Security context, Events anomaly and Bulk reviews
Real-time Events Anomaly Support for GCP & AZURE and Signals in Notifications
This has been an awaited feature by many. We’re glad to announce it’s finally here. With real-time events anomaly alerts for GCP and Azure your cloud infrastructure is safer than ever. Suspicious behavior that you may miss seeing is automatically reported to you for correction. This feature is sure to bring you a good night’s sleep and lay your worries to rest.

Events signal control dashboard
Auto Snooze to Avoid Alerts Fatigue
Don’t we all snooze our alarms every once in a while? Imagine your clock could snooze the days you want it to automatically and ring the other days when you need it to. Crazy right? This is enabled for you and visible in the email.

Event auto snooze feature - dashboard
In Secret Scanning Capability – Support for Custom Patterns and Exclusions
Support for custom patterns and exclusions for existing patterns, files, or secrets.
This allows for more flexibility in identifying and managing secrets within files or code repositories. This feature enables organizations to tailor the secret scanning process to their specific needs and requirements.

Bulk Update of Events
This feature allows you to manage multiple events in a click rather than making individual updates to each event separately, saving you time and fatigue. This capability is particularly useful in scenarios where you need to apply a consistent change or modification across a large number of events simultaneously.

Bulk events feature - Cloudanix dashboard
Additional Updates
- Scan full repository for secrets in both Github and Bitbucket.
- Additional Events support for IAM in Azure (e.g., permissions updated for Service Account, User MFA changes, etc.)
Coming Soon
- Attack Path
- VM Security
TODO:// is not an option for Cloud Security**
Security for your Code, Cloud and Data
Cloudanix replaces your 5-6 disjointed security tools within 30 minutes.
Get StartedBlog
Read More Posts
Your Trusted Partner in Data Protection with Cutting-Edge Solutions for
Comprehensive Data Security.
Wednesday, Nov 05, 2025
From Static to Strategic: Modernizing Privileged Access for Cloud Infrastructure
The promise of the cloud – agility, scalability, and innovation – has revolutionized how enterprises operate. Cloud infr
Read MoreTuesday, Sep 30, 2025
Eliminate Standing Access: Introducing JIT Kubernetes for Azure AKS Security
The Security Mandate: Why Permanent Access Fails Mission-Critical AKS Kubernetes has become the operating system of
Read MoreFriday, Aug 08, 2025
User Access Review in Cloud Security: A Foundational Guide to Securing Your Cloud Environment
Introduction: The Unseen Gatekeepers of Cloud Security In the rapidly expanding landscape of cloud computing, organi
Read More