Virtualization Technology News and Information
Article
RSS
Black Hat USA 2023 Q&A: Dynatrace Will Showcase Its Application Security Module and How They Elevate Your Security Tooling

blackhat-vmblog-qa 

Are you getting ready for the upcoming Black Hat USA 2023 event, an internationally recognized cybersecurity event providing the most technical and relevant information security research, now in its 26th year.  The event is quickly approaching, taking place August 5-10, 2023, returning to the Mandalay Bay Convention Center in Las Vegas, NV with a 6-day program. 

Ahead of the show, VMblog received an exclusive interview with Andreas Kroier, Senior Principal and Solution Lead of Application Security at Dynatrace, a leader in unified observability and security.  Make sure to add them to your MUST SEE list.

dynatrace-logo 

VMblog:  Before we get into it, can you give us a quick overview of the company?  What should folks know?

Andreas Kroier:  One of the most critical threats facing cloud environments today is the lack of visibility and control. Dynatrace provides deep observability insights and runtime application security and analytics to help organizations simplify cloud complexity and ensure their software runs perfectly. Our unified observability and security platform delivers precise answers about the performance of applications, microservices, the underlying infrastructure, and the experience of end-users to enable organizations to innovate faster, collaborate more efficiently, and deliver more value.

Studies have shown that around 75 million applications will be delivered over the next few years. The volume and complexity of data and the number of applications will be impossible for companies to manage using traditional tools and strategies. Automation will be key - and to be successful organizations need modern observability platforms, like the Dynatrace platform, that use AI to discover, map and monitor applications running in multi- and hybrid-cloud environments.

VMblog:  You are sponsoring the upcoming Black Hat USA event.  How can attendees find you at the show?  Does your booth have a theme?  How many folks are you sending? 

Kroier:  During the event, we'll be at booth #2608 and our theme is cloud security done right. Stop by to learn how you can elevate your security tooling with Dynatrace.

At the booth, we'll be hosting several live demos of the Dynatrace Application Security Module, designed to provide real-time, automatic attack detection and blocking to protect against injection attacks that exploit critical vulnerabilities. 

I will be on-site and would love to connect to share how Dynatrace is leveraging hypermodal AI-combining predictive, causal, and generative AI-to help organizations mitigate security risks facing their cloud environments.

VMblog:  What is your message to Black Hat attendees coming out to the show this year?

Kroier:  Combining observability and security is no longer an option, it is a necessity. Organizations must have real-time visibility into their security posture, enabling immediate responses to any potential vulnerabilities that may be exploited by attackers. This necessitates an enhanced focus on analytics, incorporating observability context and data into both threat detection and forensics use cases and thereby not only looking at logs. By leveraging automation in security analytics investigations, organizations can continuously assess the risks posed by cyberattacks.

By utilizing solutions like the Dynatrace platform that converge observability and security data, organizations can make informed decisions, automatically prioritize actions efficiently using AI, and strengthen their overall security posture in an ever-evolving threat landscape.

VMblog:  The show is focused on cybersecurity.  What specific problems is your company and technology addressing?

Kroier:  Dynatrace is helping organizations supercharge their security operations through observability and AI. By empowering IT teams with observability insights, organizations reduce complexity and gain greater visibility and stronger defenses across hybrid and multicloud architectures. IT teams can obtain precise insights into their IT environments to monitor application performance and vulnerabilities, all in one holistic view. In the event of an incident, observability data can also help organizations prioritize which applications and systems to remediate first based on their importance to the business. Traditionally this has been difficult due to organizations' reliance on point solutions, resulting in fragmented data and teams working in siloes.  

Additionally, observability allows organizations to shift security left -that is, to identify security vulnerabilities in development through testing-as well as to shift right by connecting runtime insights to data collected throughout the development stage so that organizations gain a holistic view of the entire development cycle and quickly resolve incidents in parallel. With robust visibility across systems as well as the entire software development lifecycle, observability helps organizations reduce the time it takes to find vulnerabilities from days or weeks to as little as minutes and enables teams to be more effective and strategic in their resolution strategies, rather than being mired in days of firefighting. 

VMblog:  The market is a crowded space.  What is it about your company and technology that sets you apart from the competition?  What are your differentiators?

Kroier:  A key differentiator of Dynatrace's application security offering compared to other solutions available in the market lies in our unique approach to integrating observability and security. In the current cyber security landscape, customers are often overwhelmed with a multitude of tools that generate isolated "security events", leaving them uncertain about where to focus their efforts and the true risks facing their organization.

By combining our observability with our security product capabilities, Dynatrace provides a holistic and real-time understanding of an organization's security posture. We leverage our deep insights across the entire technology stack to cover all stages of an attack, from before, during, and after. 
  • Before an attack, our solution excels in vulnerability detection and prioritization. We identify potential weaknesses proactively in third party, custom or commercial off the shelf code.
  • During an attack, Dynatrace provides protection capabilities to mitigate and thwart threats in real time. Our solution is designed to shield the identified vulnerability in an application, ensuring business continuity and reducing potential damage, until the development teams resolve the problem.
  • After an attack, our forensics capabilities come into play. We empower organizations with comprehensive insights and analysis to understand the impact, learn from the incident, and fortify their applications against future threats.

By encompassing the entire security lifecycle and leveraging the power of observability, Dynatrace sets itself apart as a comprehensive and proactive security solution.

VMblog:  How does Dynatrace leverage AI in its security offerings?

Kroier:  Davis AI, our highly differentiated hypermodal AI engine, delivers precise, trustworthy, and explainable answers on trillions of dependencies in seconds. This is indispensable for managing large-scale and dynamic software systems. In a nutshell, Dynatrace automatically identifies vulnerabilities and analyzes them to provide actionable and precise answers using a blend of fact-based, predictive, and causal-AI, as well as generative AI capabilities. This empowers development and security teams to assess risk better, prioritize and remediate threats more effectively, and innovate faster and with increased security.

VMblog:  What are some of the security best practices you would deem critical?

Kroier:  Best practices for organizations to successfully safeguard their cloud operations focus on an end-to-end approach to security. This includes:
  • Security across the software development lifecycle: Shifting security left as well as right by identifying vulnerabilities in production through real-user monitoring, performance tracking, and other methods and connecting them with runtime data to create a holistic view of the entire development lifecycle. This eliminates blind spots and helps reduce the time it takes to find vulnerabilities from days or weeks to as little as minutes and enables teams to be more effective and strategic in their resolution strategies. Additionally, organizations should prioritize runtime security to gain a clear understanding of how vulnerabilities impact their organization if one occurs. From there, they can prioritize how to resolve incidents based on business impact.
  • Continuous threat detection: In today's world where so many digital activities are readily available and instant, downtime is unacceptable. It leads to additional stress for employees, causes frustration among customers and directly impacts profitability. Continuously monitoring for security events, performance anomalies and issues with compliance, and optimizing the architecture to run more smoothly gives businesses greater flexibility to adapt to changing business conditions while providing the highest quality customer service possible.
  • Workflows and automation: Cloud computing allows companies to focus on driving growth through innovation rather than dealing with daily fires that could be better handled by automation. Companies should identify cloud solutions that leverage artificial intelligence and big data analytics to gain insights into their security hygiene, optimize security operations and automate incident resolution so employees can spend more time on business-critical tasks.

VMblog:  Is your company giving away any interesting tchotchke at your booth?  What is it?

Kroier:  At the booth, we'll be giving away t-shirts, water bottles, socks, and wireless chargers. We'll also be raffling off an Oculus VR headset each day of the show so make sure to stop by!

##
Published Wednesday, August 02, 2023 7:30 AM by David Marshall
Comments
There are no comments for this post.
To post a comment, you must be a registered user. Registration is free and easy! Sign up now!
Calendar
<August 2023>
SuMoTuWeThFrSa
303112345
6789101112
13141516171819
20212223242526
272829303112
3456789