AWS and Cloudanix team co-authored this blog: Real-Time Threat and Anomaly Detection for Workloads on AWS
Back to Changelog
improvement April 29, 2022

Cloudanix Now on Digital Ocean + Product Updates

We are delighted to announce our new partnership with Digital Ocean. We have been listed on their website as an ‘add-on’ feature that protects your cloud workloads—whether it is compliance, IAM, or Container workload security—giving you a single dashboard across all your cloud infrastructures.


What’s new with the product?

We have new updates on our product every month.

  • Notification on Delta: Now, we will send notifications only when there is a change in the Audit findings. If it’s the same, we do not notify in order to reduce notification fatigue.
  • GCP Realtime Events: Similar to our AWS Realtime capability, our users can subscribe to events they want to be alerted on, in real time. We will do the rest—whenever there’s a suspicious event, we will alert you right away.

In case you missed our previous updates, here’s what we have shipped:

  • Container Workload Protection (CWPP) went live!
  • Introducing the new dashboard – a single-page view of your cloud infrastructure.
  • Cloudanix is now an official partner of AWS!
cta-image

Security for your Code, Cloud and Data

Cloudanix replaces your 5-6 disjointed security tools within 30 minutes.

Get Started

Blog

Read More Posts

Your Trusted Partner in Data Protection with Cutting-Edge Solutions for
Comprehensive Data Security.

Wednesday, Nov 05, 2025

From Static to Strategic: Modernizing Privileged Access for Cloud Infrastructure

The promise of the cloud – agility, scalability, and innovation – has revolutionized how enterprises operate. Cloud infr

Read More

Tuesday, Sep 30, 2025

Eliminate Standing Access: Introducing JIT Kubernetes for Azure AKS Security

The Security Mandate: Why Permanent Access Fails Mission-Critical AKS Kubernetes has become the operating system of

Read More

Friday, Aug 08, 2025

User Access Review in Cloud Security: A Foundational Guide to Securing Your Cloud Environment

Introduction: The Unseen Gatekeepers of Cloud Security In the rapidly expanding landscape of cloud computing, organi

Read More