DevOps.com

  • Latest
    • Articles
    • Features
    • Most Read
    • News
    • News Releases
  • Topics
    • AI
    • Continuous Delivery
    • Continuous Testing
    • Cloud
    • Culture
    • DevSecOps
    • Enterprise DevOps
    • Leadership Suite
    • DevOps Practice
    • ROELBOB
    • DevOps Toolbox
    • IT as Code
  • Videos/Podcasts
    • DevOps Chats
    • DevOps Unbound
  • Webinars
    • Upcoming
    • On-Demand Webinars
  • Library
  • Events
    • Upcoming Events
    • On-Demand Events
  • Sponsored Communities
    • AWS Community Hub
    • CloudBees
    • IT as Code
    • Rocket on DevOps.com
    • Traceable on DevOps.com
    • Quali on DevOps.com
  • Related Sites
    • Techstrong Group
    • Container Journal
    • Security Boulevard
    • Techstrong Research
    • DevOps Chat
    • DevOps Dozen
    • DevOps TV
    • Digital Anarchist
  • Media Kit
  • About
  • AI
  • Cloud
  • Continuous Delivery
  • Continuous Testing
  • DevSecOps
  • Leadership Suite
  • Practices
  • ROELBOB
  • Low-Code/No-Code
  • IT as Code
  • More
    • Application Performance Management/Monitoring
    • Culture
    • Enterprise DevOps

Home » Latest News Releases » Orkus Exits Stealth, Launches the Orkus Access Governance Platform So Enterprises Can Prevent Unauthorized Access in the Cloud

Orkus Exits Stealth, Launches the Orkus Access Governance Platform So Enterprises Can Prevent Unauthorized Access in the Cloud

By: Deborah Schalm on November 26, 2018 Leave a Comment

Customers Such as BSI Financial Are Using Orkus to Automate And Secure Access and Authorization to Infrastructure, Data and Privileged Identities in Cloud Environments

Recent Posts By Deborah Schalm
  • Exabeam Reinvents Security Analytics with Fusion XDR and Fusion SIEM Cloud Products to Address Security Needs at Scale
  • New Study Reveals Importance of Optimized Strategy for the Selection, Support, and Maintenance of Open Source Software
  • Applitools Integrates With Rally for Fast and Automated Bug Management
More from Deborah Schalm
Related Posts
  • Orkus Exits Stealth, Launches the Orkus Access Governance Platform So Enterprises Can Prevent Unauthorized Access in the Cloud
  • Managing Hardcoded Secrets to Shrink Your Attack Surface 
  • Common RDS Misconfigurations DevSecOps Teams Should Know
    Related Categories
  • Latest News Releases
    Related Topics
  • Orkus
Show more
Show less

Las Vegas, Nevada, AWS re:Invent, November 26, 2018 – Orkus, Inc., today announced it has formally entered the marketplace with the launch of the Orkus Access Governance Platform. As enterprises move to the cloud, legacy access and authorization methods break down, causing the risk of unauthorized access to infrastructure, data and privileged identities to spike exponentially. The Orkus platform shrinks that risk by enabling enterprises to implement automated, continuous access governance for cloud across infrastructure, data and privileged identities.

DevOps Connect:DevSecOps @ RSAC 2022

“The Orkus Platform enables us to prevent unauthorized access, eliminate the exposure caused by overly permissive and unnecessary access, and continuously protect our data in AWS,” said Gagan Sharma, CEO, BSI Financial. “Bottom line, Orkus has helped us to mature, optimize and automate our cloud access governance – an accomplishment we view as a strategic and operational win for the business.”

“Throughout my entire career as a CISO I’ve seen security teams struggle with access management, and not for lack of trying,” said Robert Bigman CEO of 2BSecure and former CISO for the CIA. “The Orkus platform delivers automation to an area of security in grave need of it, empowering IT teams to secure  access to their data, apps and infrastructure. Orkus’s graph-based approach provides a quantum leap forward in managing access and authorization enterprise-wide.”

Introducing the Orkus Access Governance Platform

The Orkus Access Governance Platform was developed to prevent unauthorized access in cloud caused by weak or ineffective access and authorization controls, operator error, and insider threats.  These scenarios, named as the top threats to cloud security in a recent Cybersecurity Insider report, occur regularly across cloud platforms. By enabling organizations to implement continuous governance of access and authorization for sensitive data, critical infrastructure and privileged identities, Orkus enables organizations to adopt cloud platforms while ensuring security and compliance. It consists of four main components:

Orkus Access Graph: Orkus simplifies access governance by building a real-time graph that captures all access relationships between data, infrastructure and identities that exist within an organization’s dynamic cloud infrastructure. The Orkus access graph can scale to millions of cloud objects, keep pace with rapid change and provide continuous visibility into and analytics for access and authorization.

Orkus Graph AI: Orkus uses Graph AI to learn “who” has access to “what” and “how” the access is being used. By applying machine learning on the access graph, Orkus understands access intent and usage across infrastructure, data and identities in your cloud infrastructure. Orkus Graph AI detects risks such as unused or stale privileged access, data exposure and insider threats.

Orkus Access Guardrails: Access Guardrails provide a simple and powerful method of automating access governance in cloud. Using guardrails, security and compliance teams can specify access control intent without worrying about managing hundreds of low-level access and authorization policies. Orkus automatically creates Guardrails to secure access to sensitive data and critical infrastructure and maintain compliance with mandates such as PCI, HIPAA and GDPR.  

Orkus Access Intelligence: The Orkus Access Intelligence provides the ability to search, investigate and audit access and authorization, both currently and historically – across the cloud infrastructure.

More on the Orkus Access Governance Platform can be found at http://www.orkus.com/platform

“Enterprises are rapidly adopting cloud infrastructure for digital transformation initiatives, however one of the key risks holding them back is unauthorized access, because legacy methods of controlling access are not working,” said Manish Kalia, Co-founder and CEO of Orkus. “Orkus provides continuous and comprehensive access governance covering all three areas – data, infrastructure and privileged identities. True to its name, the Orkus Access Governance Platform makes strong access governance achievable and sustainable in cloud settings.”

Orkus will be commemorating its launch at several events in Las Vegas.  A Bronze sponsor of AWS re:Invent, Orkus is formally launching at the show and encourages attendees to stop by its booth, 3038.  The following week, Orkus will be participating in the Gartner IAM Summit as a Silver sponsor, exhibiting at Booth 618.

About Orkus

Founded in 2017 by cloud and cybersecurity experts, Orkus has solved the most critical, hard-to-manage risk vector that enterprises face today in hybrid cloud computing – securing access to data, applications, and infrastructure. The Orkus Access Governance platform enables companies to prevent data exposure, tighten privileged identity access and protect critical infrastructure and applications from unauthorized access. Orkus is privately funded and based in San Jose, CA. For more information visit https://www.orkus.com.

 

Filed Under: Latest News Releases Tagged With: Orkus

Sponsored Content
Featured eBook
Hybrid Cloud Security 101

Hybrid Cloud Security 101

No matter where you are in your hybrid cloud journey, security is a big concern. Hybrid cloud security vulnerabilities typically take the form of loss of resource oversight and control, including unsanctioned public cloud use, lack of visibility into resources, inadequate change control, poor configuration management, and ineffective access controls ... Read More
« VMware Wavefront Adds AI, Distributed Tracing
Electric Cloud Named a ‘Leader’ for Continuous Delivery Release Automation by an Independent Research Firm »

TechStrong TV – Live

Click full-screen to enable volume control
Watch latest episodes and shows

Upcoming Webinars

Closing the Gap: Reducing Enterprise AppSec Risks Without Disrupting Deadlines
Thursday, June 30, 2022 - 11:00 am EDT
Automating the Observer: Lessons From 1,000+ Incidents
Thursday, June 30, 2022 - 1:00 pm EDT
Continuous Deployment
Monday, July 11, 2022 - 1:00 pm EDT

Latest from DevOps.com

Common RDS Misconfigurations DevSecOps Teams Should Know
June 29, 2022 | Gad Rosenthal
Quick! Define DevSecOps: Let’s Call it Development Security
June 29, 2022 | Don Macvittie
Chip-to-Cloud IoT: A Step Toward Web3
June 28, 2022 | Nahla Davies
DevOps Connect: DevSecOps — Building a Modern Cybersecurity Practice
June 27, 2022 | Veronica Haggar
What Is User Acceptance Testing and Why Is it so Important?
June 27, 2022 | Ron Stefanski

Get The Top Stories of the Week

  • View DevOps.com Privacy Policy
  • This field is for validation purposes and should be left unchanged.

Download Free eBook

The 101 of Continuous Software Delivery
New call-to-action

Most Read on DevOps.com

The Age of Software Supply Chain Disruption
June 23, 2022 | Bill Doerrfeld
Cloudflare Outage Outrage | Yet More FAA 5G Stupidity
June 23, 2022 | Richi Jennings
Developer’s Guide to Web Application Security
June 24, 2022 | Anas Baig
What Is User Acceptance Testing and Why Is it so Important?
June 27, 2022 | Ron Stefanski
DevOps Connect: DevSecOps — Building a Modern Cybersecurity ...
June 27, 2022 | Veronica Haggar

On-Demand Webinars

DevOps.com Webinar ReplaysDevOps.com Webinar Replays
  • Home
  • About DevOps.com
  • Meet our Authors
  • Write for DevOps.com
  • Media Kit
  • Sponsor Info
  • Copyright
  • TOS
  • Privacy Policy

Powered by Techstrong Group, Inc.

© 2022 ·Techstrong Group, Inc.All rights reserved.