All Updates

All Updates

icon
Filter
Product updates
Orca Security launches cloud-to-dev capabilities for faster remediation
Next-gen Cybersecurity
Apr 5, 2023
This week:
M&A
N-able acquires Adlumin for USD 266 million to strengthen cybersecurity offerings
Next-gen Cybersecurity
Today
M&A
Bitsight acquires Cybersixgill for USD 115 million to enhance threat intelligence capabilities
Cyber Insurance
Today
M&A
Snowflake acquires Datavolo to enhance data integration capabilities for undisclosed sum
Generative AI Infrastructure
Today
M&A
Snowflake acquires Datavolo to enhance data integration capabilities for undisclosed sum
Data Infrastructure & Analytics
Today
M&A
Almanac acquires Gro Intelligence's IP assets for undisclosed sum
Smart Farming
Yesterday
Partnerships
Aduro Clean Technologies partners with Zeton to build hydrochemolytic pilot plant
Waste Recovery & Management Tech
Yesterday
Funding
Oishii raises USD 16 million in Series B funding from Resilience Reserve
Vertical Farming
Yesterday
Management news
GrowUp Farms appoints Mike Hedges as CEO
Vertical Farming
Yesterday
M&A
Rise Up acquires Yunoo and expands LMS monetization capabilities
EdTech: Corporate Learning
Yesterday
Product updates
Uber releases five new features for holiday travel season
Travel Tech
Yesterday
Next-gen Cybersecurity

Next-gen Cybersecurity

Apr 5, 2023

Orca Security launches cloud-to-dev capabilities for faster remediation

Product updates

  • Orca Security, a provider of agentless cloud network security, has introduced cloud-to-dev capabilities that can automatically trace cloud security risks from production back to their code origins and developers responsible for it. 

  • Orca Security is claimed to be the first cloud native application protection platform (CNAPP) to provide this linkage, leading to an estimated 80% reduction in remediation time and a significant decrease in the mean time to resolution (MTTR), which in turn shortens the time span where risks and vulnerabilities can be exploited. 

  • With these new capabilities, security teams can bypass the manual process of linking identified risks to source of origin and concentrate their efforts on more vital and pressing matters.

Contact us

Gain access to all industry hubs, market maps, research tools, and more
Get a demo
arrow
menuarrow

By using this site, you agree to allow SPEEDA Edge and our partners to use cookies for analytics and personalization. Visit our privacy policy for more information about our data collection practices.