Skip to content

Download

When it comes to cloud security, new zero days like the XZ Backdoor continue to appear, putting detection and response front and center.

In this technical buyer’s guide, we will provide a well-researched perspective, as well as a technical, practitioner-focused point of view, that is meant to serve as starting criteria, given the emerging threat landscape. 

 The technical guide covers: 

  • Defining CDR category - what's in, what's out, and why, looking at what the attacks tell us, what is actually running in the cloud, and what should remain a separate but complementary function
  • The 'must-haves' for CDR, including real-time posture, behavioral detection and context from identities and infrastructure
  • Technical RFP criteria for each of the CDR must-haves that cut across well-known categories like KSPM, CSPM, Runtime Security and Software Supply Chain Security