder="Enter a keyword to search the blog">
  <input type="hidden" name="type" value="BLOG_POST">
  <input type="hidden" name="length" value="SHORT">
  <input type="submit" class="navbar_submit_button" value="Search">
</form>

POST https://forms.hsforms.com/submissions/v3/public/submit/formsnext/multipart/1665891/bcc43e1c-30ef-4ea4-9582-44bff8d5ad4c

<form novalidate="" accept-charset="UTF-8" action="https://forms.hsforms.com/submissions/v3/public/submit/formsnext/multipart/1665891/bcc43e1c-30ef-4ea4-9582-44bff8d5ad4c" enctype="multipart/form-data"
  id="hsForm_bcc43e1c-30ef-4ea4-9582-44bff8d5ad4c_1" method="POST"
  class="hs-form stacked hs-form-private hsForm_bcc43e1c-30ef-4ea4-9582-44bff8d5ad4c hs-form-bcc43e1c-30ef-4ea4-9582-44bff8d5ad4c hs-form-bcc43e1c-30ef-4ea4-9582-44bff8d5ad4c_ca8994a8-4629-4a97-b723-682fd3419690"
  data-form-id="bcc43e1c-30ef-4ea4-9582-44bff8d5ad4c" data-portal-id="1665891" target="target_iframe_bcc43e1c-30ef-4ea4-9582-44bff8d5ad4c_1" data-reactid=".hbspt-forms-1">
  <div class="hs_firstname hs-firstname hs-fieldtype-text field hs-form-field" data-reactid=".hbspt-forms-1.1:$0"><label id="label-firstname-bcc43e1c-30ef-4ea4-9582-44bff8d5ad4c_1" class="" placeholder="Enter your First Name"
      for="firstname-bcc43e1c-30ef-4ea4-9582-44bff8d5ad4c_1" data-reactid=".hbspt-forms-1.1:$0.0"><span data-reactid=".hbspt-forms-1.1:$0.0.0">First Name</span></label>
    <legend class="hs-field-desc" style="display:none;" data-reactid=".hbspt-forms-1.1:$0.1"></legend>
    <div class="input" data-reactid=".hbspt-forms-1.1:$0.$firstname"><input id="firstname-bcc43e1c-30ef-4ea4-9582-44bff8d5ad4c_1" class="hs-input" type="text" name="firstname" value="" placeholder="" autocomplete="given-name"
        data-reactid=".hbspt-forms-1.1:$0.$firstname.0" inputmode="text"></div>
  </div>
  <div class="hs_lastname hs-lastname hs-fieldtype-text field hs-form-field" data-reactid=".hbspt-forms-1.1:$1"><label id="label-lastname-bcc43e1c-30ef-4ea4-9582-44bff8d5ad4c_1" class="" placeholder="Enter your Last Name"
      for="lastname-bcc43e1c-30ef-4ea4-9582-44bff8d5ad4c_1" data-reactid=".hbspt-forms-1.1:$1.0"><span data-reactid=".hbspt-forms-1.1:$1.0.0">Last Name</span></label>
    <legend class="hs-field-desc" style="display:none;" data-reactid=".hbspt-forms-1.1:$1.1"></legend>
    <div class="input" data-reactid=".hbspt-forms-1.1:$1.$lastname"><input id="lastname-bcc43e1c-30ef-4ea4-9582-44bff8d5ad4c_1" class="hs-input" type="text" name="lastname" value="" placeholder="" autocomplete="family-name"
        data-reactid=".hbspt-forms-1.1:$1.$lastname.0" inputmode="text"></div>
  </div>
  <div class="hs_email hs-email hs-fieldtype-text field hs-form-field" data-reactid=".hbspt-forms-1.1:$2"><label id="label-email-bcc43e1c-30ef-4ea4-9582-44bff8d5ad4c_1" class="" placeholder="Enter your Email"
      for="email-bcc43e1c-30ef-4ea4-9582-44bff8d5ad4c_1" data-reactid=".hbspt-forms-1.1:$2.0"><span data-reactid=".hbspt-forms-1.1:$2.0.0">Email</span><span class="hs-form-required" data-reactid=".hbspt-forms-1.1:$2.0.1">*</span></label>
    <legend class="hs-field-desc" style="display:none;" data-reactid=".hbspt-forms-1.1:$2.1"></legend>
    <div class="input" data-reactid=".hbspt-forms-1.1:$2.$email"><input id="email-bcc43e1c-30ef-4ea4-9582-44bff8d5ad4c_1" class="hs-input" type="email" name="email" required="" placeholder="" value="" autocomplete="email"
        data-reactid=".hbspt-forms-1.1:$2.$email.0" inputmode="email"></div>
  </div>
  <div class="hs_comment hs-comment hs-fieldtype-textarea field hs-form-field" data-reactid=".hbspt-forms-1.1:$3"><label id="label-comment-bcc43e1c-30ef-4ea4-9582-44bff8d5ad4c_1" class="" placeholder="Enter your Comment"
      for="comment-bcc43e1c-30ef-4ea4-9582-44bff8d5ad4c_1" data-reactid=".hbspt-forms-1.1:$3.0"><span data-reactid=".hbspt-forms-1.1:$3.0.0">Comment</span><span class="hs-form-required" data-reactid=".hbspt-forms-1.1:$3.0.1">*</span></label>
    <legend class="hs-field-desc" style="display:none;" data-reactid=".hbspt-forms-1.1:$3.1"></legend>
    <div class="input" data-reactid=".hbspt-forms-1.1:$3.$comment"><textarea id="comment-bcc43e1c-30ef-4ea4-9582-44bff8d5ad4c_1" class="hs-input" name="comment" required="" placeholder="" data-reactid=".hbspt-forms-1.1:$3.$comment.0"></textarea>
    </div>
  </div>
  <div class="hs_lifecyclestage hs-lifecyclestage hs-fieldtype-radio field hs-form-field" style="display:none;" data-reactid=".hbspt-forms-1.1:$4"><label id="label-lifecyclestage-bcc43e1c-30ef-4ea4-9582-44bff8d5ad4c_1" class=""
      placeholder="Enter your Lifecycle Stage" for="lifecyclestage-bcc43e1c-30ef-4ea4-9582-44bff8d5ad4c_1" data-reactid=".hbspt-forms-1.1:$4.0"><span data-reactid=".hbspt-forms-1.1:$4.0.0">Lifecycle Stage</span></label>
    <legend class="hs-field-desc" style="display:none;" data-reactid=".hbspt-forms-1.1:$4.1"></legend>
    <div class="input" data-reactid=".hbspt-forms-1.1:$4.$lifecyclestage"><input name="lifecyclestage" class="hs-input" type="hidden" value="subscriber" data-reactid=".hbspt-forms-1.1:$4.$lifecyclestage.0"></div>
  </div>
  <div class="hs_utm_source hs-utm_source hs-fieldtype-text field hs-form-field" style="display:none;" data-reactid=".hbspt-forms-1.1:$5"><label id="label-utm_source-bcc43e1c-30ef-4ea4-9582-44bff8d5ad4c_1" class="" placeholder="Enter your UTM_Source"
      for="utm_source-bcc43e1c-30ef-4ea4-9582-44bff8d5ad4c_1" data-reactid=".hbspt-forms-1.1:$5.0"><span data-reactid=".hbspt-forms-1.1:$5.0.0">UTM_Source</span></label>
    <legend class="hs-field-desc" style="display:none;" data-reactid=".hbspt-forms-1.1:$5.1"></legend>
    <div class="input" data-reactid=".hbspt-forms-1.1:$5.$utm_source"><input name="utm_source" class="hs-input" type="hidden" value="" data-reactid=".hbspt-forms-1.1:$5.$utm_source.0"></div>
  </div>
  <div class="hs_utm_campaign hs-utm_campaign hs-fieldtype-text field hs-form-field" style="display:none;" data-reactid=".hbspt-forms-1.1:$6"><label id="label-utm_campaign-bcc43e1c-30ef-4ea4-9582-44bff8d5ad4c_1" class=""
      placeholder="Enter your UTM_Campaign" for="utm_campaign-bcc43e1c-30ef-4ea4-9582-44bff8d5ad4c_1" data-reactid=".hbspt-forms-1.1:$6.0"><span data-reactid=".hbspt-forms-1.1:$6.0.0">UTM_Campaign</span></label>
    <legend class="hs-field-desc" style="display:none;" data-reactid=".hbspt-forms-1.1:$6.1"></legend>
    <div class="input" data-reactid=".hbspt-forms-1.1:$6.$utm_campaign"><input name="utm_campaign" class="hs-input" type="hidden" value="" data-reactid=".hbspt-forms-1.1:$6.$utm_campaign.0"></div>
  </div>
  <div class="hs_utm_medium hs-utm_medium hs-fieldtype-text field hs-form-field" style="display:none;" data-reactid=".hbspt-forms-1.1:$7"><label id="label-utm_medium-bcc43e1c-30ef-4ea4-9582-44bff8d5ad4c_1" class="" placeholder="Enter your UTM_Medium"
      for="utm_medium-bcc43e1c-30ef-4ea4-9582-44bff8d5ad4c_1" data-reactid=".hbspt-forms-1.1:$7.0"><span data-reactid=".hbspt-forms-1.1:$7.0.0">UTM_Medium</span></label>
    <legend class="hs-field-desc" style="display:none;" data-reactid=".hbspt-forms-1.1:$7.1"></legend>
    <div class="input" data-reactid=".hbspt-forms-1.1:$7.$utm_medium"><input name="utm_medium" class="hs-input" type="hidden" value="" data-reactid=".hbspt-forms-1.1:$7.$utm_medium.0"></div>
  </div>
  <div class="hs_utm_content hs-utm_content hs-fieldtype-text field hs-form-field" style="display:none;" data-reactid=".hbspt-forms-1.1:$8"><label id="label-utm_content-bcc43e1c-30ef-4ea4-9582-44bff8d5ad4c_1" class=""
      placeholder="Enter your UTM_Content" for="utm_content-bcc43e1c-30ef-4ea4-9582-44bff8d5ad4c_1" data-reactid=".hbspt-forms-1.1:$8.0"><span data-reactid=".hbspt-forms-1.1:$8.0.0">UTM_Content</span></label>
    <legend class="hs-field-desc" style="display:none;" data-reactid=".hbspt-forms-1.1:$8.1"></legend>
    <div class="input" data-reactid=".hbspt-forms-1.1:$8.$utm_content"><input name="utm_content" class="hs-input" type="hidden" value="" data-reactid=".hbspt-forms-1.1:$8.$utm_content.0"></div>
  </div>
  <div class="hs_utm_term hs-utm_term hs-fieldtype-text field hs-form-field" style="display:none;" data-reactid=".hbspt-forms-1.1:$9"><label id="label-utm_term-bcc43e1c-30ef-4ea4-9582-44bff8d5ad4c_1" class="" placeholder="Enter your UTM_Term"
      for="utm_term-bcc43e1c-30ef-4ea4-9582-44bff8d5ad4c_1" data-reactid=".hbspt-forms-1.1:$9.0"><span data-reactid=".hbspt-forms-1.1:$9.0.0">UTM_Term</span></label>
    <legend class="hs-field-desc" style="display:none;" data-reactid=".hbspt-forms-1.1:$9.1"></legend>
    <div class="input" data-reactid=".hbspt-forms-1.1:$9.$utm_term"><input name="utm_term" class="hs-input" type="hidden" value="" data-reactid=".hbspt-forms-1.1:$9.$utm_term.0"></div>
  </div>
  <div class="hs_gclid hs-gclid hs-fieldtype-text field hs-form-field" style="display:none;" data-reactid=".hbspt-forms-1.1:$10"><label id="label-gclid-bcc43e1c-30ef-4ea4-9582-44bff8d5ad4c_1" class="" placeholder="Enter your GCLID"
      for="gclid-bcc43e1c-30ef-4ea4-9582-44bff8d5ad4c_1" data-reactid=".hbspt-forms-1.1:$10.0"><span data-reactid=".hbspt-forms-1.1:$10.0.0">GCLID</span></label>
    <legend class="hs-field-desc" style="display:none;" data-reactid=".hbspt-forms-1.1:$10.1"></legend>
    <div class="input" data-reactid=".hbspt-forms-1.1:$10.$gclid"><input name="gclid" class="hs-input" type="hidden" value="" data-reactid=".hbspt-forms-1.1:$10.$gclid.0"></div>
  </div><noscript data-reactid=".hbspt-forms-1.2"></noscript>
  <div class="hs_recaptcha hs-recaptcha field hs-form-field" data-reactid=".hbspt-forms-1.3">
    <div class="input" data-reactid=".hbspt-forms-1.3.0">
      <div class="grecaptcha-badge" data-style="inline" style="width: 256px; height: 60px; box-shadow: gray 0px 0px 5px;">
        <div class="grecaptcha-logo"><iframe title="reCAPTCHA"
            src="https://www.google.com/recaptcha/enterprise/anchor?ar=1&amp;k=6Ld_ad8ZAAAAAAqr0ePo1dUfAi0m4KPkCMQYwPPm&amp;co=aHR0cHM6Ly9ibG9nLmFxdWFzZWMuY29tOjQ0Mw..&amp;hl=de&amp;v=mq0-U1BHZ5YTcoDC-CvsLPNc&amp;size=invisible&amp;badge=inline&amp;cb=ibeiguttj9wb"
            width="256" height="60" role="presentation" name="a-t87d8e3kvd34" frameborder="0" scrolling="no" sandbox="allow-forms allow-popups allow-same-origin allow-scripts allow-top-navigation allow-modals allow-popups-to-escape-sandbox"></iframe>
        </div>
        <div class="grecaptcha-error"></div><textarea id="g-recaptcha-response" name="g-recaptcha-response" class="g-recaptcha-response"
          style="width: 250px; height: 40px; border: 1px solid rgb(193, 193, 193); margin: 10px 25px; padding: 0px; resize: none; display: none;"></textarea>
      </div><iframe style="display: none;"></iframe>
    </div><input type="hidden" name="g-recaptcha-response" id="hs-recaptcha-response" value="" data-reactid=".hbspt-forms-1.3.1">
  </div>
  <div class="hs_submit hs-submit" data-reactid=".hbspt-forms-1.5">
    <div class="hs-field-desc" style="display:none;" data-reactid=".hbspt-forms-1.5.0"></div>
    <div class="actions" data-reactid=".hbspt-forms-1.5.1"><input type="submit" value="Submit Comment" class="hs-button primary" data-reactid=".hbspt-forms-1.5.1.0"></div>
  </div><noscript data-reactid=".hbspt-forms-1.6"></noscript><input name="hs_context" type="hidden"
    value="{&quot;rumScriptExecuteTime&quot;:682.1000003814697,&quot;rumServiceResponseTime&quot;:971.2999992370605,&quot;rumFormRenderTime&quot;:1.7000007629394531,&quot;rumTotalRenderTime&quot;:973.3999996185303,&quot;rumTotalRequestTime&quot;:288,&quot;embedAtTimestamp&quot;:&quot;1660663034348&quot;,&quot;formDefinitionUpdatedAt&quot;:&quot;1647963475056&quot;,&quot;pageUrl&quot;:&quot;https://blog.aquasec.com/workload-protection-realtime-security&quot;,&quot;pageTitle&quot;:&quot;Protecting Workloads Against Real-World Attacks With Ease&quot;,&quot;source&quot;:&quot;FormsNext-static-5.519&quot;,&quot;sourceName&quot;:&quot;FormsNext&quot;,&quot;sourceVersion&quot;:&quot;5.519&quot;,&quot;sourceVersionMajor&quot;:&quot;5&quot;,&quot;sourceVersionMinor&quot;:&quot;519&quot;,&quot;timestamp&quot;:1660663034355,&quot;userAgent&quot;:&quot;Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/104.0.5112.79 Safari/537.36&quot;,&quot;originalEmbedContext&quot;:{&quot;portalId&quot;:&quot;1665891&quot;,&quot;formId&quot;:&quot;bcc43e1c-30ef-4ea4-9582-44bff8d5ad4c&quot;,&quot;pageId&quot;:&quot;80985379464&quot;,&quot;region&quot;:&quot;na1&quot;,&quot;pageName&quot;:&quot;Protecting Workloads Against Real-World Attacks With Ease&quot;,&quot;contentType&quot;:&quot;blog-post&quot;,&quot;formsBaseUrl&quot;:&quot;/_hcms/forms/&quot;,&quot;target&quot;:&quot;#hs_form_target_bcc43e1c-30ef-4ea4-9582-44bff8d5ad4c&quot;,&quot;type&quot;:&quot;BLOG_COMMENT&quot;,&quot;submitButtonClass&quot;:&quot;hs-button primary&quot;,&quot;formInstanceId&quot;:&quot;1&quot;},&quot;canonicalUrl&quot;:&quot;https://blog.aquasec.com/workload-protection-realtime-security&quot;,&quot;pageId&quot;:&quot;80985379464&quot;,&quot;pageName&quot;:&quot;Protecting Workloads Against Real-World Attacks With Ease&quot;,&quot;formInstanceId&quot;:&quot;1&quot;,&quot;renderedFieldsIds&quot;:[&quot;firstname&quot;,&quot;lastname&quot;,&quot;email&quot;,&quot;comment&quot;],&quot;formTarget&quot;:&quot;#hs_form_target_bcc43e1c-30ef-4ea4-9582-44bff8d5ad4c&quot;,&quot;correlationId&quot;:&quot;612dd78f-ff5b-4ae9-ad09-005b57190c80&quot;,&quot;contentType&quot;:&quot;blog-post&quot;,&quot;hutk&quot;:&quot;50aa2eb1a672a91e4afeab1e06995673&quot;,&quot;captchaStatus&quot;:&quot;LOADED&quot;,&quot;isHostedOnHubspot&quot;:true}"
    data-reactid=".hbspt-forms-1.7"><iframe name="target_iframe_bcc43e1c-30ef-4ea4-9582-44bff8d5ad4c_1" style="display:none;" data-reactid=".hbspt-forms-1.8"></iframe>
</form>

POST https://forms.hsforms.com/submissions/v3/public/submit/formsnext/multipart/1665891/fc3a461b-474b-4bd2-b409-c41d4ec09d8a

<form novalidate="" accept-charset="UTF-8" action="https://forms.hsforms.com/submissions/v3/public/submit/formsnext/multipart/1665891/fc3a461b-474b-4bd2-b409-c41d4ec09d8a" enctype="multipart/form-data"
  id="hsForm_fc3a461b-474b-4bd2-b409-c41d4ec09d8a_1" method="POST"
  class="hs-form stacked hs-form-private hsForm_fc3a461b-474b-4bd2-b409-c41d4ec09d8a hs-form-fc3a461b-474b-4bd2-b409-c41d4ec09d8a hs-form-fc3a461b-474b-4bd2-b409-c41d4ec09d8a_dd1883bc-7502-464a-8c9b-86f2ad16f81c"
  data-form-id="fc3a461b-474b-4bd2-b409-c41d4ec09d8a" data-portal-id="1665891" target="target_iframe_fc3a461b-474b-4bd2-b409-c41d4ec09d8a_1" data-reactid=".hbspt-forms-0">
  <div class="hs_email hs-email hs-fieldtype-text field hs-form-field" data-reactid=".hbspt-forms-0.1:$0"><label id="label-email-fc3a461b-474b-4bd2-b409-c41d4ec09d8a_1" class="" placeholder="Enter your Email Address"
      for="email-fc3a461b-474b-4bd2-b409-c41d4ec09d8a_1" data-reactid=".hbspt-forms-0.1:$0.0"><span data-reactid=".hbspt-forms-0.1:$0.0.0">Email Address</span><span class="hs-form-required" data-reactid=".hbspt-forms-0.1:$0.0.1">*</span></label>
    <legend class="hs-field-desc" style="display:none;" data-reactid=".hbspt-forms-0.1:$0.1"></legend>
    <div class="input" data-reactid=".hbspt-forms-0.1:$0.$email"><input id="email-fc3a461b-474b-4bd2-b409-c41d4ec09d8a_1" class="hs-input" type="email" name="email" required="" placeholder="" value="" autocomplete="email"
        data-reactid=".hbspt-forms-0.1:$0.$email.0" inputmode="email"></div>
  </div>
  <div class="hs_blog_default_hubspot_blog_subscription hs-blog_default_hubspot_blog_subscription hs-fieldtype-radio field hs-form-field" style="display:none;" data-reactid=".hbspt-forms-0.1:$1"><label
      id="label-blog_default_hubspot_blog_subscription-fc3a461b-474b-4bd2-b409-c41d4ec09d8a_1" class="" placeholder="Enter your Notification Frequency" for="blog_default_hubspot_blog_subscription-fc3a461b-474b-4bd2-b409-c41d4ec09d8a_1"
      data-reactid=".hbspt-forms-0.1:$1.0"><span data-reactid=".hbspt-forms-0.1:$1.0.0">Notification Frequency</span></label>
    <legend class="hs-field-desc" style="display:none;" data-reactid=".hbspt-forms-0.1:$1.1"></legend>
    <div class="input" data-reactid=".hbspt-forms-0.1:$1.$blog_default_hubspot_blog_subscription"><input name="blog_default_hubspot_blog_subscription" class="hs-input" type="hidden" value="instant"
        data-reactid=".hbspt-forms-0.1:$1.$blog_default_hubspot_blog_subscription.0"></div>
  </div>
  <div class="hs_lifecyclestage hs-lifecyclestage hs-fieldtype-radio field hs-form-field" style="display:none;" data-reactid=".hbspt-forms-0.1:$2"><label id="label-lifecyclestage-fc3a461b-474b-4bd2-b409-c41d4ec09d8a_1" class=""
      placeholder="Enter your Lifecycle Stage" for="lifecyclestage-fc3a461b-474b-4bd2-b409-c41d4ec09d8a_1" data-reactid=".hbspt-forms-0.1:$2.0"><span data-reactid=".hbspt-forms-0.1:$2.0.0">Lifecycle Stage</span></label>
    <legend class="hs-field-desc" style="display:none;" data-reactid=".hbspt-forms-0.1:$2.1"></legend>
    <div class="input" data-reactid=".hbspt-forms-0.1:$2.$lifecyclestage"><input name="lifecyclestage" class="hs-input" type="hidden" value="subscriber" data-reactid=".hbspt-forms-0.1:$2.$lifecyclestage.0"></div>
  </div>
  <div class="hs_utm_source hs-utm_source hs-fieldtype-text field hs-form-field" style="display:none;" data-reactid=".hbspt-forms-0.1:$3"><label id="label-utm_source-fc3a461b-474b-4bd2-b409-c41d4ec09d8a_1" class="" placeholder="Enter your UTM_Source"
      for="utm_source-fc3a461b-474b-4bd2-b409-c41d4ec09d8a_1" data-reactid=".hbspt-forms-0.1:$3.0"><span data-reactid=".hbspt-forms-0.1:$3.0.0">UTM_Source</span></label>
    <legend class="hs-field-desc" style="display:none;" data-reactid=".hbspt-forms-0.1:$3.1"></legend>
    <div class="input" data-reactid=".hbspt-forms-0.1:$3.$utm_source"><input name="utm_source" class="hs-input" type="hidden" value="" data-reactid=".hbspt-forms-0.1:$3.$utm_source.0"></div>
  </div>
  <div class="hs_utm_campaign hs-utm_campaign hs-fieldtype-text field hs-form-field" style="display:none;" data-reactid=".hbspt-forms-0.1:$4"><label id="label-utm_campaign-fc3a461b-474b-4bd2-b409-c41d4ec09d8a_1" class=""
      placeholder="Enter your UTM_Campaign" for="utm_campaign-fc3a461b-474b-4bd2-b409-c41d4ec09d8a_1" data-reactid=".hbspt-forms-0.1:$4.0"><span data-reactid=".hbspt-forms-0.1:$4.0.0">UTM_Campaign</span></label>
    <legend class="hs-field-desc" style="display:none;" data-reactid=".hbspt-forms-0.1:$4.1"></legend>
    <div class="input" data-reactid=".hbspt-forms-0.1:$4.$utm_campaign"><input name="utm_campaign" class="hs-input" type="hidden" value="" data-reactid=".hbspt-forms-0.1:$4.$utm_campaign.0"></div>
  </div>
  <div class="hs_utm_medium hs-utm_medium hs-fieldtype-text field hs-form-field" style="display:none;" data-reactid=".hbspt-forms-0.1:$5"><label id="label-utm_medium-fc3a461b-474b-4bd2-b409-c41d4ec09d8a_1" class="" placeholder="Enter your UTM_Medium"
      for="utm_medium-fc3a461b-474b-4bd2-b409-c41d4ec09d8a_1" data-reactid=".hbspt-forms-0.1:$5.0"><span data-reactid=".hbspt-forms-0.1:$5.0.0">UTM_Medium</span></label>
    <legend class="hs-field-desc" style="display:none;" data-reactid=".hbspt-forms-0.1:$5.1"></legend>
    <div class="input" data-reactid=".hbspt-forms-0.1:$5.$utm_medium"><input name="utm_medium" class="hs-input" type="hidden" value="" data-reactid=".hbspt-forms-0.1:$5.$utm_medium.0"></div>
  </div>
  <div class="hs_utm_content hs-utm_content hs-fieldtype-text field hs-form-field" style="display:none;" data-reactid=".hbspt-forms-0.1:$6"><label id="label-utm_content-fc3a461b-474b-4bd2-b409-c41d4ec09d8a_1" class=""
      placeholder="Enter your UTM_Content" for="utm_content-fc3a461b-474b-4bd2-b409-c41d4ec09d8a_1" data-reactid=".hbspt-forms-0.1:$6.0"><span data-reactid=".hbspt-forms-0.1:$6.0.0">UTM_Content</span></label>
    <legend class="hs-field-desc" style="display:none;" data-reactid=".hbspt-forms-0.1:$6.1"></legend>
    <div class="input" data-reactid=".hbspt-forms-0.1:$6.$utm_content"><input name="utm_content" class="hs-input" type="hidden" value="" data-reactid=".hbspt-forms-0.1:$6.$utm_content.0"></div>
  </div>
  <div class="hs_utm_term hs-utm_term hs-fieldtype-text field hs-form-field" style="display:none;" data-reactid=".hbspt-forms-0.1:$7"><label id="label-utm_term-fc3a461b-474b-4bd2-b409-c41d4ec09d8a_1" class="" placeholder="Enter your UTM_Term"
      for="utm_term-fc3a461b-474b-4bd2-b409-c41d4ec09d8a_1" data-reactid=".hbspt-forms-0.1:$7.0"><span data-reactid=".hbspt-forms-0.1:$7.0.0">UTM_Term</span></label>
    <legend class="hs-field-desc" style="display:none;" data-reactid=".hbspt-forms-0.1:$7.1"></legend>
    <div class="input" data-reactid=".hbspt-forms-0.1:$7.$utm_term"><input name="utm_term" class="hs-input" type="hidden" value="" data-reactid=".hbspt-forms-0.1:$7.$utm_term.0"></div>
  </div><noscript data-reactid=".hbspt-forms-0.2"></noscript>
  <div class="hs_submit hs-submit" data-reactid=".hbspt-forms-0.5">
    <div class="hs-field-desc" style="display:none;" data-reactid=".hbspt-forms-0.5.0"></div>
    <div class="actions" data-reactid=".hbspt-forms-0.5.1"><input type="submit" value="Subscribe" class="hs-button primary large" data-reactid=".hbspt-forms-0.5.1.0"></div>
  </div><noscript data-reactid=".hbspt-forms-0.6"></noscript><input name="hs_context" type="hidden"
    value="{&quot;rumScriptExecuteTime&quot;:682.1000003814697,&quot;rumServiceResponseTime&quot;:900.1000003814697,&quot;rumFormRenderTime&quot;:2.5,&quot;rumTotalRenderTime&quot;:903.5,&quot;rumTotalRequestTime&quot;:215.20000076293945,&quot;isLegacyThemeAllowed&quot;:&quot;true&quot;,&quot;renderRawHtml&quot;:&quot;true&quot;,&quot;embedAtTimestamp&quot;:&quot;1660663034330&quot;,&quot;formDefinitionUpdatedAt&quot;:&quot;1616699269240&quot;,&quot;pageUrl&quot;:&quot;https://blog.aquasec.com/workload-protection-realtime-security&quot;,&quot;pageTitle&quot;:&quot;Protecting Workloads Against Real-World Attacks With Ease&quot;,&quot;source&quot;:&quot;FormsNext-static-5.519&quot;,&quot;sourceName&quot;:&quot;FormsNext&quot;,&quot;sourceVersion&quot;:&quot;5.519&quot;,&quot;sourceVersionMajor&quot;:&quot;5&quot;,&quot;sourceVersionMinor&quot;:&quot;519&quot;,&quot;timestamp&quot;:1660663034330,&quot;userAgent&quot;:&quot;Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/104.0.5112.79 Safari/537.36&quot;,&quot;originalEmbedContext&quot;:{&quot;portalId&quot;:&quot;1665891&quot;,&quot;formId&quot;:&quot;fc3a461b-474b-4bd2-b409-c41d4ec09d8a&quot;,&quot;formInstanceId&quot;:&quot;1&quot;,&quot;pageId&quot;:&quot;80985379464&quot;,&quot;region&quot;:&quot;na1&quot;,&quot;pageName&quot;:&quot;Protecting Workloads Against Real-World Attacks With Ease&quot;,&quot;contentType&quot;:&quot;blog-post&quot;,&quot;formsBaseUrl&quot;:&quot;/_hcms/forms/&quot;,&quot;inlineMessage&quot;:true,&quot;target&quot;:&quot;#hs_form_target_module_14538258496742317_1&quot;,&quot;formData&quot;:{&quot;cssClass&quot;:&quot;hs-form stacked&quot;}},&quot;canonicalUrl&quot;:&quot;https://blog.aquasec.com/workload-protection-realtime-security&quot;,&quot;pageId&quot;:&quot;80985379464&quot;,&quot;pageName&quot;:&quot;Protecting Workloads Against Real-World Attacks With Ease&quot;,&quot;formInstanceId&quot;:&quot;1&quot;,&quot;renderedFieldsIds&quot;:[&quot;email&quot;],&quot;formTarget&quot;:&quot;#hs_form_target_module_14538258496742317_1&quot;,&quot;correlationId&quot;:&quot;ad4c5038-8115-42a5-be47-e5ddb8349ce7&quot;,&quot;contentType&quot;:&quot;blog-post&quot;,&quot;hutk&quot;:&quot;50aa2eb1a672a91e4afeab1e06995673&quot;,&quot;captchaStatus&quot;:&quot;NOT_APPLICABLE&quot;,&quot;isHostedOnHubspot&quot;:true}"
    data-reactid=".hbspt-forms-0.7"><iframe name="target_iframe_fc3a461b-474b-4bd2-b409-c41d4ec09d8a_1" style="display:none;" data-reactid=".hbspt-forms-0.8"></iframe>
</form>

Text Content

Aqua uses website cookies to give visitors a better service. To find out more
about the cookies we use, see our Privacy Policy

Accept Decline
Aqua Security
 * Products
 * Solutions
 * Resources
 * Company

Search Sign In Try Aqua

Aqua Blog



Story Tweedie-Yates
August 04, 2022


PROTECTING WORKLOADS AGAINST REAL-WORLD ATTACKS WITH EASE

Attackers are sophisticated, there is always a lag between zero days and
mitigation, and production workloads are critical. So why is the adoption of
runtime security for cloud native applications still lower than shift-left
security practices for the same applications? 

We will discuss this, along with the solution, in this blog. Earlier this week,
we introduced the next-generation of our runtime security solution. It is
effective at stopping attacks, easy to deploy and manage, and nothing short of
transformational for your security posture.


RUNTIME SECURITY MATTERS

Let’s face it, your production workloads are both the most sensitive and
critical part of the software development lifecycle, as well as generally what
attackers are trying to access. And yet, in the cloud native application
landscape, shift-left and vulnerability scanning at both the application and
infrastructure layers are relatively well-adopted security capabilities, while
adoption of runtime security controls at the application layer lags behind.
(It’s important to note that security capabilities in runtime at the
infrastructure layer are well-known and mature in the form of Cloud Security
Posture Management (CSPM). It’s really runtime protection at the application
layer where adoption falls behind). 


Why would this be? Well, for some teams, adoption of runtime security can be
fraught with a perception of complexity and risk.

 * First, security measures on running production workloads can be viewed as
   risky, especially by DevOps teams whose primary mission is speed. Today, many
   companies build on this perception to push the idea of ‘agentless’ security
   in runtime (see here for our blog on why agent vs agentless is a false
   choice); a concept that we will address in-depth.
   
   
 * Second, for many teams, runtime protection requires knowledge of the
   application to know which policies to set. Security teams would have to work
   with engineering to understand the particularities of the application, which
   was a prohibitive practice in some organizations. And while many teams have
   been successful with this paradigm, some have been unable to overcome the
   internal obstacles to implementation.

We set about solving these challenges, and today, we are here to tell you that
runtime protection is accessible for all teams. Runtime protection has never
been optional to an effective security posture; and as a result, we are making
it easier than ever.


THE RIGHT KIND OF VISIBILITY

Let’s start with the FUD. As mentioned above, some vendors will use the
historical, perceived complexity of runtime security to push snapshot scanning
technology, creating a false dichotomy between ‘agent and agentless’ protection.
But in runtime, agentless technologies will only provide visibility into the
runtime environment. Which is a good thing; Aqua offers snapshot scanning as a
key part of our Cloud Native Application Protection Platform (CNAPP) because we
think it’s a great way to achieve immediate visibility into risk.

Snapshot scanning identifies top risks in cloud runtime environments by
combining cloud account misconfigurations at the infrastructure layer with
sensitive data exposure, known vulnerabilities, and malware at the application
layer.



But snapshot scanning has never been an answer to the perceived complexity of
runtime protection and it doesn’t provide the same kind of visibility. Snapshot
scanning is time interval based and the data provided is based on whenever the
cloud API did its last scan. These intervals can differ across vendors and there
can be as much as a 15 minute gap between scans.

This matters the most to security operations teams that understand the impact of
mean time to detect (MTTD) and mean time to respond (MTTR) metrics on their
ability to adequately mitigate incidents. Mean time to detect, or MTTD,
indicates the amount of time it takes your team to discover a potential security
incident. Mean time to respond, or MTTR, indicates the amount of time it takes
to control, remediate, and/or eradicate a threat after it has been discovered.

Dwell time defines the entire length of a security incident, the duration from
which an attack first occurs in your network to the time it has been eradicated
and your stack has returned to a balanced, healthy state.

Fileless malware attacks and techniques like executing from /tmp will have too
much space to play with snapshot scanning. If an attacker injects malware into
/tmp, runs it, then deletes it before the next screenshot, they can clear their
tracks seamlessly, without you realizing they were even there.


LOW-LEVEL, AND KERNEL LEVEL VISIBILITY MATTERS

Ultimately, snapshot scanning does not give you visibility into the kernel
level. It does not capture syscalls and attempts to execute from memory.

This results in lower data resolution. Without realizing it, you might have
advanced malware like rootkits hiding themselves within the kernel.

Snapshot scanning also can’t give you the in-depth data needed to construct an
attack timeline to quickly decide impact, mitigate it, and provide that data to
governing and compliance bodies. Post-incident investigation is impossible for
ephemeral workloads if you don’t have the syscalls of the container, and there
are no leads to understand what happened. If something was downloaded from an IP
or a storage service, you at least have data points to start connecting. Without
that information, even if you detect a malicious event, you won’t know where it
came from or who did it. You might save new files written to the disk to contain
the malware file for investigation. But it would take an enormous amount of time
and effort to formulate an adequate resolution and response.


GRANULAR VISIBILITY AND PROTECTION; WHY IT IS ESSENTIAL TO MAKE RUNTIME
ACCESSIBLE TO EVERY TEAM

Moving to reality and the benefits of runtime protection, MTTD and MTTR for
attacks such as log4j or Spring4Shell demonstrate why the realtime and response
elements of runtime protection are critical. When the world became aware of
those two vulnerabilities and a fix was made available, there was an unavoidable
lag between the time to mitigate and the announcement of the issue. This means
attackers had exactly as much time as that lag to exploit the vulnerabilities as
you had to find and fix your exposure.



Runtime protection is what keeps that inevitable lag from becoming an incident.
In the time that you are spending patching and preventing the issue, runtime
protection will keep your exposed workloads from being exploited. Not to mention
the fact that the right kind of runtime protection will stop unknown attacks and
sophisticated attackers targeting your workloads.


THE NEXT GENERATION OF RUNTIME PROTECTION

We get it. No more political battles implementing runtime. No more blind spots
in your production workloads. You need immediate protection and deep, realtime
visibility today.

Recently, we introduced Aqua’s new out-of-the-box, advanced runtime solution for
seeing and stopping zero day threats. Protection is composed of a set of new,
curated, and optimized default security controls that are based on years of
experience deploying industry-leading granular runtime security. Using eBPF
technology and threat intel from cyber research team Aqua Nautilus to identify
advanced threats, Aqua surfaces the most critical issues in realtime while also
implementing a set of controls to protect running workloads immediately, without
disrupting the business.

As a result, you get protection in minutes without an in-depth knowledge of
their applications and without unnecessary risk to production workloads.

Policies are applicable for containers, VMs, and Kubernetes workloads. For
example, here are the curated container policies.

Container policies



eBPF technology makes deployments safe and provides kernel level visibility.
Behavioral indicators from Aqua Nautilus pick out advanced attacks based on
observations of real cloud native attacks in the wild. This gives you the
information you need to contain and mitigate an attack in realtime, identifying
sophisticated attacks like fileless malware and rootkits.




PROTECT YOUR WORKLOADS

Use these questions to evaluate runtime solutions:

 * Ask whether a product can see fileless malware attacks or a process executing
   from memory.
 * Ask whether a product can stop an attack in production without stopping the
   workload.
 * What mechanisms are in place to stop attack escalation or lateral movement?
 * What are the estimations of your MTTD and MTTR?
 * Which type of coverage do you have during Dwell Time, or even before it?
 * Do you have an out-of-the-box runtime capability that can stop advanced
   attacks?

Watch how Aqua’s Runtime protection solution can protect you against zero day
attacks in realtime, with rapid deployment in this runtime security demo. Learn
about the continuing importance of runtime security and how to build an
effective runtime strategy in this webinar.  Reach out to our sales team today
to see the next generation of runtime first-hand in a live environment.

STORY TWEEDIE-YATES

Story is the VP of Product Marketing at Aqua Security, where she is passionate
about helping to define the future of cloud native security. In her time off,
you will find her scooting her twins around Montreal’s parks or exploring
underwater treasures with a scuba mask alongside her husband.

Runtime Security, CNAPP

 * 
 * Share
 * 

READ MORE



First Name

Last Name

Email*

Comment*

Lifecycle Stage

UTM_Source

UTM_Campaign

UTM_Medium

UTM_Content

UTM_Term

GCLID






SUBSCRIBE TO EMAIL UPDATES

Email Address*

Notification Frequency

Lifecycle Stage

UTM_Source

UTM_Campaign

UTM_Medium

UTM_Content

UTM_Term




POPULAR POSTS

 * A Brief History of Containers: From the 1970s Till Now
 * Protecting Kubernetes Secrets: A Practical Guide
 * Top 20 Docker Security Best Practices: Ultimate Guide
 * Which Kubernetes Management Platform is Right for You?
 * 10 Essential Container CI/CD Tools


FILTER BY TOPIC

 * Container Security (105)
 * Kubernetes Security (84)
 * Security Threats (62)
 * Cloud Native Security (59)
 * Image Vulnerability Scanning (45)
 * Open Source (44)
 * Docker Security (35)
 * AWS Security (30)
 * Runtime Security (30)
 * Vulnerability Management (26)
 * Container Vulnerability (24)
 * Cloud Native Computing (22)
 * Cloud Security CSPM (20)
 * Compliance (20)
 * DevSecOps (20)
 * CI/CD (12)
 * Secrets (11)
 * Application Security (10)
 * Host Security (10)
 * Serverless-Security (10)
 * Aqua Security (8)
 * Dynamic Container Analysis (7)
 * Fargate (7)
 * Hybrid Cloud Security (7)
 * Software Supply Chain Security (7)
 * ebpf (7)
 * Events and Conferences (6)
 * Google Cloud Platform (6)
 * OpenShift (6)
 * Supply Chain Attacks (6)
 * Attack Vector (5)
 * Azure Containers (5)
 * Cloud Operations (5)
 * Container Tools (5)
 * DockerCon (5)
 * Security Automation (5)
 * Virtualized Containers (5)
 * Azure Cloud (4)
 * Cloud Workload Protection Platform CWPP (4)
 * Microservices (4)
 * Nano-Segmentation (4)
 * Orchestration (4)
 * Service Mesh (4)
 * Windows Containers (4)
 * CNAPP (3)
 * Case Study (3)
 * Container Deployment (3)
 * IBM Cloud (3)
 * Infrastructure-as-Code (IaC) (3)
 * Malware Attacks (3)
 * Network (3)
 * Pivotal (3)
 * Role Based Access Control RBAC (3)
 * Secure-vm (3)
 * Security Policy (3)
 * Thin OS (3)
 * EKS (2)
 * FaaS (2)
 * Integration (2)
 * Multi-tenancy (2)
 * Network Firewall (2)
 * SBOMs (2)
 * VMware (2)
 * Advanced Threat Mitigation (1)
 * Agentless Security (1)
 * Cisco (1)
 * Cloud Native Application Protection Platform (1)
 * Cloud VM (1)
 * Container Influencers (1)
 * Data Protection (1)
 * Drift Prevention (1)
 * Dynamic Threat Analysis (1)
 * EKS Security (1)
 * IoT (1)
 * Kubernetes Authorization (1)
 * Machine Learning (1)
 * Management Platform (1)
 * Mesosphere (1)
 * Microsoft (1)
 * Moby (1)
 * Seccomp Demo (1)
 * User Namespace (1)
 * VPC (1)
 * Wiki (1)

Show more...
Aqua Container Security

Aqua Security is the largest pure-play cloud native security company, providing
customers the freedom to innovate and accelerate their digital transformations.
The Aqua Platform provides prevention, detection, and response automation across
the entire application lifecycle to secure the build, secure cloud
infrastructure and secure running workloads, wherever they are deployed.

Aqua customers are among the world’s largest enterprises in financial services,
software, media, manufacturing and retail, with implementations across a broad
range of cloud providers and modern technology stacks spanning containers,
serverless functions and cloud VMs.


Copyright © 2022 Aqua Security Software Ltd.
Use Cases
 * Automate DevSecOps
 * Modernize Security
 * Compliance and Auditing
 * Serverless Containers & Functions
 * Hybrid and Multi Cloud

Environments
 * Kubernetes Security
 * OpenShift Security
 * Docker Security
 * AWS Cloud Security
 * Azure Cloud Security
 * Google Cloud Security
 * VMware PKS Security

Contact Us
 * Contact Us
 * Contact Support

Products
 * Aqua Cloud native security)
 * Open Source Container Security
 * Platform Integrations

Resources
 * Live Webinars
 * O’Reilly Book: Kubernetes Security
 * Cloud native Wiki

About Us
 * About Aqua
 * Newsroom
 * Careers







Get the Cloud Native News
Be the first to get expert insight, best practices and advice on cloud native
security, trends, threat intelligence and compliance
email address
Subscribe
Thank you!