Radware has announced that automobile enterprise Guangqi Honda has chosen its Cloud Native Protector service to provide strong cloud security support for its network construction and business development.
Honda has multiple factories, development and sales companies and branded vehicle lines and produces an average of 800,000 vehicles a year.
In 2019, Guangqi Honda deployed a big data analysis system in AWS. However, with the increase of AWS usage, the company faced prominent cloud security problems, including permissive access to cloud assets and services, compliance breaches and misconfigurations.
Without any proxy plug-in, Radware’s pure AWS cloud native solution can quickly conduct situation analyses based on acquired cloud native logs and recognise excessive permissions of cloud asset through a read-only access to Honda’s cloud environment.
Additionally, Radware’s Cloud Native Protector service can detect attacks in real-time and provide the full attack storyline by assembling together individual attack steps into one coherent attack kill chain.
“The customer’s DMP system relies heavily on the object storage services in S3, so they are extremely cautious about the operations in S3,” said Raffi Kesten, Chief Business Officer for Radware.
“Radware Cloud Native Protector service provides advanced threat detection capabilities designed to detect data stealing from S3 buckets to help security teams better protect object storage resources.”
“Radware Cloud Native Protector service provides us with several security and business benefits,” said Zeng Jian, Guangqi Honda’s Cloud Security Director. “First, operations and security teams have an automated breach detection tool that continuously monitors their cloud accounts for malicious activity while avoiding alert fatigue, and helps us comply with current grade protection.
“In addition, the solution automates monitoring account updates and configuration changes for misconfigurations and excessive permissions. This aligns account management across teams, requiring fewer resources, so security and DevOps teams can focus on other priorities.”