AWS and Cloudanix team co-authored this blog: Real-Time Threat and Anomaly Detection for Workloads on AWS
Back to Changelog
improvement June 9, 2023

Security context, Events anomaly and Bulk reviews

Real-time Events Anomaly Support for GCP & AZURE and Signals in Notifications

This has been an awaited feature by many. We’re glad to announce it’s finally here. With real-time events anomaly alerts for GCP and Azure your cloud infrastructure is safer than ever. Suspicious behavior that you may miss seeing is automatically reported to you for correction. This feature is sure to bring you a good night’s sleep and lay your worries to rest.

Software Screen-Shot

Events signal control dashboard


Auto Snooze to Avoid Alerts Fatigue

Don’t we all snooze our alarms every once in a while? Imagine your clock could snooze the days you want it to automatically and ring the other days when you need it to. Crazy right? This is enabled for you and visible in the email.

Software Screen-Shot

Event auto snooze feature - dashboard


In Secret Scanning Capability – Support for Custom Patterns and Exclusions

Support for custom patterns and exclusions for existing patterns, files, or secrets.
This allows for more flexibility in identifying and managing secrets within files or code repositories. This feature enables organizations to tailor the secret scanning process to their specific needs and requirements.

Software Screen-Shot


Bulk Update of Events

This feature allows you to manage multiple events in a click rather than making individual updates to each event separately, saving you time and fatigue. This capability is particularly useful in scenarios where you need to apply a consistent change or modification across a large number of events simultaneously.

Software Screen-Shot

Bulk events feature - Cloudanix dashboard


Additional Updates

  • Scan full repository for secrets in both Github and Bitbucket.
  • Additional Events support for IAM in Azure (e.g., permissions updated for Service Account, User MFA changes, etc.)

Coming Soon

  • Attack Path
  • VM Security

TODO:// is not an option for Cloud Security**

cta-image

Security for your Code, Cloud and Data

Cloudanix replaces your 5-6 disjointed security tools within 30 minutes.

Get Started

Blog

Read More Posts

Your Trusted Partner in Data Protection with Cutting-Edge Solutions for
Comprehensive Data Security.

Wednesday, Nov 05, 2025

From Static to Strategic: Modernizing Privileged Access for Cloud Infrastructure

The promise of the cloud – agility, scalability, and innovation – has revolutionized how enterprises operate. Cloud infr

Read More

Tuesday, Sep 30, 2025

Eliminate Standing Access: Introducing JIT Kubernetes for Azure AKS Security

The Security Mandate: Why Permanent Access Fails Mission-Critical AKS Kubernetes has become the operating system of

Read More

Friday, Aug 08, 2025

User Access Review in Cloud Security: A Foundational Guide to Securing Your Cloud Environment

Introduction: The Unseen Gatekeepers of Cloud Security In the rapidly expanding landscape of cloud computing, organi

Read More