AWS and Cloudanix team co-authored this blog: Real-Time Threat and Anomaly Detection for Workloads on AWS
Back to Changelog
new release May 7, 2024

Enhanced Vulnerability Management, Fine-Tune Code Security Settings & More

Fueled by your invaluable feedback, Cloudanix continues to evolve! This update prioritizes empowering you with better data consumption. Experience granular filtering controls, tailor your code security with advanced settings, and leverage enhanced reporting capabilities. We are committed to providing you with the tools you need to make informed decisions and achieve optimal security outcomes.

Read to see what we have cooked up for you.


Vulnerability Management for Hosts

Now, gain complete control over your virtual machine security. See all open vulnerabilities at a glance, with detailed information on severity, exploit complexity, attack vectors, and other crucial factors. This enhanced visibility empowers you to prioritize threats effectively, streamlining your vulnerability triaging and remediation process.

Paired with existing File Integrity Monitoring and Malware Analysis, VM Vulnerabilities Management forms a powerful shield, keeping you one step ahead of attackers.

List of vulnerabilities in cloud environment — Cloudanix dashboard
Detailed information about the severity — Cloudanix dashboard

Software Screen-Shot

Software Screen-Shot


Improved Filter Control

Our all-new Filter Control empowers you to dissect your findings with better granularity. Simply choose your desired “Area of Filter,” then drill down and select the specific values you need.

This interface puts you in complete control, allowing you to effortlessly pinpoint the exact information you are searching for.

Software Screen-Shot All new filter control feature

<img src=“/images/changelog/enhanced-vulnerability-management/enhanced-vulnerability-managementSS4.png” alt=“Software Screen-Shot” class=“rounded-2xl border-10 border-gray-50”

/> Controls based on severity


Code Security Settings

Each practitioner looks at Code Security in a slightly different way. To empower this diversity, we are introducing advanced Code Security Settings.

This allows you to define:

  • Capabilities to use
  • Scan Triggers
  • Full Scan Schedule (Daily, Weekly, Monthly, etc.)
  • PR Failure conditions (Critical Count, High Count, Allowed CVEs, etc.)
  • Jira Integration parameters

This flexibility ensures Code Security that adapts to your development process, optimizing efficiency and maximizing security.

Software Screen-Shot

Software Screen-Shot

Code security settings screenshots


PDF Reports for Code & Host Security

Now you can generate detailed Security Posture Reports for Code Security and Host Security, and share them with other stakeholders inside and outside of the organization.


Blogs


Additional Resources


Industry News


TODO:// is not an option for Cloud Security

cta-image

Security for your Code, Cloud and Data

Cloudanix replaces your 5-6 disjointed security tools within 30 minutes.

Get Started

Blog

Read More Posts

Your Trusted Partner in Data Protection with Cutting-Edge Solutions for
Comprehensive Data Security.

Wednesday, Nov 05, 2025

From Static to Strategic: Modernizing Privileged Access for Cloud Infrastructure

The promise of the cloud – agility, scalability, and innovation – has revolutionized how enterprises operate. Cloud infr

Read More

Tuesday, Sep 30, 2025

Eliminate Standing Access: Introducing JIT Kubernetes for Azure AKS Security

The Security Mandate: Why Permanent Access Fails Mission-Critical AKS Kubernetes has become the operating system of

Read More

Friday, Aug 08, 2025

User Access Review in Cloud Security: A Foundational Guide to Securing Your Cloud Environment

Introduction: The Unseen Gatekeepers of Cloud Security In the rapidly expanding landscape of cloud computing, organi

Read More